Dec 13 14:25:25.030667 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:25:25.030700 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:25:25.030714 kernel: BIOS-provided physical RAM map: Dec 13 14:25:25.030724 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 14:25:25.030734 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Dec 13 14:25:25.030744 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Dec 13 14:25:25.030759 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Dec 13 14:25:25.030801 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Dec 13 14:25:25.030812 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Dec 13 14:25:25.030822 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Dec 13 14:25:25.030833 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Dec 13 14:25:25.030843 kernel: printk: bootconsole [earlyser0] enabled Dec 13 14:25:25.030854 kernel: NX (Execute Disable) protection: active Dec 13 14:25:25.030865 kernel: efi: EFI v2.70 by Microsoft Dec 13 14:25:25.030881 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c8a98 RNG=0x3ffd1018 Dec 13 14:25:25.030893 kernel: random: crng init done Dec 13 14:25:25.030904 kernel: SMBIOS 3.1.0 present. Dec 13 14:25:25.030916 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 03/08/2024 Dec 13 14:25:25.030928 kernel: Hypervisor detected: Microsoft Hyper-V Dec 13 14:25:25.030939 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Dec 13 14:25:25.030951 kernel: Hyper-V Host Build:20348-10.0-1-0.1633 Dec 13 14:25:25.030962 kernel: Hyper-V: Nested features: 0x1e0101 Dec 13 14:25:25.030976 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Dec 13 14:25:25.030987 kernel: Hyper-V: Using hypercall for remote TLB flush Dec 13 14:25:25.030998 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Dec 13 14:25:25.031010 kernel: tsc: Marking TSC unstable due to running on Hyper-V Dec 13 14:25:25.031023 kernel: tsc: Detected 2593.906 MHz processor Dec 13 14:25:25.031035 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:25:25.031047 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:25:25.031059 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Dec 13 14:25:25.031071 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:25:25.031082 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Dec 13 14:25:25.031097 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Dec 13 14:25:25.031108 kernel: Using GB pages for direct mapping Dec 13 14:25:25.031120 kernel: Secure boot disabled Dec 13 14:25:25.031132 kernel: ACPI: Early table checksum verification disabled Dec 13 14:25:25.031144 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Dec 13 14:25:25.031156 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:25:25.031168 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:25:25.031180 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Dec 13 14:25:25.031200 kernel: ACPI: FACS 0x000000003FFFE000 000040 Dec 13 14:25:25.031212 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:25:25.031225 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:25:25.031238 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:25:25.031251 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:25:25.031264 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:25:25.031279 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:25:25.031292 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:25:25.031304 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Dec 13 14:25:25.031317 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Dec 13 14:25:25.031330 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Dec 13 14:25:25.031342 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Dec 13 14:25:25.031355 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Dec 13 14:25:25.031368 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Dec 13 14:25:25.031383 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Dec 13 14:25:25.031395 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Dec 13 14:25:25.031408 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Dec 13 14:25:25.031421 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Dec 13 14:25:25.031434 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 14:25:25.031447 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 14:25:25.031464 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Dec 13 14:25:25.031477 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Dec 13 14:25:25.031489 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Dec 13 14:25:25.031504 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Dec 13 14:25:25.031517 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Dec 13 14:25:25.031530 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Dec 13 14:25:25.031543 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Dec 13 14:25:25.031555 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Dec 13 14:25:25.031568 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Dec 13 14:25:25.031581 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Dec 13 14:25:25.031594 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Dec 13 14:25:25.031606 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Dec 13 14:25:25.031621 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Dec 13 14:25:25.031634 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Dec 13 14:25:25.031647 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Dec 13 14:25:25.031660 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Dec 13 14:25:25.031673 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Dec 13 14:25:25.031686 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Dec 13 14:25:25.031699 kernel: Zone ranges: Dec 13 14:25:25.031711 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:25:25.031724 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 14:25:25.031739 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Dec 13 14:25:25.031752 kernel: Movable zone start for each node Dec 13 14:25:25.031772 kernel: Early memory node ranges Dec 13 14:25:25.031785 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Dec 13 14:25:25.031798 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Dec 13 14:25:25.031811 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Dec 13 14:25:25.031823 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Dec 13 14:25:25.031836 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Dec 13 14:25:25.031849 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:25:25.031864 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Dec 13 14:25:25.031877 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Dec 13 14:25:25.031889 kernel: ACPI: PM-Timer IO Port: 0x408 Dec 13 14:25:25.031902 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Dec 13 14:25:25.031914 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:25:25.031927 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:25:25.031940 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:25:25.031953 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Dec 13 14:25:25.031966 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 14:25:25.031981 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Dec 13 14:25:25.031993 kernel: Booting paravirtualized kernel on Hyper-V Dec 13 14:25:25.032007 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:25:25.032020 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 14:25:25.032033 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 14:25:25.032046 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 14:25:25.032058 kernel: pcpu-alloc: [0] 0 1 Dec 13 14:25:25.032070 kernel: Hyper-V: PV spinlocks enabled Dec 13 14:25:25.032083 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 14:25:25.032099 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Dec 13 14:25:25.032111 kernel: Policy zone: Normal Dec 13 14:25:25.032125 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:25:25.032138 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:25:25.032152 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Dec 13 14:25:25.032164 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:25:25.032177 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:25:25.032190 kernel: Memory: 8079144K/8387460K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 308056K reserved, 0K cma-reserved) Dec 13 14:25:25.032206 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:25:25.032219 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:25:25.032242 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:25:25.032258 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:25:25.032272 kernel: rcu: RCU event tracing is enabled. Dec 13 14:25:25.032286 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:25:25.032299 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:25:25.032313 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:25:25.032326 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:25:25.032340 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:25:25.032353 kernel: Using NULL legacy PIC Dec 13 14:25:25.032370 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Dec 13 14:25:25.032383 kernel: Console: colour dummy device 80x25 Dec 13 14:25:25.032396 kernel: printk: console [tty1] enabled Dec 13 14:25:25.032410 kernel: printk: console [ttyS0] enabled Dec 13 14:25:25.032423 kernel: printk: bootconsole [earlyser0] disabled Dec 13 14:25:25.032439 kernel: ACPI: Core revision 20210730 Dec 13 14:25:25.032452 kernel: Failed to register legacy timer interrupt Dec 13 14:25:25.032466 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:25:25.032480 kernel: Hyper-V: Using IPI hypercalls Dec 13 14:25:25.032493 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593906) Dec 13 14:25:25.032507 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 14:25:25.032520 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 14:25:25.032534 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:25:25.032547 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 14:25:25.032560 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:25:25.032576 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:25:25.032590 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Dec 13 14:25:25.032604 kernel: RETBleed: Vulnerable Dec 13 14:25:25.032617 kernel: Speculative Store Bypass: Vulnerable Dec 13 14:25:25.032630 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:25:25.032643 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:25:25.032657 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 14:25:25.032670 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:25:25.032683 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:25:25.032697 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:25:25.032712 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Dec 13 14:25:25.032726 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Dec 13 14:25:25.032739 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Dec 13 14:25:25.032753 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:25:25.058820 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Dec 13 14:25:25.058849 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Dec 13 14:25:25.058864 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Dec 13 14:25:25.058878 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Dec 13 14:25:25.058892 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:25:25.058906 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:25:25.058919 kernel: LSM: Security Framework initializing Dec 13 14:25:25.058933 kernel: SELinux: Initializing. Dec 13 14:25:25.058951 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:25:25.058965 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:25:25.058979 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Dec 13 14:25:25.058993 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Dec 13 14:25:25.059007 kernel: signal: max sigframe size: 3632 Dec 13 14:25:25.059020 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:25:25.059034 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 14:25:25.059048 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:25:25.059060 kernel: x86: Booting SMP configuration: Dec 13 14:25:25.059074 kernel: .... node #0, CPUs: #1 Dec 13 14:25:25.059091 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Dec 13 14:25:25.059106 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 14:25:25.059119 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:25:25.059132 kernel: smpboot: Max logical packages: 1 Dec 13 14:25:25.059146 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Dec 13 14:25:25.059160 kernel: devtmpfs: initialized Dec 13 14:25:25.059173 kernel: x86/mm: Memory block size: 128MB Dec 13 14:25:25.059187 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Dec 13 14:25:25.059203 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:25:25.059217 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:25:25.059231 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:25:25.059245 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:25:25.059258 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:25:25.059271 kernel: audit: type=2000 audit(1734099924.023:1): state=initialized audit_enabled=0 res=1 Dec 13 14:25:25.059284 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:25:25.059298 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:25:25.059311 kernel: cpuidle: using governor menu Dec 13 14:25:25.059327 kernel: ACPI: bus type PCI registered Dec 13 14:25:25.059340 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:25:25.059354 kernel: dca service started, version 1.12.1 Dec 13 14:25:25.059367 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:25:25.059381 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:25:25.059394 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:25:25.059407 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:25:25.059421 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:25:25.059434 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:25:25.059450 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:25:25.059463 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:25:25.059477 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:25:25.059491 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:25:25.059504 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:25:25.059517 kernel: ACPI: Interpreter enabled Dec 13 14:25:25.059531 kernel: ACPI: PM: (supports S0 S5) Dec 13 14:25:25.059544 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:25:25.059558 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:25:25.059574 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Dec 13 14:25:25.059587 kernel: iommu: Default domain type: Translated Dec 13 14:25:25.059601 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:25:25.059614 kernel: vgaarb: loaded Dec 13 14:25:25.059628 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:25:25.059641 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:25:25.059655 kernel: PTP clock support registered Dec 13 14:25:25.059668 kernel: Registered efivars operations Dec 13 14:25:25.059682 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:25:25.059695 kernel: PCI: System does not support PCI Dec 13 14:25:25.059711 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Dec 13 14:25:25.059724 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:25:25.059738 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:25:25.059751 kernel: pnp: PnP ACPI init Dec 13 14:25:25.059810 kernel: pnp: PnP ACPI: found 3 devices Dec 13 14:25:25.059825 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:25:25.059838 kernel: NET: Registered PF_INET protocol family Dec 13 14:25:25.059852 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 14:25:25.059869 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Dec 13 14:25:25.059882 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:25:25.059896 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:25:25.059910 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 14:25:25.059923 kernel: TCP: Hash tables configured (established 65536 bind 65536) Dec 13 14:25:25.059938 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 14:25:25.059951 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 14:25:25.059965 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:25:25.059978 kernel: NET: Registered PF_XDP protocol family Dec 13 14:25:25.059994 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:25:25.060008 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 14:25:25.060021 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Dec 13 14:25:25.060035 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 14:25:25.060048 kernel: Initialise system trusted keyrings Dec 13 14:25:25.060061 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Dec 13 14:25:25.060075 kernel: Key type asymmetric registered Dec 13 14:25:25.060088 kernel: Asymmetric key parser 'x509' registered Dec 13 14:25:25.060101 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:25:25.060117 kernel: io scheduler mq-deadline registered Dec 13 14:25:25.060130 kernel: io scheduler kyber registered Dec 13 14:25:25.060144 kernel: io scheduler bfq registered Dec 13 14:25:25.060157 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:25:25.060171 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:25:25.060184 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:25:25.060198 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 14:25:25.060211 kernel: i8042: PNP: No PS/2 controller found. Dec 13 14:25:25.060386 kernel: rtc_cmos 00:02: registered as rtc0 Dec 13 14:25:25.060504 kernel: rtc_cmos 00:02: setting system clock to 2024-12-13T14:25:24 UTC (1734099924) Dec 13 14:25:25.060610 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Dec 13 14:25:25.060627 kernel: fail to initialize ptp_kvm Dec 13 14:25:25.060641 kernel: intel_pstate: CPU model not supported Dec 13 14:25:25.060655 kernel: efifb: probing for efifb Dec 13 14:25:25.060669 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Dec 13 14:25:25.060682 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Dec 13 14:25:25.060695 kernel: efifb: scrolling: redraw Dec 13 14:25:25.060712 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Dec 13 14:25:25.060725 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 14:25:25.060738 kernel: fb0: EFI VGA frame buffer device Dec 13 14:25:25.060752 kernel: pstore: Registered efi as persistent store backend Dec 13 14:25:25.060774 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:25:25.062823 kernel: Segment Routing with IPv6 Dec 13 14:25:25.062838 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:25:25.062852 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:25:25.062866 kernel: Key type dns_resolver registered Dec 13 14:25:25.062883 kernel: IPI shorthand broadcast: enabled Dec 13 14:25:25.062896 kernel: sched_clock: Marking stable (755913700, 23765100)->(991852600, -212173800) Dec 13 14:25:25.062910 kernel: registered taskstats version 1 Dec 13 14:25:25.062923 kernel: Loading compiled-in X.509 certificates Dec 13 14:25:25.062936 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:25:25.062950 kernel: Key type .fscrypt registered Dec 13 14:25:25.062963 kernel: Key type fscrypt-provisioning registered Dec 13 14:25:25.062976 kernel: pstore: Using crash dump compression: deflate Dec 13 14:25:25.062992 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:25:25.063005 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:25:25.063019 kernel: ima: No architecture policies found Dec 13 14:25:25.063032 kernel: clk: Disabling unused clocks Dec 13 14:25:25.063046 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:25:25.063059 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:25:25.063073 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:25:25.063086 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:25:25.063100 kernel: Run /init as init process Dec 13 14:25:25.063113 kernel: with arguments: Dec 13 14:25:25.063129 kernel: /init Dec 13 14:25:25.063142 kernel: with environment: Dec 13 14:25:25.063155 kernel: HOME=/ Dec 13 14:25:25.063168 kernel: TERM=linux Dec 13 14:25:25.063182 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:25:25.063199 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:25:25.063216 systemd[1]: Detected virtualization microsoft. Dec 13 14:25:25.063233 systemd[1]: Detected architecture x86-64. Dec 13 14:25:25.063247 systemd[1]: Running in initrd. Dec 13 14:25:25.063262 systemd[1]: No hostname configured, using default hostname. Dec 13 14:25:25.063275 systemd[1]: Hostname set to . Dec 13 14:25:25.063290 systemd[1]: Initializing machine ID from random generator. Dec 13 14:25:25.063304 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:25:25.063318 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:25:25.063332 systemd[1]: Reached target cryptsetup.target. Dec 13 14:25:25.063345 systemd[1]: Reached target paths.target. Dec 13 14:25:25.063362 systemd[1]: Reached target slices.target. Dec 13 14:25:25.063376 systemd[1]: Reached target swap.target. Dec 13 14:25:25.063390 systemd[1]: Reached target timers.target. Dec 13 14:25:25.063405 systemd[1]: Listening on iscsid.socket. Dec 13 14:25:25.063419 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:25:25.063433 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:25:25.063447 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:25:25.063464 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:25:25.063478 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:25:25.063493 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:25:25.063507 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:25:25.063521 systemd[1]: Reached target sockets.target. Dec 13 14:25:25.063535 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:25:25.063549 systemd[1]: Finished network-cleanup.service. Dec 13 14:25:25.063563 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:25:25.063577 systemd[1]: Starting systemd-journald.service... Dec 13 14:25:25.063594 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:25:25.063608 systemd[1]: Starting systemd-resolved.service... Dec 13 14:25:25.063623 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:25:25.063637 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:25:25.063652 kernel: audit: type=1130 audit(1734099925.034:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:25.063666 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:25:25.063685 systemd-journald[183]: Journal started Dec 13 14:25:25.065795 systemd-journald[183]: Runtime Journal (/run/log/journal/3c8533e311c041139b7f4927a2df9081) is 8.0M, max 159.0M, 151.0M free. Dec 13 14:25:25.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:25.048346 systemd-modules-load[184]: Inserted module 'overlay' Dec 13 14:25:25.074816 systemd[1]: Started systemd-journald.service. Dec 13 14:25:25.078060 systemd-resolved[185]: Positive Trust Anchors: Dec 13 14:25:25.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:25.092815 kernel: audit: type=1130 audit(1734099925.066:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:25.091619 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:25:25.102686 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:25:25.091676 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:25:25.118758 systemd-resolved[185]: Defaulting to hostname 'linux'. Dec 13 14:25:25.124425 kernel: Bridge firewalling registered Dec 13 14:25:25.124497 systemd-modules-load[184]: Inserted module 'br_netfilter' Dec 13 14:25:25.124730 systemd[1]: Started systemd-resolved.service. Dec 13 14:25:25.130830 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:25:25.135363 systemd[1]: Reached target nss-lookup.target. Dec 13 14:25:25.140041 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:25:25.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:25.144809 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:25:25.176508 kernel: audit: type=1130 audit(1734099925.123:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:25.176564 kernel: audit: type=1130 audit(1734099925.128:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:25.176578 kernel: audit: type=1130 audit(1734099925.134:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:25.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:25.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:25.187158 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:25:25.193783 kernel: SCSI subsystem initialized Dec 13 14:25:25.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:25.206125 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:25:25.209988 kernel: audit: type=1130 audit(1734099925.193:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:25.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:25.211090 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:25:25.226749 kernel: audit: type=1130 audit(1734099925.209:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:25.234186 dracut-cmdline[200]: dracut-dracut-053 Dec 13 14:25:25.240306 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:25:25.240340 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:25:25.240356 dracut-cmdline[200]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:25:25.258629 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:25:25.263245 systemd-modules-load[184]: Inserted module 'dm_multipath' Dec 13 14:25:25.266468 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:25:25.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:25.271755 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:25:25.287913 kernel: audit: type=1130 audit(1734099925.269:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:25.293448 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:25:25.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:25.307779 kernel: audit: type=1130 audit(1734099925.295:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:25.339787 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:25:25.358790 kernel: iscsi: registered transport (tcp) Dec 13 14:25:25.384857 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:25:25.384924 kernel: QLogic iSCSI HBA Driver Dec 13 14:25:25.413899 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:25:25.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:25.418723 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:25:25.467794 kernel: raid6: avx512x4 gen() 18572 MB/s Dec 13 14:25:25.488793 kernel: raid6: avx512x4 xor() 5740 MB/s Dec 13 14:25:25.508779 kernel: raid6: avx512x2 gen() 18675 MB/s Dec 13 14:25:25.528783 kernel: raid6: avx512x2 xor() 29693 MB/s Dec 13 14:25:25.548778 kernel: raid6: avx512x1 gen() 18522 MB/s Dec 13 14:25:25.568779 kernel: raid6: avx512x1 xor() 26291 MB/s Dec 13 14:25:25.588782 kernel: raid6: avx2x4 gen() 18578 MB/s Dec 13 14:25:25.608779 kernel: raid6: avx2x4 xor() 7757 MB/s Dec 13 14:25:25.628778 kernel: raid6: avx2x2 gen() 18684 MB/s Dec 13 14:25:25.648781 kernel: raid6: avx2x2 xor() 22237 MB/s Dec 13 14:25:25.668778 kernel: raid6: avx2x1 gen() 14343 MB/s Dec 13 14:25:25.688776 kernel: raid6: avx2x1 xor() 19483 MB/s Dec 13 14:25:25.709779 kernel: raid6: sse2x4 gen() 11723 MB/s Dec 13 14:25:25.728788 kernel: raid6: sse2x4 xor() 7221 MB/s Dec 13 14:25:25.748779 kernel: raid6: sse2x2 gen() 12924 MB/s Dec 13 14:25:25.769779 kernel: raid6: sse2x2 xor() 7505 MB/s Dec 13 14:25:25.789777 kernel: raid6: sse2x1 gen() 11657 MB/s Dec 13 14:25:25.812151 kernel: raid6: sse2x1 xor() 5886 MB/s Dec 13 14:25:25.812169 kernel: raid6: using algorithm avx2x2 gen() 18684 MB/s Dec 13 14:25:25.812182 kernel: raid6: .... xor() 22237 MB/s, rmw enabled Dec 13 14:25:25.815520 kernel: raid6: using avx512x2 recovery algorithm Dec 13 14:25:25.840802 kernel: xor: automatically using best checksumming function avx Dec 13 14:25:25.935791 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:25:25.944203 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:25:25.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:25.952000 audit: BPF prog-id=7 op=LOAD Dec 13 14:25:25.952000 audit: BPF prog-id=8 op=LOAD Dec 13 14:25:25.953395 systemd[1]: Starting systemd-udevd.service... Dec 13 14:25:25.966975 systemd-udevd[383]: Using default interface naming scheme 'v252'. Dec 13 14:25:25.971607 systemd[1]: Started systemd-udevd.service. Dec 13 14:25:25.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:25.980461 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:25:25.996034 dracut-pre-trigger[400]: rd.md=0: removing MD RAID activation Dec 13 14:25:26.026051 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:25:26.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:26.031398 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:25:26.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:26.065065 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:25:26.114788 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:25:26.128987 kernel: hv_vmbus: Vmbus version:5.2 Dec 13 14:25:26.143791 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:25:26.147785 kernel: AES CTR mode by8 optimization enabled Dec 13 14:25:26.178790 kernel: hv_vmbus: registering driver hyperv_keyboard Dec 13 14:25:26.182785 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 14:25:26.182827 kernel: hv_vmbus: registering driver hv_storvsc Dec 13 14:25:26.196954 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Dec 13 14:25:26.202012 kernel: hv_vmbus: registering driver hid_hyperv Dec 13 14:25:26.202058 kernel: hv_vmbus: registering driver hv_netvsc Dec 13 14:25:26.209710 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Dec 13 14:25:26.213784 kernel: scsi host1: storvsc_host_t Dec 13 14:25:26.213956 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Dec 13 14:25:26.222504 kernel: scsi host0: storvsc_host_t Dec 13 14:25:26.227989 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Dec 13 14:25:26.234784 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Dec 13 14:25:26.263090 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Dec 13 14:25:26.280725 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 14:25:26.280743 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Dec 13 14:25:26.299328 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Dec 13 14:25:26.299508 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Dec 13 14:25:26.299679 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 14:25:26.299846 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Dec 13 14:25:26.299998 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Dec 13 14:25:26.300161 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:25:26.300187 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 14:25:26.389651 kernel: hv_netvsc 7c1e5277-680c-7c1e-5277-680c7c1e5277 eth0: VF slot 1 added Dec 13 14:25:26.404533 kernel: hv_vmbus: registering driver hv_pci Dec 13 14:25:26.404572 kernel: hv_pci 5e880ecd-7255-44cd-bfcd-b48398b267f5: PCI VMBus probing: Using version 0x10004 Dec 13 14:25:26.475543 kernel: hv_pci 5e880ecd-7255-44cd-bfcd-b48398b267f5: PCI host bridge to bus 7255:00 Dec 13 14:25:26.475720 kernel: pci_bus 7255:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Dec 13 14:25:26.475917 kernel: pci_bus 7255:00: No busn resource found for root bus, will use [bus 00-ff] Dec 13 14:25:26.476059 kernel: pci 7255:00:02.0: [15b3:1016] type 00 class 0x020000 Dec 13 14:25:26.476223 kernel: pci 7255:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Dec 13 14:25:26.476374 kernel: pci 7255:00:02.0: enabling Extended Tags Dec 13 14:25:26.476522 kernel: pci 7255:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 7255:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Dec 13 14:25:26.476669 kernel: pci_bus 7255:00: busn_res: [bus 00-ff] end is updated to 00 Dec 13 14:25:26.476829 kernel: pci 7255:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Dec 13 14:25:26.566789 kernel: mlx5_core 7255:00:02.0: firmware version: 14.30.5000 Dec 13 14:25:26.807991 kernel: mlx5_core 7255:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Dec 13 14:25:26.808168 kernel: mlx5_core 7255:00:02.0: Supported tc offload range - chains: 1, prios: 1 Dec 13 14:25:26.808320 kernel: mlx5_core 7255:00:02.0: mlx5e_tc_post_act_init:40:(pid 16): firmware level support is missing Dec 13 14:25:26.808464 kernel: hv_netvsc 7c1e5277-680c-7c1e-5277-680c7c1e5277 eth0: VF registering: eth1 Dec 13 14:25:26.808607 kernel: mlx5_core 7255:00:02.0 eth1: joined to eth0 Dec 13 14:25:26.817813 kernel: mlx5_core 7255:00:02.0 enP29269s1: renamed from eth1 Dec 13 14:25:27.211158 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:25:27.247793 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (441) Dec 13 14:25:27.261947 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:25:27.418754 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:25:27.423904 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:25:27.431852 systemd[1]: Starting disk-uuid.service... Dec 13 14:25:27.445207 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:25:27.450777 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:25:27.460784 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:25:28.460793 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:25:28.461133 disk-uuid[562]: The operation has completed successfully. Dec 13 14:25:28.537265 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:25:28.537370 systemd[1]: Finished disk-uuid.service. Dec 13 14:25:28.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:28.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:28.548455 systemd[1]: Starting verity-setup.service... Dec 13 14:25:28.588969 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 14:25:28.833251 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:25:28.837946 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:25:28.841835 systemd[1]: Finished verity-setup.service. Dec 13 14:25:28.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:28.918793 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:25:28.919025 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:25:28.921048 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:25:28.922279 systemd[1]: Starting ignition-setup.service... Dec 13 14:25:28.927128 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:25:28.958293 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:25:28.958348 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:25:28.958367 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:25:29.000477 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:25:29.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:29.003000 audit: BPF prog-id=9 op=LOAD Dec 13 14:25:29.005227 systemd[1]: Starting systemd-networkd.service... Dec 13 14:25:29.028852 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:25:29.037682 systemd-networkd[803]: lo: Link UP Dec 13 14:25:29.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:29.037692 systemd-networkd[803]: lo: Gained carrier Dec 13 14:25:29.038236 systemd-networkd[803]: Enumeration completed Dec 13 14:25:29.038562 systemd[1]: Started systemd-networkd.service. Dec 13 14:25:29.041669 systemd-networkd[803]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:25:29.042360 systemd[1]: Reached target network.target. Dec 13 14:25:29.055661 systemd[1]: Starting iscsiuio.service... Dec 13 14:25:29.064344 systemd[1]: Started iscsiuio.service. Dec 13 14:25:29.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:29.066688 systemd[1]: Starting iscsid.service... Dec 13 14:25:29.074548 iscsid[812]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:25:29.074548 iscsid[812]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:25:29.074548 iscsid[812]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:25:29.074548 iscsid[812]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:25:29.098319 iscsid[812]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:25:29.098319 iscsid[812]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:25:29.110978 kernel: mlx5_core 7255:00:02.0 enP29269s1: Link up Dec 13 14:25:29.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:29.109225 systemd[1]: Started iscsid.service. Dec 13 14:25:29.113310 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:25:29.125518 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:25:29.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:29.129580 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:25:29.134001 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:25:29.138347 systemd[1]: Reached target remote-fs.target. Dec 13 14:25:29.143365 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:25:29.161969 kernel: hv_netvsc 7c1e5277-680c-7c1e-5277-680c7c1e5277 eth0: Data path switched to VF: enP29269s1 Dec 13 14:25:29.162179 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:25:29.156452 systemd[1]: Finished ignition-setup.service. Dec 13 14:25:29.162351 systemd-networkd[803]: enP29269s1: Link UP Dec 13 14:25:29.162573 systemd-networkd[803]: eth0: Link UP Dec 13 14:25:29.163039 systemd-networkd[803]: eth0: Gained carrier Dec 13 14:25:29.168248 systemd-networkd[803]: enP29269s1: Gained carrier Dec 13 14:25:29.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:29.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:29.173593 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:25:29.179119 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:25:29.199833 systemd-networkd[803]: eth0: DHCPv4 address 10.200.8.14/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 14:25:30.500979 systemd-networkd[803]: eth0: Gained IPv6LL Dec 13 14:25:32.264532 ignition[827]: Ignition 2.14.0 Dec 13 14:25:32.264549 ignition[827]: Stage: fetch-offline Dec 13 14:25:32.264637 ignition[827]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:25:32.264690 ignition[827]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:25:32.376789 ignition[827]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:25:32.376994 ignition[827]: parsed url from cmdline: "" Dec 13 14:25:32.376998 ignition[827]: no config URL provided Dec 13 14:25:32.377004 ignition[827]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:25:32.377013 ignition[827]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:25:32.377018 ignition[827]: failed to fetch config: resource requires networking Dec 13 14:25:32.378657 ignition[827]: Ignition finished successfully Dec 13 14:25:32.391769 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:25:32.402965 kernel: kauditd_printk_skb: 18 callbacks suppressed Dec 13 14:25:32.403004 kernel: audit: type=1130 audit(1734099932.397:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:32.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:32.399087 systemd[1]: Starting ignition-fetch.service... Dec 13 14:25:32.407443 ignition[833]: Ignition 2.14.0 Dec 13 14:25:32.407450 ignition[833]: Stage: fetch Dec 13 14:25:32.407552 ignition[833]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:25:32.407575 ignition[833]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:25:32.410641 ignition[833]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:25:32.426156 ignition[833]: parsed url from cmdline: "" Dec 13 14:25:32.426163 ignition[833]: no config URL provided Dec 13 14:25:32.426168 ignition[833]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:25:32.426180 ignition[833]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:25:32.426212 ignition[833]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Dec 13 14:25:32.560354 ignition[833]: GET result: OK Dec 13 14:25:32.560414 ignition[833]: config has been read from IMDS userdata Dec 13 14:25:32.560431 ignition[833]: parsing config with SHA512: c27807560108e6da886b07b133134d2464933f25a9ab71c34dfcc33cd0dfd2f8a8e85a9651e814625316377a6c2e2f8af4ee6efa0312700ed97ca306b7d471c5 Dec 13 14:25:32.563868 unknown[833]: fetched base config from "system" Dec 13 14:25:32.564245 ignition[833]: fetch: fetch complete Dec 13 14:25:32.585269 kernel: audit: type=1130 audit(1734099932.568:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:32.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:32.563878 unknown[833]: fetched base config from "system" Dec 13 14:25:32.564251 ignition[833]: fetch: fetch passed Dec 13 14:25:32.563884 unknown[833]: fetched user config from "azure" Dec 13 14:25:32.564296 ignition[833]: Ignition finished successfully Dec 13 14:25:32.566055 systemd[1]: Finished ignition-fetch.service. Dec 13 14:25:32.591752 ignition[839]: Ignition 2.14.0 Dec 13 14:25:32.570326 systemd[1]: Starting ignition-kargs.service... Dec 13 14:25:32.591758 ignition[839]: Stage: kargs Dec 13 14:25:32.591876 ignition[839]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:25:32.591917 ignition[839]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:25:32.597346 ignition[839]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:25:32.598368 ignition[839]: kargs: kargs passed Dec 13 14:25:32.598409 ignition[839]: Ignition finished successfully Dec 13 14:25:32.611211 systemd[1]: Finished ignition-kargs.service. Dec 13 14:25:32.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:32.623478 ignition[845]: Ignition 2.14.0 Dec 13 14:25:32.629718 kernel: audit: type=1130 audit(1734099932.612:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:32.613921 systemd[1]: Starting ignition-disks.service... Dec 13 14:25:32.623486 ignition[845]: Stage: disks Dec 13 14:25:32.623600 ignition[845]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:25:32.623626 ignition[845]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:25:32.637279 ignition[845]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:25:32.641108 ignition[845]: disks: disks passed Dec 13 14:25:32.641175 ignition[845]: Ignition finished successfully Dec 13 14:25:32.645140 systemd[1]: Finished ignition-disks.service. Dec 13 14:25:32.647208 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:25:32.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:32.651155 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:25:32.671191 kernel: audit: type=1130 audit(1734099932.646:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:32.653670 systemd[1]: Reached target local-fs.target. Dec 13 14:25:32.663377 systemd[1]: Reached target sysinit.target. Dec 13 14:25:32.675017 systemd[1]: Reached target basic.target. Dec 13 14:25:32.681018 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:25:32.740410 systemd-fsck[853]: ROOT: clean, 621/7326000 files, 481077/7359488 blocks Dec 13 14:25:32.748678 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:25:32.769382 kernel: audit: type=1130 audit(1734099932.754:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:32.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:32.756409 systemd[1]: Mounting sysroot.mount... Dec 13 14:25:32.778780 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:25:32.779276 systemd[1]: Mounted sysroot.mount. Dec 13 14:25:32.782719 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:25:32.868797 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:25:32.874066 systemd[1]: Starting flatcar-metadata-hostname.service... Dec 13 14:25:32.878696 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:25:32.878736 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:25:32.886608 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:25:32.929628 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:25:32.935436 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:25:32.942784 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (864) Dec 13 14:25:32.953635 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:25:32.953686 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:25:32.953699 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:25:32.961689 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:25:32.966678 initrd-setup-root[869]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:25:32.994755 initrd-setup-root[895]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:25:33.017234 initrd-setup-root[903]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:25:33.024899 initrd-setup-root[911]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:25:33.542831 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:25:33.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:33.547863 systemd[1]: Starting ignition-mount.service... Dec 13 14:25:33.567697 kernel: audit: type=1130 audit(1734099933.546:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:33.561949 systemd[1]: Starting sysroot-boot.service... Dec 13 14:25:33.564713 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:25:33.564846 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:25:33.591339 ignition[931]: INFO : Ignition 2.14.0 Dec 13 14:25:33.591339 ignition[931]: INFO : Stage: mount Dec 13 14:25:33.597190 ignition[931]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:25:33.597190 ignition[931]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:25:33.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:33.620124 ignition[931]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:25:33.620124 ignition[931]: INFO : mount: mount passed Dec 13 14:25:33.620124 ignition[931]: INFO : Ignition finished successfully Dec 13 14:25:33.627449 kernel: audit: type=1130 audit(1734099933.607:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:33.602739 systemd[1]: Finished ignition-mount.service. Dec 13 14:25:33.633171 systemd[1]: Finished sysroot-boot.service. Dec 13 14:25:33.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:33.646778 kernel: audit: type=1130 audit(1734099933.635:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:34.442971 coreos-metadata[863]: Dec 13 14:25:34.442 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Dec 13 14:25:34.466833 coreos-metadata[863]: Dec 13 14:25:34.466 INFO Fetch successful Dec 13 14:25:34.502321 coreos-metadata[863]: Dec 13 14:25:34.502 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Dec 13 14:25:34.518907 coreos-metadata[863]: Dec 13 14:25:34.518 INFO Fetch successful Dec 13 14:25:34.532947 coreos-metadata[863]: Dec 13 14:25:34.532 INFO wrote hostname ci-3510.3.6-a-178cfdfca8 to /sysroot/etc/hostname Dec 13 14:25:34.538357 systemd[1]: Finished flatcar-metadata-hostname.service. Dec 13 14:25:34.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:34.555931 kernel: audit: type=1130 audit(1734099934.540:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:34.553927 systemd[1]: Starting ignition-files.service... Dec 13 14:25:34.561635 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:25:34.573799 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (942) Dec 13 14:25:34.582124 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:25:34.582166 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:25:34.582180 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:25:34.590209 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:25:34.603691 ignition[961]: INFO : Ignition 2.14.0 Dec 13 14:25:34.603691 ignition[961]: INFO : Stage: files Dec 13 14:25:34.607684 ignition[961]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:25:34.607684 ignition[961]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:25:34.621795 ignition[961]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:25:34.635982 ignition[961]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:25:34.639023 ignition[961]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:25:34.639023 ignition[961]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:25:34.667161 ignition[961]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:25:34.670796 ignition[961]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:25:34.681731 unknown[961]: wrote ssh authorized keys file for user: core Dec 13 14:25:34.684307 ignition[961]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:25:34.707640 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:25:34.712417 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:25:34.716912 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 14:25:34.721512 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(4): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:25:34.726866 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem123793175" Dec 13 14:25:34.731789 ignition[961]: CRITICAL : files: createFilesystemsFiles: createFiles: op(4): op(5): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem123793175": device or resource busy Dec 13 14:25:34.731789 ignition[961]: ERROR : files: createFilesystemsFiles: createFiles: op(4): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem123793175", trying btrfs: device or resource busy Dec 13 14:25:34.731789 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem123793175" Dec 13 14:25:34.754718 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (961) Dec 13 14:25:34.754748 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem123793175" Dec 13 14:25:34.754748 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [started] unmounting "/mnt/oem123793175" Dec 13 14:25:34.754748 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [finished] unmounting "/mnt/oem123793175" Dec 13 14:25:34.754748 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 14:25:34.754748 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:25:34.754748 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(8): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:25:34.789023 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2666123199" Dec 13 14:25:34.793996 ignition[961]: CRITICAL : files: createFilesystemsFiles: createFiles: op(8): op(9): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2666123199": device or resource busy Dec 13 14:25:34.793996 ignition[961]: ERROR : files: createFilesystemsFiles: createFiles: op(8): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2666123199", trying btrfs: device or resource busy Dec 13 14:25:34.793996 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2666123199" Dec 13 14:25:34.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:34.813489 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2666123199" Dec 13 14:25:34.813489 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [started] unmounting "/mnt/oem2666123199" Dec 13 14:25:34.813489 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [finished] unmounting "/mnt/oem2666123199" Dec 13 14:25:34.813489 ignition[961]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:25:34.813489 ignition[961]: INFO : files: op(c): [started] processing unit "waagent.service" Dec 13 14:25:34.813489 ignition[961]: INFO : files: op(c): [finished] processing unit "waagent.service" Dec 13 14:25:34.813489 ignition[961]: INFO : files: op(d): [started] processing unit "nvidia.service" Dec 13 14:25:34.813489 ignition[961]: INFO : files: op(d): [finished] processing unit "nvidia.service" Dec 13 14:25:34.813489 ignition[961]: INFO : files: op(e): [started] setting preset to enabled for "nvidia.service" Dec 13 14:25:34.813489 ignition[961]: INFO : files: op(e): [finished] setting preset to enabled for "nvidia.service" Dec 13 14:25:34.813489 ignition[961]: INFO : files: op(f): [started] setting preset to enabled for "waagent.service" Dec 13 14:25:34.813489 ignition[961]: INFO : files: op(f): [finished] setting preset to enabled for "waagent.service" Dec 13 14:25:34.813489 ignition[961]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:25:34.813489 ignition[961]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:25:34.813489 ignition[961]: INFO : files: files passed Dec 13 14:25:34.813489 ignition[961]: INFO : Ignition finished successfully Dec 13 14:25:34.850003 kernel: audit: type=1130 audit(1734099934.813:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:34.809684 systemd[1]: Finished ignition-files.service. Dec 13 14:25:34.829884 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:25:34.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:34.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:34.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:34.833175 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:25:34.903908 initrd-setup-root-after-ignition[986]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:25:34.834005 systemd[1]: Starting ignition-quench.service... Dec 13 14:25:34.887442 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:25:34.887577 systemd[1]: Finished ignition-quench.service. Dec 13 14:25:34.892416 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:25:34.894969 systemd[1]: Reached target ignition-complete.target. Dec 13 14:25:34.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:34.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:34.897866 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:25:34.920414 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:25:34.920506 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:25:34.924099 systemd[1]: Reached target initrd-fs.target. Dec 13 14:25:34.926652 systemd[1]: Reached target initrd.target. Dec 13 14:25:34.930721 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:25:34.931546 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:25:34.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:34.946253 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:25:34.951854 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:25:34.963161 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:25:34.967668 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:25:34.972194 systemd[1]: Stopped target timers.target. Dec 13 14:25:34.975922 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:25:34.978502 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:25:34.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:34.982651 systemd[1]: Stopped target initrd.target. Dec 13 14:25:34.986546 systemd[1]: Stopped target basic.target. Dec 13 14:25:34.990373 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:25:34.994990 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:25:34.999600 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:25:35.012693 systemd[1]: Stopped target remote-fs.target. Dec 13 14:25:35.014740 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:25:35.018815 systemd[1]: Stopped target sysinit.target. Dec 13 14:25:35.022774 systemd[1]: Stopped target local-fs.target. Dec 13 14:25:35.026809 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:25:35.030833 systemd[1]: Stopped target swap.target. Dec 13 14:25:35.034449 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:25:35.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.034599 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:25:35.038638 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:25:35.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.043250 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:25:35.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.043387 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:25:35.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.047715 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:25:35.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.047864 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:25:35.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.052224 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:25:35.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.052341 systemd[1]: Stopped ignition-files.service. Dec 13 14:25:35.090590 ignition[999]: INFO : Ignition 2.14.0 Dec 13 14:25:35.090590 ignition[999]: INFO : Stage: umount Dec 13 14:25:35.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.057374 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Dec 13 14:25:35.100658 ignition[999]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:25:35.100658 ignition[999]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:25:35.100658 ignition[999]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:25:35.057494 systemd[1]: Stopped flatcar-metadata-hostname.service. Dec 13 14:25:35.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.122928 ignition[999]: INFO : umount: umount passed Dec 13 14:25:35.122928 ignition[999]: INFO : Ignition finished successfully Dec 13 14:25:35.062984 systemd[1]: Stopping ignition-mount.service... Dec 13 14:25:35.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.066964 systemd[1]: Stopping iscsiuio.service... Dec 13 14:25:35.132000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.069880 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:25:35.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.071980 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:25:35.072173 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:25:35.077517 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:25:35.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.077668 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:25:35.082688 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:25:35.082812 systemd[1]: Stopped iscsiuio.service. Dec 13 14:25:35.086025 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:25:35.086111 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:25:35.103882 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:25:35.103979 systemd[1]: Stopped ignition-mount.service. Dec 13 14:25:35.122901 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:25:35.122979 systemd[1]: Stopped ignition-disks.service. Dec 13 14:25:35.130859 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:25:35.130927 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:25:35.134668 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:25:35.134720 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:25:35.138663 systemd[1]: Stopped target network.target. Dec 13 14:25:35.143153 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:25:35.143201 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:25:35.145329 systemd[1]: Stopped target paths.target. Dec 13 14:25:35.151454 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:25:35.155809 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:25:35.158384 systemd[1]: Stopped target slices.target. Dec 13 14:25:35.160311 systemd[1]: Stopped target sockets.target. Dec 13 14:25:35.163887 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:25:35.163925 systemd[1]: Closed iscsid.socket. Dec 13 14:25:35.204347 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:25:35.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.204408 systemd[1]: Closed iscsiuio.socket. Dec 13 14:25:35.206280 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:25:35.206343 systemd[1]: Stopped ignition-setup.service. Dec 13 14:25:35.211871 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:25:35.225126 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:25:35.233342 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:25:35.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.234026 systemd-networkd[803]: eth0: DHCPv6 lease lost Dec 13 14:25:35.234029 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:25:35.234129 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:25:35.238342 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:25:35.238457 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:25:35.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.250605 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:25:35.252969 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:25:35.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.257031 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:25:35.257075 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:25:35.262792 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:25:35.262849 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:25:35.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.270066 systemd[1]: Stopping network-cleanup.service... Dec 13 14:25:35.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.272227 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:25:35.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.279000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:25:35.279000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:25:35.272279 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:25:35.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.273097 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:25:35.273135 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:25:35.277404 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:25:35.277497 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:25:35.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.279921 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:25:35.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.284560 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:25:35.285065 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:25:35.285179 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:25:35.288941 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:25:35.288981 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:25:35.323000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.294345 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:25:35.294385 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:25:35.344751 kernel: hv_netvsc 7c1e5277-680c-7c1e-5277-680c7c1e5277 eth0: Data path switched from VF: enP29269s1 Dec 13 14:25:35.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.299367 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:25:35.299417 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:25:35.303670 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:25:35.303719 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:25:35.305722 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:25:35.305803 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:25:35.310383 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:25:35.321388 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:25:35.321453 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:25:35.325456 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:25:35.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.325498 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:25:35.330426 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:25:35.330477 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:25:35.332877 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:25:35.332973 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:25:35.365597 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:25:35.365690 systemd[1]: Stopped network-cleanup.service. Dec 13 14:25:35.369656 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:25:35.374284 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:25:35.389961 systemd[1]: Switching root. Dec 13 14:25:35.412920 iscsid[812]: iscsid shutting down. Dec 13 14:25:35.414804 systemd-journald[183]: Received SIGTERM from PID 1 (n/a). Dec 13 14:25:35.414867 systemd-journald[183]: Journal stopped Dec 13 14:25:48.998149 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:25:48.998179 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:25:48.998190 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:25:48.998200 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:25:48.998209 kernel: SELinux: policy capability open_perms=1 Dec 13 14:25:48.998217 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:25:48.998228 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:25:48.998239 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:25:48.998250 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:25:48.998260 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:25:48.998269 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:25:48.998277 kernel: kauditd_printk_skb: 42 callbacks suppressed Dec 13 14:25:48.998288 kernel: audit: type=1403 audit(1734099937.781:81): auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:25:48.998301 systemd[1]: Successfully loaded SELinux policy in 271.766ms. Dec 13 14:25:48.998314 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 24.668ms. Dec 13 14:25:48.998327 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:25:48.998337 systemd[1]: Detected virtualization microsoft. Dec 13 14:25:48.998348 systemd[1]: Detected architecture x86-64. Dec 13 14:25:48.998357 systemd[1]: Detected first boot. Dec 13 14:25:48.998371 systemd[1]: Hostname set to . Dec 13 14:25:48.998383 systemd[1]: Initializing machine ID from random generator. Dec 13 14:25:48.998394 kernel: audit: type=1400 audit(1734099938.410:82): avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:25:48.998706 kernel: audit: type=1400 audit(1734099938.470:83): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:25:48.998723 kernel: audit: type=1400 audit(1734099938.470:84): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:25:48.998734 kernel: audit: type=1334 audit(1734099938.495:85): prog-id=10 op=LOAD Dec 13 14:25:48.998747 kernel: audit: type=1334 audit(1734099938.495:86): prog-id=10 op=UNLOAD Dec 13 14:25:48.998757 kernel: audit: type=1334 audit(1734099938.500:87): prog-id=11 op=LOAD Dec 13 14:25:48.998775 kernel: audit: type=1334 audit(1734099938.500:88): prog-id=11 op=UNLOAD Dec 13 14:25:48.998788 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:25:48.998797 kernel: audit: type=1400 audit(1734099939.736:89): avc: denied { associate } for pid=1032 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:25:48.998809 kernel: audit: type=1300 audit(1734099939.736:89): arch=c000003e syscall=188 success=yes exit=0 a0=c0001058d2 a1=c00002ae58 a2=c000029100 a3=32 items=0 ppid=1015 pid=1032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.998822 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:25:48.998834 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:25:48.998845 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:25:48.998858 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:25:48.998869 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:25:48.998877 kernel: audit: type=1334 audit(1734099948.433:91): prog-id=12 op=LOAD Dec 13 14:25:48.998889 kernel: audit: type=1334 audit(1734099948.433:92): prog-id=3 op=UNLOAD Dec 13 14:25:48.998899 kernel: audit: type=1334 audit(1734099948.437:93): prog-id=13 op=LOAD Dec 13 14:25:48.998910 kernel: audit: type=1334 audit(1734099948.442:94): prog-id=14 op=LOAD Dec 13 14:25:48.998923 kernel: audit: type=1334 audit(1734099948.442:95): prog-id=4 op=UNLOAD Dec 13 14:25:48.998937 kernel: audit: type=1334 audit(1734099948.442:96): prog-id=5 op=UNLOAD Dec 13 14:25:48.998947 kernel: audit: type=1334 audit(1734099948.447:97): prog-id=15 op=LOAD Dec 13 14:25:48.998959 kernel: audit: type=1334 audit(1734099948.447:98): prog-id=12 op=UNLOAD Dec 13 14:25:48.998968 kernel: audit: type=1334 audit(1734099948.456:99): prog-id=16 op=LOAD Dec 13 14:25:48.998979 kernel: audit: type=1334 audit(1734099948.465:100): prog-id=17 op=LOAD Dec 13 14:25:48.998988 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:25:48.999000 systemd[1]: Stopped iscsid.service. Dec 13 14:25:48.999014 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:25:48.999024 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:25:48.999033 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:25:48.999046 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:25:48.999058 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:25:48.999068 systemd[1]: Created slice system-getty.slice. Dec 13 14:25:48.999080 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:25:48.999092 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:25:48.999104 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:25:48.999117 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:25:48.999128 systemd[1]: Created slice user.slice. Dec 13 14:25:48.999138 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:25:48.999149 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:25:48.999161 systemd[1]: Set up automount boot.automount. Dec 13 14:25:48.999172 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:25:48.999184 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:25:48.999195 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:25:48.999210 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:25:48.999220 systemd[1]: Reached target integritysetup.target. Dec 13 14:25:48.999232 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:25:48.999244 systemd[1]: Reached target remote-fs.target. Dec 13 14:25:48.999254 systemd[1]: Reached target slices.target. Dec 13 14:25:48.999266 systemd[1]: Reached target swap.target. Dec 13 14:25:48.999278 systemd[1]: Reached target torcx.target. Dec 13 14:25:48.999288 systemd[1]: Reached target veritysetup.target. Dec 13 14:25:48.999299 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:25:48.999312 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:25:48.999324 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:25:48.999334 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:25:48.999349 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:25:48.999361 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:25:48.999371 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:25:48.999382 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:25:48.999393 systemd[1]: Mounting media.mount... Dec 13 14:25:48.999406 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:25:48.999416 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:25:48.999429 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:25:48.999442 systemd[1]: Mounting tmp.mount... Dec 13 14:25:48.999453 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:25:48.999466 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:25:48.999479 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:25:48.999488 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:25:48.999498 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:25:48.999510 systemd[1]: Starting modprobe@drm.service... Dec 13 14:25:48.999522 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:25:48.999532 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:25:48.999543 systemd[1]: Starting modprobe@loop.service... Dec 13 14:25:48.999557 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:25:48.999568 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:25:48.999579 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:25:48.999589 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:25:48.999601 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:25:48.999614 systemd[1]: Stopped systemd-journald.service. Dec 13 14:25:48.999623 kernel: loop: module loaded Dec 13 14:25:48.999635 systemd[1]: Starting systemd-journald.service... Dec 13 14:25:48.999648 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:25:48.999659 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:25:48.999673 kernel: fuse: init (API version 7.34) Dec 13 14:25:48.999685 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:25:48.999695 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:25:48.999707 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:25:48.999718 systemd[1]: Stopped verity-setup.service. Dec 13 14:25:48.999730 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:25:48.999739 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:25:48.999751 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:25:48.999772 systemd[1]: Mounted media.mount. Dec 13 14:25:48.999785 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:25:48.999797 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:25:48.999807 systemd[1]: Mounted tmp.mount. Dec 13 14:25:48.999819 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:25:48.999837 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:25:48.999849 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:25:48.999866 systemd-journald[1134]: Journal started Dec 13 14:25:48.999917 systemd-journald[1134]: Runtime Journal (/run/log/journal/6b5bd8cb63534abd8ff4b69ea08a638d) is 8.0M, max 159.0M, 151.0M free. Dec 13 14:25:37.781000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:25:38.410000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:25:38.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:25:38.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:25:38.495000 audit: BPF prog-id=10 op=LOAD Dec 13 14:25:38.495000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:25:38.500000 audit: BPF prog-id=11 op=LOAD Dec 13 14:25:38.500000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:25:39.736000 audit[1032]: AVC avc: denied { associate } for pid=1032 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:25:39.736000 audit[1032]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001058d2 a1=c00002ae58 a2=c000029100 a3=32 items=0 ppid=1015 pid=1032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:39.736000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:25:39.742000 audit[1032]: AVC avc: denied { associate } for pid=1032 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:25:39.742000 audit[1032]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001059a9 a2=1ed a3=0 items=2 ppid=1015 pid=1032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:39.742000 audit: CWD cwd="/" Dec 13 14:25:39.742000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:39.742000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:39.742000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:25:48.433000 audit: BPF prog-id=12 op=LOAD Dec 13 14:25:48.433000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:25:48.437000 audit: BPF prog-id=13 op=LOAD Dec 13 14:25:48.442000 audit: BPF prog-id=14 op=LOAD Dec 13 14:25:48.442000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:25:48.442000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:25:48.447000 audit: BPF prog-id=15 op=LOAD Dec 13 14:25:48.447000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:25:48.456000 audit: BPF prog-id=16 op=LOAD Dec 13 14:25:48.465000 audit: BPF prog-id=17 op=LOAD Dec 13 14:25:48.465000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:25:48.465000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:25:48.470000 audit: BPF prog-id=18 op=LOAD Dec 13 14:25:48.470000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:25:48.479000 audit: BPF prog-id=19 op=LOAD Dec 13 14:25:48.484000 audit: BPF prog-id=20 op=LOAD Dec 13 14:25:48.484000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:25:48.484000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:25:48.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:48.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:48.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:48.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:48.506000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:25:48.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:48.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:48.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:48.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:48.858000 audit: BPF prog-id=21 op=LOAD Dec 13 14:25:48.858000 audit: BPF prog-id=22 op=LOAD Dec 13 14:25:48.858000 audit: BPF prog-id=23 op=LOAD Dec 13 14:25:48.858000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:25:48.858000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:25:48.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:48.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:48.994000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:25:48.994000 audit[1134]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffcf8551c50 a2=4000 a3=7ffcf8551cec items=0 ppid=1 pid=1134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.994000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:25:48.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:48.432468 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:25:49.001906 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:25:39.707246 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:25:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:25:48.485751 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:25:39.707894 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:25:39Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:25:39.707922 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:25:39Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:25:39.707959 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:25:39Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:25:39.707975 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:25:39Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:25:39.708025 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:25:39Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:25:39.708040 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:25:39Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:25:39.708278 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:25:39Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:25:39.708343 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:25:39Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:25:39.708360 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:25:39Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:25:39.721708 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:25:39Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:25:39.721744 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:25:39Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:25:39.721778 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:25:39Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:25:39.721798 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:25:39Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:25:39.721814 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:25:39Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:25:39.721826 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:25:39Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:25:47.218061 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:25:47Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:25:47.218295 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:25:47Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:25:47.218426 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:25:47Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:25:47.218593 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:25:47Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:25:47.218638 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:25:47Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:25:47.218688 /usr/lib/systemd/system-generators/torcx-generator[1032]: time="2024-12-13T14:25:47Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:25:49.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:49.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:49.011830 systemd[1]: Started systemd-journald.service. Dec 13 14:25:49.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:49.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:49.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:49.014547 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:25:49.014715 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:25:49.017305 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:25:49.017442 systemd[1]: Finished modprobe@drm.service. Dec 13 14:25:49.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:49.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:49.019626 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:25:49.019854 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:25:49.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:49.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:49.022379 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:25:49.022515 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:25:49.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:49.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:49.024693 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:25:49.024841 systemd[1]: Finished modprobe@loop.service. Dec 13 14:25:49.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:49.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:49.027051 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:25:49.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:49.029633 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:25:49.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:49.032476 systemd[1]: Reached target network-pre.target. Dec 13 14:25:49.035747 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:25:49.041120 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:25:49.043181 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:25:49.072432 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:25:49.076121 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:25:49.078567 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:25:49.080019 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:25:49.082245 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:25:49.083792 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:25:49.089959 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:25:49.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:49.092639 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:25:49.094990 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:25:49.098740 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:25:49.103428 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:25:49.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:49.106915 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:25:49.112644 systemd-journald[1134]: Time spent on flushing to /var/log/journal/6b5bd8cb63534abd8ff4b69ea08a638d is 23.222ms for 1139 entries. Dec 13 14:25:49.112644 systemd-journald[1134]: System Journal (/var/log/journal/6b5bd8cb63534abd8ff4b69ea08a638d) is 8.0M, max 2.6G, 2.6G free. Dec 13 14:25:49.208271 systemd-journald[1134]: Received client request to flush runtime journal. Dec 13 14:25:49.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:49.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:49.210572 udevadm[1156]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:25:49.145310 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:25:49.147995 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:25:49.164069 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:25:49.209383 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:25:49.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:49.759557 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:25:49.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:49.763517 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:25:50.071635 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:25:50.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:50.719960 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:25:50.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:50.722000 audit: BPF prog-id=24 op=LOAD Dec 13 14:25:50.722000 audit: BPF prog-id=25 op=LOAD Dec 13 14:25:50.722000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:25:50.722000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:25:50.723578 systemd[1]: Starting systemd-udevd.service... Dec 13 14:25:50.742074 systemd-udevd[1161]: Using default interface naming scheme 'v252'. Dec 13 14:25:50.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:50.928000 audit: BPF prog-id=26 op=LOAD Dec 13 14:25:50.925785 systemd[1]: Started systemd-udevd.service. Dec 13 14:25:50.930392 systemd[1]: Starting systemd-networkd.service... Dec 13 14:25:50.976244 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:25:51.059000 audit: BPF prog-id=27 op=LOAD Dec 13 14:25:51.059000 audit: BPF prog-id=28 op=LOAD Dec 13 14:25:51.060000 audit: BPF prog-id=29 op=LOAD Dec 13 14:25:51.061665 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:25:51.075787 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:25:51.093000 audit[1181]: AVC avc: denied { confidentiality } for pid=1181 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:25:51.099793 kernel: hv_vmbus: registering driver hv_balloon Dec 13 14:25:51.104794 kernel: hv_vmbus: registering driver hyperv_fb Dec 13 14:25:51.113802 kernel: hv_utils: Registering HyperV Utility Driver Dec 13 14:25:51.113899 kernel: hv_vmbus: registering driver hv_utils Dec 13 14:25:51.126489 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Dec 13 14:25:51.126578 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Dec 13 14:25:51.126604 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Dec 13 14:25:51.126626 kernel: hv_utils: Heartbeat IC version 3.0 Dec 13 14:25:51.132574 kernel: hv_utils: Shutdown IC version 3.2 Dec 13 14:25:51.137198 systemd[1]: Started systemd-userdbd.service. Dec 13 14:25:51.137845 kernel: hv_utils: TimeSync IC version 4.0 Dec 13 14:25:51.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:52.109984 kernel: Console: switching to colour dummy device 80x25 Dec 13 14:25:52.115749 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 14:25:51.093000 audit[1181]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5643c3989a70 a1=f884 a2=7f9f5bb42bc5 a3=5 items=12 ppid=1161 pid=1181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:51.093000 audit: CWD cwd="/" Dec 13 14:25:51.093000 audit: PATH item=0 name=(null) inode=1237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:51.093000 audit: PATH item=1 name=(null) inode=13124 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:51.093000 audit: PATH item=2 name=(null) inode=13124 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:51.093000 audit: PATH item=3 name=(null) inode=13125 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:51.093000 audit: PATH item=4 name=(null) inode=13124 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:51.093000 audit: PATH item=5 name=(null) inode=13126 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:51.093000 audit: PATH item=6 name=(null) inode=13124 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:51.093000 audit: PATH item=7 name=(null) inode=13127 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:51.093000 audit: PATH item=8 name=(null) inode=13124 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:51.093000 audit: PATH item=9 name=(null) inode=13128 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:51.093000 audit: PATH item=10 name=(null) inode=13124 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:51.093000 audit: PATH item=11 name=(null) inode=13129 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:25:51.093000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:25:52.272625 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1180) Dec 13 14:25:52.329802 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Dec 13 14:25:52.345016 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:25:52.403221 systemd-networkd[1174]: lo: Link UP Dec 13 14:25:52.403574 systemd-networkd[1174]: lo: Gained carrier Dec 13 14:25:52.404102 systemd-networkd[1174]: Enumeration completed Dec 13 14:25:52.404219 systemd[1]: Started systemd-networkd.service. Dec 13 14:25:52.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:52.408182 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:25:52.410864 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:25:52.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:52.414289 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:25:52.433181 systemd-networkd[1174]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:25:52.484649 kernel: mlx5_core 7255:00:02.0 enP29269s1: Link up Dec 13 14:25:52.505660 kernel: hv_netvsc 7c1e5277-680c-7c1e-5277-680c7c1e5277 eth0: Data path switched to VF: enP29269s1 Dec 13 14:25:52.506613 systemd-networkd[1174]: enP29269s1: Link UP Dec 13 14:25:52.507118 systemd-networkd[1174]: eth0: Link UP Dec 13 14:25:52.507207 systemd-networkd[1174]: eth0: Gained carrier Dec 13 14:25:52.512923 systemd-networkd[1174]: enP29269s1: Gained carrier Dec 13 14:25:52.536771 systemd-networkd[1174]: eth0: DHCPv4 address 10.200.8.14/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 14:25:52.718532 lvm[1239]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:25:52.744731 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:25:52.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:52.750448 systemd[1]: Reached target cryptsetup.target. Dec 13 14:25:52.754355 systemd[1]: Starting lvm2-activation.service... Dec 13 14:25:52.760322 lvm[1240]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:25:52.780657 systemd[1]: Finished lvm2-activation.service. Dec 13 14:25:52.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:52.783197 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:25:52.785207 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:25:52.785239 systemd[1]: Reached target local-fs.target. Dec 13 14:25:52.787179 systemd[1]: Reached target machines.target. Dec 13 14:25:52.790403 systemd[1]: Starting ldconfig.service... Dec 13 14:25:52.792684 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:25:52.792783 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:25:52.793902 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:25:52.797154 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:25:52.800915 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:25:52.803280 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Dec 13 14:25:52.803385 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Dec 13 14:25:52.804537 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:25:52.817263 systemd-tmpfiles[1245]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:25:52.831363 systemd-tmpfiles[1245]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:25:52.837398 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1242 (bootctl) Dec 13 14:25:52.839027 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:25:52.853218 systemd-tmpfiles[1245]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:25:52.866189 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:25:52.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:52.970920 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:25:52.971553 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:25:52.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:53.595911 systemd-fsck[1250]: fsck.fat 4.2 (2021-01-31) Dec 13 14:25:53.595911 systemd-fsck[1250]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 14:25:53.598169 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:25:53.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:53.602694 systemd[1]: Mounting boot.mount... Dec 13 14:25:53.617900 systemd[1]: Mounted boot.mount. Dec 13 14:25:53.632366 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:25:53.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:54.122840 systemd-networkd[1174]: eth0: Gained IPv6LL Dec 13 14:25:54.128523 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:25:54.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:54.419462 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:25:54.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:54.423278 systemd[1]: Starting audit-rules.service... Dec 13 14:25:54.424448 kernel: kauditd_printk_skb: 86 callbacks suppressed Dec 13 14:25:54.424506 kernel: audit: type=1130 audit(1734099954.421:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:54.439532 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:25:54.443096 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:25:54.451626 kernel: audit: type=1334 audit(1734099954.446:171): prog-id=30 op=LOAD Dec 13 14:25:54.446000 audit: BPF prog-id=30 op=LOAD Dec 13 14:25:54.451048 systemd[1]: Starting systemd-resolved.service... Dec 13 14:25:54.458845 kernel: audit: type=1334 audit(1734099954.452:172): prog-id=31 op=LOAD Dec 13 14:25:54.452000 audit: BPF prog-id=31 op=LOAD Dec 13 14:25:54.457880 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:25:54.461087 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:25:54.468000 audit[1266]: SYSTEM_BOOT pid=1266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:25:54.474989 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:25:54.480901 kernel: audit: type=1127 audit(1734099954.468:173): pid=1266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:25:54.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:54.493622 kernel: audit: type=1130 audit(1734099954.481:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:54.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:54.527676 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:25:54.530170 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:25:54.541715 kernel: audit: type=1130 audit(1734099954.529:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:54.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:54.558165 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:25:54.572658 kernel: audit: type=1130 audit(1734099954.560:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:54.598376 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:25:54.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:54.601209 systemd[1]: Reached target time-set.target. Dec 13 14:25:54.615498 kernel: audit: type=1130 audit(1734099954.600:177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:54.670185 systemd-resolved[1263]: Positive Trust Anchors: Dec 13 14:25:54.670206 systemd-resolved[1263]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:25:54.670245 systemd-resolved[1263]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:25:54.765000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:25:54.766949 systemd[1]: Finished audit-rules.service. Dec 13 14:25:54.767908 augenrules[1278]: No rules Dec 13 14:25:54.774741 kernel: audit: type=1305 audit(1734099954.765:178): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:25:54.774834 kernel: audit: type=1300 audit(1734099954.765:178): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffce1e0ed60 a2=420 a3=0 items=0 ppid=1257 pid=1278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:54.765000 audit[1278]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffce1e0ed60 a2=420 a3=0 items=0 ppid=1257 pid=1278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:54.765000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:25:54.775247 systemd-timesyncd[1265]: Contacted time server 188.125.64.7:123 (0.flatcar.pool.ntp.org). Dec 13 14:25:54.775310 systemd-timesyncd[1265]: Initial clock synchronization to Fri 2024-12-13 14:25:54.773739 UTC. Dec 13 14:25:54.819813 systemd-resolved[1263]: Using system hostname 'ci-3510.3.6-a-178cfdfca8'. Dec 13 14:25:54.821707 systemd[1]: Started systemd-resolved.service. Dec 13 14:25:54.824348 systemd[1]: Reached target network.target. Dec 13 14:25:54.826272 systemd[1]: Reached target network-online.target. Dec 13 14:25:54.828536 systemd[1]: Reached target nss-lookup.target. Dec 13 14:26:00.626888 ldconfig[1241]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:26:00.636780 systemd[1]: Finished ldconfig.service. Dec 13 14:26:00.640218 systemd[1]: Starting systemd-update-done.service... Dec 13 14:26:00.648878 systemd[1]: Finished systemd-update-done.service. Dec 13 14:26:00.651581 systemd[1]: Reached target sysinit.target. Dec 13 14:26:00.653717 systemd[1]: Started motdgen.path. Dec 13 14:26:00.655901 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:26:00.658740 systemd[1]: Started logrotate.timer. Dec 13 14:26:00.660544 systemd[1]: Started mdadm.timer. Dec 13 14:26:00.662166 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:26:00.664320 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:26:00.664364 systemd[1]: Reached target paths.target. Dec 13 14:26:00.666188 systemd[1]: Reached target timers.target. Dec 13 14:26:00.679650 systemd[1]: Listening on dbus.socket. Dec 13 14:26:00.682692 systemd[1]: Starting docker.socket... Dec 13 14:26:00.686566 systemd[1]: Listening on sshd.socket. Dec 13 14:26:00.688950 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:26:00.689419 systemd[1]: Listening on docker.socket. Dec 13 14:26:00.691425 systemd[1]: Reached target sockets.target. Dec 13 14:26:00.693437 systemd[1]: Reached target basic.target. Dec 13 14:26:00.695435 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:26:00.695480 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:26:00.696511 systemd[1]: Starting containerd.service... Dec 13 14:26:00.699484 systemd[1]: Starting dbus.service... Dec 13 14:26:00.702061 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:26:00.705357 systemd[1]: Starting extend-filesystems.service... Dec 13 14:26:00.707492 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:26:00.708783 systemd[1]: Starting motdgen.service... Dec 13 14:26:00.712880 systemd[1]: Started nvidia.service. Dec 13 14:26:00.716403 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:26:00.719820 systemd[1]: Starting sshd-keygen.service... Dec 13 14:26:00.724677 systemd[1]: Starting systemd-logind.service... Dec 13 14:26:00.727944 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:26:00.728032 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:26:00.728411 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:26:00.729284 systemd[1]: Starting update-engine.service... Dec 13 14:26:00.732513 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:26:00.739884 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:26:00.741696 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:26:00.773693 extend-filesystems[1289]: Found sda Dec 13 14:26:00.776593 extend-filesystems[1289]: Found sda1 Dec 13 14:26:00.776593 extend-filesystems[1289]: Found sda2 Dec 13 14:26:00.776593 extend-filesystems[1289]: Found sda3 Dec 13 14:26:00.776593 extend-filesystems[1289]: Found usr Dec 13 14:26:00.776593 extend-filesystems[1289]: Found sda4 Dec 13 14:26:00.776593 extend-filesystems[1289]: Found sda6 Dec 13 14:26:00.776593 extend-filesystems[1289]: Found sda7 Dec 13 14:26:00.776593 extend-filesystems[1289]: Found sda9 Dec 13 14:26:00.776593 extend-filesystems[1289]: Checking size of /dev/sda9 Dec 13 14:26:00.790737 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:26:00.818196 jq[1288]: false Dec 13 14:26:00.818334 jq[1300]: true Dec 13 14:26:00.790926 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:26:00.805461 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:26:00.818900 jq[1313]: true Dec 13 14:26:00.805646 systemd[1]: Finished motdgen.service. Dec 13 14:26:00.840616 env[1308]: time="2024-12-13T14:26:00.840549809Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:26:00.860539 extend-filesystems[1289]: Old size kept for /dev/sda9 Dec 13 14:26:00.864992 extend-filesystems[1289]: Found sr0 Dec 13 14:26:00.861068 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:26:00.861236 systemd[1]: Finished extend-filesystems.service. Dec 13 14:26:00.875519 systemd-logind[1297]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:26:00.877597 systemd-logind[1297]: New seat seat0. Dec 13 14:26:00.899485 env[1308]: time="2024-12-13T14:26:00.899436586Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:26:00.899951 env[1308]: time="2024-12-13T14:26:00.899926155Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:26:00.901424 env[1308]: time="2024-12-13T14:26:00.901387663Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:26:00.902169 env[1308]: time="2024-12-13T14:26:00.902143715Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:26:00.902567 env[1308]: time="2024-12-13T14:26:00.902538290Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:26:00.902699 env[1308]: time="2024-12-13T14:26:00.902681281Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:26:00.902788 env[1308]: time="2024-12-13T14:26:00.902769575Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:26:00.902860 env[1308]: time="2024-12-13T14:26:00.902843670Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:26:00.903022 env[1308]: time="2024-12-13T14:26:00.903001760Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:26:00.903390 env[1308]: time="2024-12-13T14:26:00.903367837Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:26:00.903762 env[1308]: time="2024-12-13T14:26:00.903734114Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:26:00.903865 env[1308]: time="2024-12-13T14:26:00.903849607Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:26:00.903996 env[1308]: time="2024-12-13T14:26:00.903976699Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:26:00.904081 env[1308]: time="2024-12-13T14:26:00.904066993Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:26:00.922637 env[1308]: time="2024-12-13T14:26:00.922581323Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:26:00.922734 env[1308]: time="2024-12-13T14:26:00.922648118Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:26:00.922734 env[1308]: time="2024-12-13T14:26:00.922667717Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:26:00.922734 env[1308]: time="2024-12-13T14:26:00.922704715Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:26:00.922734 env[1308]: time="2024-12-13T14:26:00.922723414Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:26:00.922893 env[1308]: time="2024-12-13T14:26:00.922740913Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:26:00.922893 env[1308]: time="2024-12-13T14:26:00.922758411Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:26:00.922893 env[1308]: time="2024-12-13T14:26:00.922776910Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:26:00.922893 env[1308]: time="2024-12-13T14:26:00.922795909Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:26:00.922893 env[1308]: time="2024-12-13T14:26:00.922814708Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:26:00.922893 env[1308]: time="2024-12-13T14:26:00.922835007Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:26:00.922893 env[1308]: time="2024-12-13T14:26:00.922853105Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:26:00.923126 env[1308]: time="2024-12-13T14:26:00.922973198Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:26:00.923126 env[1308]: time="2024-12-13T14:26:00.923066392Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:26:00.923435 env[1308]: time="2024-12-13T14:26:00.923410870Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:26:00.923487 env[1308]: time="2024-12-13T14:26:00.923453867Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:26:00.923487 env[1308]: time="2024-12-13T14:26:00.923474466Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:26:00.923553 env[1308]: time="2024-12-13T14:26:00.923530963Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:26:00.923593 env[1308]: time="2024-12-13T14:26:00.923549961Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:26:00.923593 env[1308]: time="2024-12-13T14:26:00.923567260Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:26:00.923593 env[1308]: time="2024-12-13T14:26:00.923584459Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:26:00.924886 env[1308]: time="2024-12-13T14:26:00.924856879Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:26:00.925010 env[1308]: time="2024-12-13T14:26:00.924994070Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:26:00.925099 env[1308]: time="2024-12-13T14:26:00.925086064Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:26:00.925172 env[1308]: time="2024-12-13T14:26:00.925158960Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:26:00.925258 env[1308]: time="2024-12-13T14:26:00.925244754Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:26:00.927813 env[1308]: time="2024-12-13T14:26:00.927789893Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:26:00.928157 env[1308]: time="2024-12-13T14:26:00.928137271Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:26:00.928879 env[1308]: time="2024-12-13T14:26:00.928860626Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:26:00.929789 env[1308]: time="2024-12-13T14:26:00.929767368Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:26:00.930049 env[1308]: time="2024-12-13T14:26:00.930024252Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:26:00.930531 env[1308]: time="2024-12-13T14:26:00.930512921Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:26:00.931299 env[1308]: time="2024-12-13T14:26:00.931276773Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:26:00.931441 env[1308]: time="2024-12-13T14:26:00.931425264Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:26:00.931895 env[1308]: time="2024-12-13T14:26:00.931820639Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:26:00.965208 env[1308]: time="2024-12-13T14:26:00.932047124Z" level=info msg="Connect containerd service" Dec 13 14:26:00.965208 env[1308]: time="2024-12-13T14:26:00.932186615Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:26:00.965208 env[1308]: time="2024-12-13T14:26:00.933031262Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:26:00.965208 env[1308]: time="2024-12-13T14:26:00.933329743Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:26:00.965208 env[1308]: time="2024-12-13T14:26:00.933376540Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:26:00.965208 env[1308]: time="2024-12-13T14:26:00.933434537Z" level=info msg="containerd successfully booted in 0.094910s" Dec 13 14:26:00.965208 env[1308]: time="2024-12-13T14:26:00.934723555Z" level=info msg="Start subscribing containerd event" Dec 13 14:26:00.965208 env[1308]: time="2024-12-13T14:26:00.934765152Z" level=info msg="Start recovering state" Dec 13 14:26:00.965208 env[1308]: time="2024-12-13T14:26:00.934832348Z" level=info msg="Start event monitor" Dec 13 14:26:00.965208 env[1308]: time="2024-12-13T14:26:00.934842248Z" level=info msg="Start snapshots syncer" Dec 13 14:26:00.965208 env[1308]: time="2024-12-13T14:26:00.934861846Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:26:00.965208 env[1308]: time="2024-12-13T14:26:00.934869046Z" level=info msg="Start streaming server" Dec 13 14:26:00.965752 bash[1338]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:26:00.933519 systemd[1]: Started containerd.service. Dec 13 14:26:00.961168 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:26:01.048827 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 14:26:01.082661 dbus-daemon[1287]: [system] SELinux support is enabled Dec 13 14:26:01.082856 systemd[1]: Started dbus.service. Dec 13 14:26:01.087452 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:26:01.087485 systemd[1]: Reached target system-config.target. Dec 13 14:26:01.089694 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:26:01.089727 systemd[1]: Reached target user-config.target. Dec 13 14:26:01.094453 systemd[1]: Started systemd-logind.service. Dec 13 14:26:01.095591 dbus-daemon[1287]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 14:26:01.669277 update_engine[1299]: I1213 14:26:01.668624 1299 main.cc:92] Flatcar Update Engine starting Dec 13 14:26:01.720924 update_engine[1299]: I1213 14:26:01.720889 1299 update_check_scheduler.cc:74] Next update check in 4m44s Dec 13 14:26:01.721138 systemd[1]: Started update-engine.service. Dec 13 14:26:01.725872 systemd[1]: Started locksmithd.service. Dec 13 14:26:02.427574 sshd_keygen[1305]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:26:02.447403 systemd[1]: Finished sshd-keygen.service. Dec 13 14:26:02.451895 systemd[1]: Starting issuegen.service... Dec 13 14:26:02.455478 systemd[1]: Started waagent.service. Dec 13 14:26:02.459191 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:26:02.459405 systemd[1]: Finished issuegen.service. Dec 13 14:26:02.463280 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:26:02.489234 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:26:02.493380 systemd[1]: Started getty@tty1.service. Dec 13 14:26:02.496783 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:26:02.499049 systemd[1]: Reached target getty.target. Dec 13 14:26:02.501090 systemd[1]: Reached target multi-user.target. Dec 13 14:26:02.504469 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:26:02.516625 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:26:02.516822 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:26:02.521290 systemd[1]: Startup finished in 955ms (firmware) + 27.809s (loader) + 908ms (kernel) + 12.556s (initrd) + 24.286s (userspace) = 1min 6.516s. Dec 13 14:26:02.880743 login[1405]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:26:02.882227 login[1406]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:26:02.908092 systemd[1]: Created slice user-500.slice. Dec 13 14:26:02.909567 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:26:02.912427 systemd-logind[1297]: New session 2 of user core. Dec 13 14:26:02.915655 systemd-logind[1297]: New session 1 of user core. Dec 13 14:26:02.946744 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:26:02.948760 systemd[1]: Starting user@500.service... Dec 13 14:26:02.965055 (systemd)[1409]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:26:03.070582 locksmithd[1387]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:26:03.141241 systemd[1409]: Queued start job for default target default.target. Dec 13 14:26:03.141859 systemd[1409]: Reached target paths.target. Dec 13 14:26:03.141887 systemd[1409]: Reached target sockets.target. Dec 13 14:26:03.141903 systemd[1409]: Reached target timers.target. Dec 13 14:26:03.141918 systemd[1409]: Reached target basic.target. Dec 13 14:26:03.142040 systemd[1]: Started user@500.service. Dec 13 14:26:03.143256 systemd[1]: Started session-1.scope. Dec 13 14:26:03.144083 systemd[1]: Started session-2.scope. Dec 13 14:26:03.145009 systemd[1409]: Reached target default.target. Dec 13 14:26:03.145192 systemd[1409]: Startup finished in 174ms. Dec 13 14:26:07.753093 waagent[1400]: 2024-12-13T14:26:07.752974Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Dec 13 14:26:07.757119 waagent[1400]: 2024-12-13T14:26:07.757038Z INFO Daemon Daemon OS: flatcar 3510.3.6 Dec 13 14:26:07.759508 waagent[1400]: 2024-12-13T14:26:07.759440Z INFO Daemon Daemon Python: 3.9.16 Dec 13 14:26:07.762011 waagent[1400]: 2024-12-13T14:26:07.761938Z INFO Daemon Daemon Run daemon Dec 13 14:26:07.764352 waagent[1400]: 2024-12-13T14:26:07.764291Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.6' Dec 13 14:26:07.776792 waagent[1400]: 2024-12-13T14:26:07.776682Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 14:26:07.783559 waagent[1400]: 2024-12-13T14:26:07.783453Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 14:26:07.812233 waagent[1400]: 2024-12-13T14:26:07.783864Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 14:26:07.812233 waagent[1400]: 2024-12-13T14:26:07.784786Z INFO Daemon Daemon Using waagent for provisioning Dec 13 14:26:07.812233 waagent[1400]: 2024-12-13T14:26:07.786170Z INFO Daemon Daemon Activate resource disk Dec 13 14:26:07.812233 waagent[1400]: 2024-12-13T14:26:07.787316Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Dec 13 14:26:07.812233 waagent[1400]: 2024-12-13T14:26:07.795241Z INFO Daemon Daemon Found device: None Dec 13 14:26:07.812233 waagent[1400]: 2024-12-13T14:26:07.795965Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Dec 13 14:26:07.812233 waagent[1400]: 2024-12-13T14:26:07.796806Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Dec 13 14:26:07.812233 waagent[1400]: 2024-12-13T14:26:07.798516Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 14:26:07.812233 waagent[1400]: 2024-12-13T14:26:07.799499Z INFO Daemon Daemon Running default provisioning handler Dec 13 14:26:07.814949 waagent[1400]: 2024-12-13T14:26:07.814819Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 14:26:07.822033 waagent[1400]: 2024-12-13T14:26:07.821915Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 14:26:07.830503 waagent[1400]: 2024-12-13T14:26:07.822337Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 14:26:07.830503 waagent[1400]: 2024-12-13T14:26:07.823301Z INFO Daemon Daemon Copying ovf-env.xml Dec 13 14:26:07.920882 waagent[1400]: 2024-12-13T14:26:07.920719Z INFO Daemon Daemon Successfully mounted dvd Dec 13 14:26:08.023545 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Dec 13 14:26:08.045506 waagent[1400]: 2024-12-13T14:26:08.045366Z INFO Daemon Daemon Detect protocol endpoint Dec 13 14:26:08.062716 waagent[1400]: 2024-12-13T14:26:08.045904Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 14:26:08.062716 waagent[1400]: 2024-12-13T14:26:08.046929Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Dec 13 14:26:08.062716 waagent[1400]: 2024-12-13T14:26:08.047890Z INFO Daemon Daemon Test for route to 168.63.129.16 Dec 13 14:26:08.062716 waagent[1400]: 2024-12-13T14:26:08.049065Z INFO Daemon Daemon Route to 168.63.129.16 exists Dec 13 14:26:08.062716 waagent[1400]: 2024-12-13T14:26:08.049958Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Dec 13 14:26:08.150175 waagent[1400]: 2024-12-13T14:26:08.150098Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Dec 13 14:26:08.154551 waagent[1400]: 2024-12-13T14:26:08.154501Z INFO Daemon Daemon Wire protocol version:2012-11-30 Dec 13 14:26:08.157710 waagent[1400]: 2024-12-13T14:26:08.157647Z INFO Daemon Daemon Server preferred version:2015-04-05 Dec 13 14:26:08.669015 waagent[1400]: 2024-12-13T14:26:08.668870Z INFO Daemon Daemon Initializing goal state during protocol detection Dec 13 14:26:08.680788 waagent[1400]: 2024-12-13T14:26:08.680706Z INFO Daemon Daemon Forcing an update of the goal state.. Dec 13 14:26:08.683906 waagent[1400]: 2024-12-13T14:26:08.683841Z INFO Daemon Daemon Fetching goal state [incarnation 1] Dec 13 14:26:08.764318 waagent[1400]: 2024-12-13T14:26:08.764191Z INFO Daemon Daemon Found private key matching thumbprint 0AED150F06584267DD3DF2C40844763E6F3CB5CA Dec 13 14:26:08.775085 waagent[1400]: 2024-12-13T14:26:08.764769Z INFO Daemon Daemon Certificate with thumbprint 4453381BD5891BF42AF6BEDDC4BBE0EE4DAC5976 has no matching private key. Dec 13 14:26:08.775085 waagent[1400]: 2024-12-13T14:26:08.765839Z INFO Daemon Daemon Fetch goal state completed Dec 13 14:26:08.816775 waagent[1400]: 2024-12-13T14:26:08.816676Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 0913ec0e-a10a-4c64-b0c2-7f072c43b63b New eTag: 13747882023540553921] Dec 13 14:26:08.825092 waagent[1400]: 2024-12-13T14:26:08.817718Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 14:26:08.829909 waagent[1400]: 2024-12-13T14:26:08.829854Z INFO Daemon Daemon Starting provisioning Dec 13 14:26:08.837616 waagent[1400]: 2024-12-13T14:26:08.830242Z INFO Daemon Daemon Handle ovf-env.xml. Dec 13 14:26:08.837616 waagent[1400]: 2024-12-13T14:26:08.831168Z INFO Daemon Daemon Set hostname [ci-3510.3.6-a-178cfdfca8] Dec 13 14:26:08.851564 waagent[1400]: 2024-12-13T14:26:08.851433Z INFO Daemon Daemon Publish hostname [ci-3510.3.6-a-178cfdfca8] Dec 13 14:26:08.859326 waagent[1400]: 2024-12-13T14:26:08.852156Z INFO Daemon Daemon Examine /proc/net/route for primary interface Dec 13 14:26:08.859326 waagent[1400]: 2024-12-13T14:26:08.853243Z INFO Daemon Daemon Primary interface is [eth0] Dec 13 14:26:08.866637 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Dec 13 14:26:08.866906 systemd[1]: Stopped systemd-networkd-wait-online.service. Dec 13 14:26:08.866983 systemd[1]: Stopping systemd-networkd-wait-online.service... Dec 13 14:26:08.867342 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:26:08.870651 systemd-networkd[1174]: eth0: DHCPv6 lease lost Dec 13 14:26:08.872224 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:26:08.872424 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:26:08.874935 systemd[1]: Starting systemd-networkd.service... Dec 13 14:26:08.905139 systemd-networkd[1452]: enP29269s1: Link UP Dec 13 14:26:08.905148 systemd-networkd[1452]: enP29269s1: Gained carrier Dec 13 14:26:08.906430 systemd-networkd[1452]: eth0: Link UP Dec 13 14:26:08.906439 systemd-networkd[1452]: eth0: Gained carrier Dec 13 14:26:08.906888 systemd-networkd[1452]: lo: Link UP Dec 13 14:26:08.906897 systemd-networkd[1452]: lo: Gained carrier Dec 13 14:26:08.907206 systemd-networkd[1452]: eth0: Gained IPv6LL Dec 13 14:26:08.907472 systemd-networkd[1452]: Enumeration completed Dec 13 14:26:08.907578 systemd[1]: Started systemd-networkd.service. Dec 13 14:26:08.909880 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:26:08.914857 waagent[1400]: 2024-12-13T14:26:08.911585Z INFO Daemon Daemon Create user account if not exists Dec 13 14:26:08.919128 waagent[1400]: 2024-12-13T14:26:08.915826Z INFO Daemon Daemon User core already exists, skip useradd Dec 13 14:26:08.916360 systemd-networkd[1452]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:26:08.919530 waagent[1400]: 2024-12-13T14:26:08.919394Z INFO Daemon Daemon Configure sudoer Dec 13 14:26:08.925171 waagent[1400]: 2024-12-13T14:26:08.920227Z INFO Daemon Daemon Configure sshd Dec 13 14:26:08.925171 waagent[1400]: 2024-12-13T14:26:08.921445Z INFO Daemon Daemon Deploy ssh public key. Dec 13 14:26:08.994686 systemd-networkd[1452]: eth0: DHCPv4 address 10.200.8.14/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 14:26:08.997809 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:26:39.060325 waagent[1400]: 2024-12-13T14:26:39.060214Z INFO Daemon Daemon Provisioning complete Dec 13 14:26:39.076345 waagent[1400]: 2024-12-13T14:26:39.076262Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Dec 13 14:26:39.080221 waagent[1400]: 2024-12-13T14:26:39.080148Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Dec 13 14:26:39.085578 waagent[1400]: 2024-12-13T14:26:39.085508Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Dec 13 14:26:39.350381 waagent[1465]: 2024-12-13T14:26:39.350208Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Dec 13 14:26:39.351120 waagent[1465]: 2024-12-13T14:26:39.351054Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:26:39.351265 waagent[1465]: 2024-12-13T14:26:39.351211Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:26:39.362636 waagent[1465]: 2024-12-13T14:26:39.362560Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Dec 13 14:26:39.362829 waagent[1465]: 2024-12-13T14:26:39.362771Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Dec 13 14:26:39.423337 waagent[1465]: 2024-12-13T14:26:39.423212Z INFO ExtHandler ExtHandler Found private key matching thumbprint 0AED150F06584267DD3DF2C40844763E6F3CB5CA Dec 13 14:26:39.423564 waagent[1465]: 2024-12-13T14:26:39.423501Z INFO ExtHandler ExtHandler Certificate with thumbprint 4453381BD5891BF42AF6BEDDC4BBE0EE4DAC5976 has no matching private key. Dec 13 14:26:39.423820 waagent[1465]: 2024-12-13T14:26:39.423768Z INFO ExtHandler ExtHandler Fetch goal state completed Dec 13 14:26:39.442295 waagent[1465]: 2024-12-13T14:26:39.442226Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 53a3bd70-15f2-4282-ba58-bec54733297f New eTag: 13747882023540553921] Dec 13 14:26:39.442857 waagent[1465]: 2024-12-13T14:26:39.442798Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 14:26:39.509280 waagent[1465]: 2024-12-13T14:26:39.509124Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 14:26:39.520464 waagent[1465]: 2024-12-13T14:26:39.520377Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1465 Dec 13 14:26:39.523857 waagent[1465]: 2024-12-13T14:26:39.523790Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 14:26:39.525082 waagent[1465]: 2024-12-13T14:26:39.525023Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 14:26:39.644303 waagent[1465]: 2024-12-13T14:26:39.644163Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 14:26:39.644737 waagent[1465]: 2024-12-13T14:26:39.644675Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 14:26:39.652558 waagent[1465]: 2024-12-13T14:26:39.652502Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 14:26:39.653047 waagent[1465]: 2024-12-13T14:26:39.652988Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 14:26:39.654111 waagent[1465]: 2024-12-13T14:26:39.654050Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Dec 13 14:26:39.655378 waagent[1465]: 2024-12-13T14:26:39.655320Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 14:26:39.655964 waagent[1465]: 2024-12-13T14:26:39.655910Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:26:39.656121 waagent[1465]: 2024-12-13T14:26:39.656074Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:26:39.656650 waagent[1465]: 2024-12-13T14:26:39.656580Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 14:26:39.656941 waagent[1465]: 2024-12-13T14:26:39.656883Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 14:26:39.656941 waagent[1465]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 14:26:39.656941 waagent[1465]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 14:26:39.656941 waagent[1465]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 14:26:39.656941 waagent[1465]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:26:39.656941 waagent[1465]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:26:39.656941 waagent[1465]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:26:39.660047 waagent[1465]: 2024-12-13T14:26:39.659837Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 14:26:39.660831 waagent[1465]: 2024-12-13T14:26:39.660773Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:26:39.661021 waagent[1465]: 2024-12-13T14:26:39.660970Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:26:39.661675 waagent[1465]: 2024-12-13T14:26:39.661586Z INFO EnvHandler ExtHandler Configure routes Dec 13 14:26:39.661893 waagent[1465]: 2024-12-13T14:26:39.661833Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 14:26:39.662136 waagent[1465]: 2024-12-13T14:26:39.662062Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 14:26:39.662661 waagent[1465]: 2024-12-13T14:26:39.662593Z INFO EnvHandler ExtHandler Gateway:None Dec 13 14:26:39.663223 waagent[1465]: 2024-12-13T14:26:39.663163Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 14:26:39.663342 waagent[1465]: 2024-12-13T14:26:39.663285Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 14:26:39.663880 waagent[1465]: 2024-12-13T14:26:39.663827Z INFO EnvHandler ExtHandler Routes:None Dec 13 14:26:39.665582 waagent[1465]: 2024-12-13T14:26:39.665529Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 14:26:39.676380 waagent[1465]: 2024-12-13T14:26:39.676325Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Dec 13 14:26:39.677136 waagent[1465]: 2024-12-13T14:26:39.677083Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 14:26:39.678247 waagent[1465]: 2024-12-13T14:26:39.678191Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Dec 13 14:26:39.719534 waagent[1465]: 2024-12-13T14:26:39.719423Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1452' Dec 13 14:26:39.743524 waagent[1465]: 2024-12-13T14:26:39.743441Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Dec 13 14:26:39.823793 waagent[1465]: 2024-12-13T14:26:39.822462Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 14:26:39.823793 waagent[1465]: Executing ['ip', '-a', '-o', 'link']: Dec 13 14:26:39.823793 waagent[1465]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 14:26:39.823793 waagent[1465]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:77:68:0c brd ff:ff:ff:ff:ff:ff Dec 13 14:26:39.823793 waagent[1465]: 3: enP29269s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:77:68:0c brd ff:ff:ff:ff:ff:ff\ altname enP29269p0s2 Dec 13 14:26:39.823793 waagent[1465]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 14:26:39.823793 waagent[1465]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 14:26:39.823793 waagent[1465]: 2: eth0 inet 10.200.8.14/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 14:26:39.823793 waagent[1465]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 14:26:39.823793 waagent[1465]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 14:26:39.823793 waagent[1465]: 2: eth0 inet6 fe80::7e1e:52ff:fe77:680c/64 scope link \ valid_lft forever preferred_lft forever Dec 13 14:26:40.004283 waagent[1465]: 2024-12-13T14:26:40.004214Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.12.0.2 -- exiting Dec 13 14:26:40.089004 waagent[1400]: 2024-12-13T14:26:40.088853Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Dec 13 14:26:40.095283 waagent[1400]: 2024-12-13T14:26:40.095206Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.12.0.2 to be the latest agent Dec 13 14:26:40.258885 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Dec 13 14:26:41.144240 waagent[1494]: 2024-12-13T14:26:41.144131Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.12.0.2) Dec 13 14:26:41.144972 waagent[1494]: 2024-12-13T14:26:41.144904Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.6 Dec 13 14:26:41.145117 waagent[1494]: 2024-12-13T14:26:41.145065Z INFO ExtHandler ExtHandler Python: 3.9.16 Dec 13 14:26:41.145261 waagent[1494]: 2024-12-13T14:26:41.145216Z INFO ExtHandler ExtHandler CPU Arch: x86_64 Dec 13 14:26:41.154709 waagent[1494]: 2024-12-13T14:26:41.154591Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 14:26:41.155091 waagent[1494]: 2024-12-13T14:26:41.155035Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:26:41.155250 waagent[1494]: 2024-12-13T14:26:41.155203Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:26:41.167141 waagent[1494]: 2024-12-13T14:26:41.167073Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Dec 13 14:26:41.176777 waagent[1494]: 2024-12-13T14:26:41.176719Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.159 Dec 13 14:26:41.177707 waagent[1494]: 2024-12-13T14:26:41.177651Z INFO ExtHandler Dec 13 14:26:41.177861 waagent[1494]: 2024-12-13T14:26:41.177813Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 86c79dcd-7731-4d99-95c8-804cff626c76 eTag: 13747882023540553921 source: Fabric] Dec 13 14:26:41.178547 waagent[1494]: 2024-12-13T14:26:41.178491Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Dec 13 14:26:41.179620 waagent[1494]: 2024-12-13T14:26:41.179556Z INFO ExtHandler Dec 13 14:26:41.179767 waagent[1494]: 2024-12-13T14:26:41.179717Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Dec 13 14:26:41.186749 waagent[1494]: 2024-12-13T14:26:41.186697Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Dec 13 14:26:41.187161 waagent[1494]: 2024-12-13T14:26:41.187114Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 14:26:41.206744 waagent[1494]: 2024-12-13T14:26:41.206688Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Dec 13 14:26:41.271436 waagent[1494]: 2024-12-13T14:26:41.271303Z INFO ExtHandler Downloaded certificate {'thumbprint': '4453381BD5891BF42AF6BEDDC4BBE0EE4DAC5976', 'hasPrivateKey': False} Dec 13 14:26:41.272424 waagent[1494]: 2024-12-13T14:26:41.272356Z INFO ExtHandler Downloaded certificate {'thumbprint': '0AED150F06584267DD3DF2C40844763E6F3CB5CA', 'hasPrivateKey': True} Dec 13 14:26:41.273397 waagent[1494]: 2024-12-13T14:26:41.273336Z INFO ExtHandler Fetch goal state completed Dec 13 14:26:41.292250 waagent[1494]: 2024-12-13T14:26:41.292149Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Dec 13 14:26:41.303411 waagent[1494]: 2024-12-13T14:26:41.303327Z INFO ExtHandler ExtHandler WALinuxAgent-2.12.0.2 running as process 1494 Dec 13 14:26:41.306403 waagent[1494]: 2024-12-13T14:26:41.306337Z INFO ExtHandler ExtHandler [CGI] Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 14:26:41.307359 waagent[1494]: 2024-12-13T14:26:41.307298Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case distro: ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] went from supported to unsupported Dec 13 14:26:41.307634 waagent[1494]: 2024-12-13T14:26:41.307568Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Dec 13 14:26:41.309537 waagent[1494]: 2024-12-13T14:26:41.309481Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 14:26:41.314125 waagent[1494]: 2024-12-13T14:26:41.314070Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 14:26:41.314525 waagent[1494]: 2024-12-13T14:26:41.314469Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 14:26:41.322334 waagent[1494]: 2024-12-13T14:26:41.322279Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 14:26:41.322813 waagent[1494]: 2024-12-13T14:26:41.322757Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 14:26:41.328613 waagent[1494]: 2024-12-13T14:26:41.328507Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Dec 13 14:26:41.329661 waagent[1494]: 2024-12-13T14:26:41.329579Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Dec 13 14:26:41.331114 waagent[1494]: 2024-12-13T14:26:41.331056Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 14:26:41.331569 waagent[1494]: 2024-12-13T14:26:41.331514Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:26:41.331753 waagent[1494]: 2024-12-13T14:26:41.331703Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:26:41.332287 waagent[1494]: 2024-12-13T14:26:41.332233Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 14:26:41.332567 waagent[1494]: 2024-12-13T14:26:41.332513Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 14:26:41.332567 waagent[1494]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 14:26:41.332567 waagent[1494]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 14:26:41.332567 waagent[1494]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 14:26:41.332567 waagent[1494]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:26:41.332567 waagent[1494]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:26:41.332567 waagent[1494]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:26:41.334848 waagent[1494]: 2024-12-13T14:26:41.334760Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 14:26:41.335675 waagent[1494]: 2024-12-13T14:26:41.335613Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:26:41.335979 waagent[1494]: 2024-12-13T14:26:41.335913Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 14:26:41.336150 waagent[1494]: 2024-12-13T14:26:41.336097Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 14:26:41.338626 waagent[1494]: 2024-12-13T14:26:41.338399Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:26:41.340665 waagent[1494]: 2024-12-13T14:26:41.340585Z INFO EnvHandler ExtHandler Configure routes Dec 13 14:26:41.341350 waagent[1494]: 2024-12-13T14:26:41.341295Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 14:26:41.342929 waagent[1494]: 2024-12-13T14:26:41.342713Z INFO EnvHandler ExtHandler Gateway:None Dec 13 14:26:41.343353 waagent[1494]: 2024-12-13T14:26:41.343283Z INFO EnvHandler ExtHandler Routes:None Dec 13 14:26:41.344402 waagent[1494]: 2024-12-13T14:26:41.344347Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 14:26:41.345771 waagent[1494]: 2024-12-13T14:26:41.345715Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 14:26:41.349129 waagent[1494]: 2024-12-13T14:26:41.349022Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 14:26:41.349129 waagent[1494]: Executing ['ip', '-a', '-o', 'link']: Dec 13 14:26:41.349129 waagent[1494]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 14:26:41.349129 waagent[1494]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:77:68:0c brd ff:ff:ff:ff:ff:ff Dec 13 14:26:41.349129 waagent[1494]: 3: enP29269s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:77:68:0c brd ff:ff:ff:ff:ff:ff\ altname enP29269p0s2 Dec 13 14:26:41.349129 waagent[1494]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 14:26:41.349129 waagent[1494]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 14:26:41.349129 waagent[1494]: 2: eth0 inet 10.200.8.14/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 14:26:41.349129 waagent[1494]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 14:26:41.349129 waagent[1494]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 14:26:41.349129 waagent[1494]: 2: eth0 inet6 fe80::7e1e:52ff:fe77:680c/64 scope link \ valid_lft forever preferred_lft forever Dec 13 14:26:41.370110 waagent[1494]: 2024-12-13T14:26:41.370045Z INFO ExtHandler ExtHandler Downloading agent manifest Dec 13 14:26:41.394326 waagent[1494]: 2024-12-13T14:26:41.394218Z INFO ExtHandler ExtHandler Dec 13 14:26:41.395989 waagent[1494]: 2024-12-13T14:26:41.395932Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 2bf8de22-16a9-4f4a-ae0c-d5b5102c3993 correlation 974915c2-ba4a-41a1-95aa-64f6c122612f created: 2024-12-13T14:24:42.277672Z] Dec 13 14:26:41.402995 waagent[1494]: 2024-12-13T14:26:41.402923Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Dec 13 14:26:41.406812 waagent[1494]: 2024-12-13T14:26:41.406758Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 12 ms] Dec 13 14:26:41.426196 waagent[1494]: 2024-12-13T14:26:41.426129Z INFO ExtHandler ExtHandler Looking for existing remote access users. Dec 13 14:26:41.439443 waagent[1494]: 2024-12-13T14:26:41.439375Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.12.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: CE736D1B-6350-4959-B5BD-22BC03ADDA0D;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Dec 13 14:26:43.787661 waagent[1494]: 2024-12-13T14:26:43.787518Z INFO EnvHandler ExtHandler Created firewall rules for the Azure Fabric: Dec 13 14:26:43.787661 waagent[1494]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:26:43.787661 waagent[1494]: pkts bytes target prot opt in out source destination Dec 13 14:26:43.787661 waagent[1494]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:26:43.787661 waagent[1494]: pkts bytes target prot opt in out source destination Dec 13 14:26:43.787661 waagent[1494]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:26:43.787661 waagent[1494]: pkts bytes target prot opt in out source destination Dec 13 14:26:43.787661 waagent[1494]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Dec 13 14:26:43.787661 waagent[1494]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 14:26:43.787661 waagent[1494]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 14:26:43.794723 waagent[1494]: 2024-12-13T14:26:43.794620Z INFO EnvHandler ExtHandler Current Firewall rules: Dec 13 14:26:43.794723 waagent[1494]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:26:43.794723 waagent[1494]: pkts bytes target prot opt in out source destination Dec 13 14:26:43.794723 waagent[1494]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:26:43.794723 waagent[1494]: pkts bytes target prot opt in out source destination Dec 13 14:26:43.794723 waagent[1494]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:26:43.794723 waagent[1494]: pkts bytes target prot opt in out source destination Dec 13 14:26:43.794723 waagent[1494]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Dec 13 14:26:43.794723 waagent[1494]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 14:26:43.794723 waagent[1494]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 14:26:43.795288 waagent[1494]: 2024-12-13T14:26:43.795235Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Dec 13 14:26:46.778841 update_engine[1299]: I1213 14:26:46.778756 1299 update_attempter.cc:509] Updating boot flags... Dec 13 14:27:20.087286 systemd[1]: Created slice system-sshd.slice. Dec 13 14:27:20.088781 systemd[1]: Started sshd@0-10.200.8.14:22-10.200.16.10:46268.service. Dec 13 14:27:21.014807 sshd[1619]: Accepted publickey for core from 10.200.16.10 port 46268 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:27:21.016492 sshd[1619]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:21.021669 systemd-logind[1297]: New session 3 of user core. Dec 13 14:27:21.022731 systemd[1]: Started session-3.scope. Dec 13 14:27:21.632863 systemd[1]: Started sshd@1-10.200.8.14:22-10.200.16.10:46274.service. Dec 13 14:27:22.337804 sshd[1624]: Accepted publickey for core from 10.200.16.10 port 46274 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:27:22.339410 sshd[1624]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:22.345004 systemd[1]: Started session-4.scope. Dec 13 14:27:22.345744 systemd-logind[1297]: New session 4 of user core. Dec 13 14:27:22.839582 sshd[1624]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:22.842700 systemd[1]: sshd@1-10.200.8.14:22-10.200.16.10:46274.service: Deactivated successfully. Dec 13 14:27:22.843710 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:27:22.844468 systemd-logind[1297]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:27:22.845372 systemd-logind[1297]: Removed session 4. Dec 13 14:27:22.960450 systemd[1]: Started sshd@2-10.200.8.14:22-10.200.16.10:46278.service. Dec 13 14:27:23.675934 sshd[1630]: Accepted publickey for core from 10.200.16.10 port 46278 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:27:23.677526 sshd[1630]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:23.682823 systemd[1]: Started session-5.scope. Dec 13 14:27:23.683259 systemd-logind[1297]: New session 5 of user core. Dec 13 14:27:24.175831 sshd[1630]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:24.179053 systemd[1]: sshd@2-10.200.8.14:22-10.200.16.10:46278.service: Deactivated successfully. Dec 13 14:27:24.180262 systemd-logind[1297]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:27:24.180362 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:27:24.181498 systemd-logind[1297]: Removed session 5. Dec 13 14:27:24.294429 systemd[1]: Started sshd@3-10.200.8.14:22-10.200.16.10:46284.service. Dec 13 14:27:25.000279 sshd[1636]: Accepted publickey for core from 10.200.16.10 port 46284 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:27:25.001926 sshd[1636]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:25.006662 systemd-logind[1297]: New session 6 of user core. Dec 13 14:27:25.007114 systemd[1]: Started session-6.scope. Dec 13 14:27:25.501695 sshd[1636]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:25.504832 systemd[1]: sshd@3-10.200.8.14:22-10.200.16.10:46284.service: Deactivated successfully. Dec 13 14:27:25.505645 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:27:25.506229 systemd-logind[1297]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:27:25.506961 systemd-logind[1297]: Removed session 6. Dec 13 14:27:25.620321 systemd[1]: Started sshd@4-10.200.8.14:22-10.200.16.10:46290.service. Dec 13 14:27:26.327912 sshd[1642]: Accepted publickey for core from 10.200.16.10 port 46290 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:27:26.329520 sshd[1642]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:26.334124 systemd[1]: Started session-7.scope. Dec 13 14:27:26.334765 systemd-logind[1297]: New session 7 of user core. Dec 13 14:27:27.018223 sudo[1645]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:27:27.018564 sudo[1645]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:27:27.040827 dbus-daemon[1287]: \xd0M\xb2\u000bbU: received setenforce notice (enforcing=1614256640) Dec 13 14:27:27.042934 sudo[1645]: pam_unix(sudo:session): session closed for user root Dec 13 14:27:27.174442 sshd[1642]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:27.177804 systemd[1]: sshd@4-10.200.8.14:22-10.200.16.10:46290.service: Deactivated successfully. Dec 13 14:27:27.178728 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:27:27.179362 systemd-logind[1297]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:27:27.180175 systemd-logind[1297]: Removed session 7. Dec 13 14:27:27.292923 systemd[1]: Started sshd@5-10.200.8.14:22-10.200.16.10:46302.service. Dec 13 14:27:28.000072 sshd[1649]: Accepted publickey for core from 10.200.16.10 port 46302 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:27:28.001806 sshd[1649]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:28.006508 systemd[1]: Started session-8.scope. Dec 13 14:27:28.006972 systemd-logind[1297]: New session 8 of user core. Dec 13 14:27:28.385436 sudo[1653]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:27:28.385719 sudo[1653]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:27:28.388505 sudo[1653]: pam_unix(sudo:session): session closed for user root Dec 13 14:27:28.392932 sudo[1652]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:27:28.393180 sudo[1652]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:27:28.401761 systemd[1]: Stopping audit-rules.service... Dec 13 14:27:28.402000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:27:28.405749 auditctl[1656]: No rules Dec 13 14:27:28.406430 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:27:28.406482 kernel: audit: type=1305 audit(1734100048.402:179): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:27:28.402000 audit[1656]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff3ceb88a0 a2=420 a3=0 items=0 ppid=1 pid=1656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:28.407834 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:27:28.407986 systemd[1]: Stopped audit-rules.service. Dec 13 14:27:28.409456 systemd[1]: Starting audit-rules.service... Dec 13 14:27:28.428626 kernel: audit: type=1300 audit(1734100048.402:179): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff3ceb88a0 a2=420 a3=0 items=0 ppid=1 pid=1656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:28.402000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:27:28.431187 augenrules[1673]: No rules Dec 13 14:27:28.432003 systemd[1]: Finished audit-rules.service. Dec 13 14:27:28.435414 kernel: audit: type=1327 audit(1734100048.402:179): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:27:28.435476 kernel: audit: type=1131 audit(1734100048.407:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:28.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:28.434325 sudo[1652]: pam_unix(sudo:session): session closed for user root Dec 13 14:27:28.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:28.455126 kernel: audit: type=1130 audit(1734100048.431:181): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:28.455178 kernel: audit: type=1106 audit(1734100048.433:182): pid=1652 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:28.433000 audit[1652]: USER_END pid=1652 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:28.467630 kernel: audit: type=1104 audit(1734100048.433:183): pid=1652 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:28.433000 audit[1652]: CRED_DISP pid=1652 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:28.549596 sshd[1649]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:28.550000 audit[1649]: USER_END pid=1649 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:28.553272 systemd[1]: sshd@5-10.200.8.14:22-10.200.16.10:46302.service: Deactivated successfully. Dec 13 14:27:28.554140 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:27:28.555312 systemd-logind[1297]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:27:28.556186 systemd-logind[1297]: Removed session 8. Dec 13 14:27:28.550000 audit[1649]: CRED_DISP pid=1649 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:28.578291 kernel: audit: type=1106 audit(1734100048.550:184): pid=1649 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:28.578353 kernel: audit: type=1104 audit(1734100048.550:185): pid=1649 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:28.578380 kernel: audit: type=1131 audit(1734100048.550:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.14:22-10.200.16.10:46302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:28.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.14:22-10.200.16.10:46302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:28.668446 systemd[1]: Started sshd@6-10.200.8.14:22-10.200.16.10:50716.service. Dec 13 14:27:28.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.14:22-10.200.16.10:50716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:29.372000 audit[1679]: USER_ACCT pid=1679 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:29.374660 sshd[1679]: Accepted publickey for core from 10.200.16.10 port 50716 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:27:29.374000 audit[1679]: CRED_ACQ pid=1679 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:29.374000 audit[1679]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7050ac00 a2=3 a3=0 items=0 ppid=1 pid=1679 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:29.374000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:29.376280 sshd[1679]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:29.381688 systemd[1]: Started session-9.scope. Dec 13 14:27:29.382124 systemd-logind[1297]: New session 9 of user core. Dec 13 14:27:29.384000 audit[1679]: USER_START pid=1679 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:29.386000 audit[1681]: CRED_ACQ pid=1681 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:29.758000 audit[1682]: USER_ACCT pid=1682 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:29.759000 audit[1682]: CRED_REFR pid=1682 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:29.760628 sudo[1682]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/mkdir -p . Dec 13 14:27:29.760930 sudo[1682]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:27:29.760000 audit[1682]: USER_START pid=1682 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:29.763711 sudo[1682]: pam_unix(sudo:session): session closed for user root Dec 13 14:27:29.762000 audit[1682]: USER_END pid=1682 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:29.762000 audit[1682]: CRED_DISP pid=1682 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:29.879479 sshd[1679]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:29.879000 audit[1679]: USER_END pid=1679 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:29.879000 audit[1679]: CRED_DISP pid=1679 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:29.882875 systemd[1]: sshd@6-10.200.8.14:22-10.200.16.10:50716.service: Deactivated successfully. Dec 13 14:27:29.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.14:22-10.200.16.10:50716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:29.883900 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:27:29.884699 systemd-logind[1297]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:27:29.885571 systemd-logind[1297]: Removed session 9. Dec 13 14:27:29.998365 systemd[1]: Started sshd@7-10.200.8.14:22-10.200.16.10:50732.service. Dec 13 14:27:29.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.14:22-10.200.16.10:50732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:30.703000 audit[1686]: USER_ACCT pid=1686 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:30.705396 sshd[1686]: Accepted publickey for core from 10.200.16.10 port 50732 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:27:30.704000 audit[1686]: CRED_ACQ pid=1686 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:30.705000 audit[1686]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd72422c50 a2=3 a3=0 items=0 ppid=1 pid=1686 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:30.705000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:30.707075 sshd[1686]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:30.711638 systemd[1]: Started session-10.scope. Dec 13 14:27:30.712095 systemd-logind[1297]: New session 10 of user core. Dec 13 14:27:30.714000 audit[1686]: USER_START pid=1686 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:30.716000 audit[1688]: CRED_ACQ pid=1688 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:31.089000 audit[1689]: USER_ACCT pid=1689 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:31.090802 sudo[1689]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/install -m 0755 /dev/stdin kolet Dec 13 14:27:31.089000 audit[1689]: CRED_REFR pid=1689 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:31.091160 sudo[1689]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:27:31.091000 audit[1689]: USER_START pid=1689 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:34.949347 sudo[1689]: pam_unix(sudo:session): session closed for user root Dec 13 14:27:34.947000 audit[1689]: USER_END pid=1689 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:34.952718 kernel: kauditd_printk_skb: 27 callbacks suppressed Dec 13 14:27:34.952806 kernel: audit: type=1106 audit(1734100054.947:210): pid=1689 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:34.947000 audit[1689]: CRED_DISP pid=1689 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:34.975187 kernel: audit: type=1104 audit(1734100054.947:211): pid=1689 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:35.070765 sshd[1686]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:35.070000 audit[1686]: USER_END pid=1686 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:35.074520 systemd-logind[1297]: Session 10 logged out. Waiting for processes to exit. Dec 13 14:27:35.076399 systemd[1]: sshd@7-10.200.8.14:22-10.200.16.10:50732.service: Deactivated successfully. Dec 13 14:27:35.077214 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 14:27:35.078800 systemd-logind[1297]: Removed session 10. Dec 13 14:27:35.071000 audit[1686]: CRED_DISP pid=1686 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:35.103350 kernel: audit: type=1106 audit(1734100055.070:212): pid=1686 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:35.103418 kernel: audit: type=1104 audit(1734100055.071:213): pid=1686 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:35.103441 kernel: audit: type=1131 audit(1734100055.071:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.14:22-10.200.16.10:50732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:35.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.14:22-10.200.16.10:50732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:35.190048 systemd[1]: Started sshd@8-10.200.8.14:22-10.200.16.10:50744.service. Dec 13 14:27:35.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.14:22-10.200.16.10:50744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:35.207662 kernel: audit: type=1130 audit(1734100055.188:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.14:22-10.200.16.10:50744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:35.896000 audit[1693]: USER_ACCT pid=1693 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:35.898810 sshd[1693]: Accepted publickey for core from 10.200.16.10 port 50744 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:27:35.914000 audit[1693]: CRED_ACQ pid=1693 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:35.916617 sshd[1693]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:35.921507 systemd[1]: Started session-11.scope. Dec 13 14:27:35.922586 systemd-logind[1297]: New session 11 of user core. Dec 13 14:27:35.931470 kernel: audit: type=1101 audit(1734100055.896:216): pid=1693 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:35.931540 kernel: audit: type=1103 audit(1734100055.914:217): pid=1693 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:35.931561 kernel: audit: type=1006 audit(1734100055.914:218): pid=1693 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 14:27:35.940744 kernel: audit: type=1300 audit(1734100055.914:218): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe83369c90 a2=3 a3=0 items=0 ppid=1 pid=1693 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:35.914000 audit[1693]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe83369c90 a2=3 a3=0 items=0 ppid=1 pid=1693 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:35.914000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:35.925000 audit[1693]: USER_START pid=1693 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:35.927000 audit[1695]: CRED_ACQ pid=1695 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:36.307000 audit[1701]: USER_ACCT pid=1701 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.309072 sudo[1701]: core : PWD=/home/core ; USER=core ; COMMAND=/usr/bin/gdbus call --system --dest org.freedesktop.systemd1 --object-path /org/freedesktop/systemd1 --method org.freedesktop.systemd1.Manager.RestartUnit ntpd.service replace Dec 13 14:27:36.307000 audit[1701]: CRED_REFR pid=1701 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.309348 sudo[1701]: pam_unix(sudo:session): session opened for user core(uid=500) by (uid=500) Dec 13 14:27:36.309000 audit[1701]: USER_START pid=1701 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:36.662505 dbus-daemon[1287]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.4' (uid=0 pid=1 comm="/usr/lib/systemd/systemd --switched-root --system" label="system_u:system_r:kernel_t:s0") Dec 13 14:27:36.667279 systemd[1]: Starting polkit.service... Dec 13 14:27:37.110598 polkitd[1705]: Started polkitd version 121 Dec 13 14:27:37.169920 polkitd[1705]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 14:27:37.170017 polkitd[1705]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 14:27:37.230518 polkitd[1705]: Finished loading, compiling and executing 2 rules Dec 13 14:27:37.231142 dbus-daemon[1287]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 14:27:37.231374 systemd[1]: Started polkit.service. Dec 13 14:27:37.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=polkit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:37.232236 polkitd[1705]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 14:27:37.259000 audit[1701]: USER_END pid=1701 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:37.259000 audit[1701]: CRED_DISP pid=1701 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:37.261174 sudo[1701]: pam_unix(sudo:session): session closed for user core Dec 13 14:27:37.265000 audit[1713]: USER_ACCT pid=1713 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:37.267540 sudo[1713]: core : PWD=/home/core ; USER=core ; COMMAND=/usr/bin/gdbus call --system --dest org.freedesktop.systemd1 --object-path /org/freedesktop/systemd1/unit/ntpd_2eservice --method org.freedesktop.DBus.Properties.GetAll org.freedesktop.systemd1.Unit Dec 13 14:27:37.266000 audit[1713]: CRED_REFR pid=1713 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:37.267853 sudo[1713]: pam_unix(sudo:session): session opened for user core(uid=500) by (uid=500) Dec 13 14:27:37.267000 audit[1713]: USER_START pid=1713 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:37.283000 audit[1713]: USER_END pid=1713 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:37.283000 audit[1713]: CRED_DISP pid=1713 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:37.284895 sudo[1713]: pam_unix(sudo:session): session closed for user core Dec 13 14:27:37.402000 audit[1693]: USER_END pid=1693 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:37.403000 audit[1693]: CRED_DISP pid=1693 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:37.402394 sshd[1693]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:37.406689 systemd[1]: sshd@8-10.200.8.14:22-10.200.16.10:50744.service: Deactivated successfully. Dec 13 14:27:37.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.14:22-10.200.16.10:50744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:37.407671 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 14:27:37.408408 systemd-logind[1297]: Session 11 logged out. Waiting for processes to exit. Dec 13 14:27:37.409433 systemd-logind[1297]: Removed session 11. Dec 13 14:27:37.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.14:22-10.200.16.10:50756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:37.521651 systemd[1]: Started sshd@9-10.200.8.14:22-10.200.16.10:50756.service. Dec 13 14:27:38.227000 audit[1719]: USER_ACCT pid=1719 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:38.229263 sshd[1719]: Accepted publickey for core from 10.200.16.10 port 50756 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:27:38.228000 audit[1719]: CRED_ACQ pid=1719 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:38.228000 audit[1719]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb3c53ed0 a2=3 a3=0 items=0 ppid=1 pid=1719 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:38.228000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:38.230956 sshd[1719]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:38.236579 systemd[1]: Started session-12.scope. Dec 13 14:27:38.237154 systemd-logind[1297]: New session 12 of user core. Dec 13 14:27:38.240000 audit[1719]: USER_START pid=1719 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:38.241000 audit[1721]: CRED_ACQ pid=1721 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:38.750272 sshd[1719]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:38.751000 audit[1719]: USER_END pid=1719 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:38.751000 audit[1719]: CRED_DISP pid=1719 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:38.753904 systemd[1]: sshd@9-10.200.8.14:22-10.200.16.10:50756.service: Deactivated successfully. Dec 13 14:27:38.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.14:22-10.200.16.10:50756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:38.754894 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 14:27:38.755682 systemd-logind[1297]: Session 12 logged out. Waiting for processes to exit. Dec 13 14:27:38.756709 systemd-logind[1297]: Removed session 12. Dec 13 14:27:38.868991 systemd[1]: Started sshd@10-10.200.8.14:22-10.200.16.10:44082.service. Dec 13 14:27:38.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.14:22-10.200.16.10:44082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:39.575000 audit[1729]: USER_ACCT pid=1729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:39.576076 sshd[1729]: Accepted publickey for core from 10.200.16.10 port 44082 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:27:39.576000 audit[1729]: CRED_ACQ pid=1729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:39.576000 audit[1729]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd64bb520 a2=3 a3=0 items=0 ppid=1 pid=1729 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:39.576000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:39.577795 sshd[1729]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:39.583046 systemd[1]: Started session-13.scope. Dec 13 14:27:39.583485 systemd-logind[1297]: New session 13 of user core. Dec 13 14:27:39.587000 audit[1729]: USER_START pid=1729 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:39.589000 audit[1731]: CRED_ACQ pid=1731 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:40.112393 sshd[1729]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:40.113000 audit[1729]: USER_END pid=1729 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:40.116299 systemd[1]: sshd@10-10.200.8.14:22-10.200.16.10:44082.service: Deactivated successfully. Dec 13 14:27:40.117211 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 14:27:40.119592 kernel: kauditd_printk_skb: 36 callbacks suppressed Dec 13 14:27:40.119685 kernel: audit: type=1106 audit(1734100060.113:250): pid=1729 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:40.119241 systemd-logind[1297]: Session 13 logged out. Waiting for processes to exit. Dec 13 14:27:40.120569 systemd-logind[1297]: Removed session 13. Dec 13 14:27:40.113000 audit[1729]: CRED_DISP pid=1729 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:40.139627 kernel: audit: type=1104 audit(1734100060.113:251): pid=1729 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:40.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.14:22-10.200.16.10:44082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:40.154622 kernel: audit: type=1131 audit(1734100060.113:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.14:22-10.200.16.10:44082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:40.232001 systemd[1]: Started sshd@11-10.200.8.14:22-10.200.16.10:44094.service. Dec 13 14:27:40.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.14:22-10.200.16.10:44094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:40.251642 kernel: audit: type=1130 audit(1734100060.231:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.14:22-10.200.16.10:44094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:40.940000 audit[1739]: USER_ACCT pid=1739 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:40.960046 sshd[1739]: Accepted publickey for core from 10.200.16.10 port 44094 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:27:40.960418 sshd[1739]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:40.960697 kernel: audit: type=1101 audit(1734100060.940:254): pid=1739 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:40.959000 audit[1739]: CRED_ACQ pid=1739 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:40.965977 systemd[1]: Started session-14.scope. Dec 13 14:27:40.967173 systemd-logind[1297]: New session 14 of user core. Dec 13 14:27:40.986690 kernel: audit: type=1103 audit(1734100060.959:255): pid=1739 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:40.986767 kernel: audit: type=1006 audit(1734100060.959:256): pid=1739 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Dec 13 14:27:40.986795 kernel: audit: type=1300 audit(1734100060.959:256): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5fc52bc0 a2=3 a3=0 items=0 ppid=1 pid=1739 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:40.959000 audit[1739]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5fc52bc0 a2=3 a3=0 items=0 ppid=1 pid=1739 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:40.959000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:41.010285 kernel: audit: type=1327 audit(1734100060.959:256): proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:41.010357 kernel: audit: type=1105 audit(1734100060.971:257): pid=1739 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:40.971000 audit[1739]: USER_START pid=1739 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:40.973000 audit[1741]: CRED_ACQ pid=1741 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:41.463705 sshd[1739]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:41.464000 audit[1739]: USER_END pid=1739 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:41.464000 audit[1739]: CRED_DISP pid=1739 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:41.466857 systemd[1]: sshd@11-10.200.8.14:22-10.200.16.10:44094.service: Deactivated successfully. Dec 13 14:27:41.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.14:22-10.200.16.10:44094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.467689 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 14:27:41.468279 systemd-logind[1297]: Session 14 logged out. Waiting for processes to exit. Dec 13 14:27:41.469108 systemd-logind[1297]: Removed session 14. Dec 13 14:27:41.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.14:22-10.200.16.10:44100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:41.582056 systemd[1]: Started sshd@12-10.200.8.14:22-10.200.16.10:44100.service. Dec 13 14:27:42.288000 audit[1749]: USER_ACCT pid=1749 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:42.289626 sshd[1749]: Accepted publickey for core from 10.200.16.10 port 44100 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:27:42.290000 audit[1749]: CRED_ACQ pid=1749 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:42.290000 audit[1749]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd76522fc0 a2=3 a3=0 items=0 ppid=1 pid=1749 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:42.290000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:42.291248 sshd[1749]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:42.296296 systemd[1]: Started session-15.scope. Dec 13 14:27:42.297003 systemd-logind[1297]: New session 15 of user core. Dec 13 14:27:42.300000 audit[1749]: USER_START pid=1749 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:42.302000 audit[1751]: CRED_ACQ pid=1751 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:42.806495 sshd[1749]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:42.807000 audit[1749]: USER_END pid=1749 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:42.808000 audit[1749]: CRED_DISP pid=1749 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:42.810141 systemd[1]: sshd@12-10.200.8.14:22-10.200.16.10:44100.service: Deactivated successfully. Dec 13 14:27:42.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.14:22-10.200.16.10:44100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.811118 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 14:27:42.811917 systemd-logind[1297]: Session 15 logged out. Waiting for processes to exit. Dec 13 14:27:42.812956 systemd-logind[1297]: Removed session 15. Dec 13 14:27:42.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.14:22-10.200.16.10:44102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:42.925471 systemd[1]: Started sshd@13-10.200.8.14:22-10.200.16.10:44102.service. Dec 13 14:27:43.632000 audit[1759]: USER_ACCT pid=1759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:43.633010 sshd[1759]: Accepted publickey for core from 10.200.16.10 port 44102 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:27:43.633000 audit[1759]: CRED_ACQ pid=1759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:43.633000 audit[1759]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3b4df0e0 a2=3 a3=0 items=0 ppid=1 pid=1759 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:43.633000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:43.634702 sshd[1759]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:43.639938 systemd[1]: Started session-16.scope. Dec 13 14:27:43.640645 systemd-logind[1297]: New session 16 of user core. Dec 13 14:27:43.644000 audit[1759]: USER_START pid=1759 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:43.645000 audit[1761]: CRED_ACQ pid=1761 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:44.042000 audit[1767]: USER_ACCT pid=1767 uid=500 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:44.043293 sudo[1767]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/coreos-cloudinit --workspace /tmp/coretest-cloudinit-2746672877 --from-file /tmp/coretest-1606467626 --ssh-key-name coretest Dec 13 14:27:44.043550 sudo[1767]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:27:44.042000 audit[1767]: CRED_REFR pid=1767 uid=500 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:44.044000 audit[1767]: USER_START pid=1767 uid=500 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:45.419075 systemd[1]: Reloading. Dec 13 14:27:45.507184 /usr/lib/systemd/system-generators/torcx-generator[1794]: time="2024-12-13T14:27:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:27:45.517791 /usr/lib/systemd/system-generators/torcx-generator[1794]: time="2024-12-13T14:27:45Z" level=info msg="torcx already run" Dec 13 14:27:45.592197 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:27:45.592217 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:27:45.609928 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:27:45.689857 kernel: kauditd_printk_skb: 26 callbacks suppressed Dec 13 14:27:45.690040 kernel: audit: type=1400 audit(1734100065.672:280): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.719386 kernel: audit: type=1400 audit(1734100065.672:281): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.719508 kernel: audit: type=1400 audit(1734100065.672:282): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.719635 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:27:45.736347 kernel: audit: type=1400 audit(1734100065.672:283): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.736443 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:27:45.736467 kernel: audit: backlog limit exceeded Dec 13 14:27:45.736488 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:27:45.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.744836 kernel: audit: type=1400 audit(1734100065.672:284): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.744926 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:27:45.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.672000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.672000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.689000 audit: BPF prog-id=38 op=LOAD Dec 13 14:27:45.689000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:27:45.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.691000 audit: BPF prog-id=39 op=LOAD Dec 13 14:27:45.691000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:27:45.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.692000 audit: BPF prog-id=40 op=LOAD Dec 13 14:27:45.692000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:27:45.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.705000 audit: BPF prog-id=41 op=LOAD Dec 13 14:27:45.705000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:27:45.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.718000 audit: BPF prog-id=42 op=LOAD Dec 13 14:27:45.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.718000 audit: BPF prog-id=43 op=LOAD Dec 13 14:27:45.718000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:27:45.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.763000 audit: BPF prog-id=44 op=LOAD Dec 13 14:27:45.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.763000 audit: BPF prog-id=45 op=LOAD Dec 13 14:27:45.763000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:27:45.763000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:27:45.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.764000 audit: BPF prog-id=46 op=LOAD Dec 13 14:27:45.765000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:27:45.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.765000 audit: BPF prog-id=47 op=LOAD Dec 13 14:27:45.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.765000 audit: BPF prog-id=48 op=LOAD Dec 13 14:27:45.765000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:27:45.765000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit: BPF prog-id=49 op=LOAD Dec 13 14:27:45.768000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit: BPF prog-id=50 op=LOAD Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.768000 audit: BPF prog-id=51 op=LOAD Dec 13 14:27:45.768000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:27:45.768000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:27:45.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:27:45.769000 audit: BPF prog-id=52 op=LOAD Dec 13 14:27:45.769000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:27:45.775000 audit[1767]: USER_END pid=1767 uid=500 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:45.775000 audit[1767]: CRED_DISP pid=1767 uid=500 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:45.775736 sudo[1767]: pam_unix(sudo:session): session closed for user root Dec 13 14:27:45.797000 audit[1856]: USER_ACCT pid=1856 uid=500 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:45.798159 sudo[1856]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /tmp/coretest-cloudinit-2746672877 Dec 13 14:27:45.797000 audit[1856]: CRED_REFR pid=1856 uid=500 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:45.798447 sudo[1856]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:27:45.799000 audit[1856]: USER_START pid=1856 uid=500 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:45.801481 sudo[1856]: pam_unix(sudo:session): session closed for user root Dec 13 14:27:45.800000 audit[1856]: USER_END pid=1856 uid=500 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:45.801000 audit[1856]: CRED_DISP pid=1856 uid=500 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:45.938416 sshd[1759]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:45.939000 audit[1759]: USER_END pid=1759 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:45.940000 audit[1759]: CRED_DISP pid=1759 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:45.943039 systemd[1]: sshd@13-10.200.8.14:22-10.200.16.10:44102.service: Deactivated successfully. Dec 13 14:27:45.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.14:22-10.200.16.10:44102 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:45.944087 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 14:27:45.945494 systemd-logind[1297]: Session 16 logged out. Waiting for processes to exit. Dec 13 14:27:45.946704 systemd-logind[1297]: Removed session 16. Dec 13 14:27:46.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.14:22-10.200.16.10:44114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:46.075849 systemd[1]: Started sshd@14-10.200.8.14:22-10.200.16.10:44114.service. Dec 13 14:27:46.782000 audit[1860]: USER_ACCT pid=1860 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:46.783813 sshd[1860]: Accepted publickey for core from 10.200.16.10 port 44114 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:27:46.784000 audit[1860]: CRED_ACQ pid=1860 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:46.784000 audit[1860]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed253fca0 a2=3 a3=0 items=0 ppid=1 pid=1860 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:46.784000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:46.785464 sshd[1860]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:46.791149 systemd[1]: Started session-17.scope. Dec 13 14:27:46.791589 systemd-logind[1297]: New session 17 of user core. Dec 13 14:27:46.795000 audit[1860]: USER_START pid=1860 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:46.796000 audit[1862]: CRED_ACQ pid=1862 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:47.191000 audit[1868]: USER_ACCT pid=1868 uid=500 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:47.191000 audit[1868]: CRED_REFR pid=1868 uid=500 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:47.191963 sudo[1868]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/coreos-cloudinit --workspace /tmp/coretest-cloudinit-3260034461 --from-file /tmp/coretest-1916596957 Dec 13 14:27:47.192264 sudo[1868]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:27:47.193000 audit[1868]: USER_START pid=1868 uid=500 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:47.201944 systemd[1]: Started coreos-cloudinit-496277901.service. Dec 13 14:27:47.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-cloudinit-496277901 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:47.206000 audit[1868]: USER_END pid=1868 uid=500 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:47.206000 audit[1868]: CRED_DISP pid=1868 uid=500 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:47.206727 sudo[1868]: pam_unix(sudo:session): session closed for user root Dec 13 14:27:47.228000 audit[1880]: USER_ACCT pid=1880 uid=500 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:47.229207 sudo[1880]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /tmp/coretest-cloudinit-3260034461 Dec 13 14:27:47.228000 audit[1880]: CRED_REFR pid=1880 uid=500 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:47.229690 sudo[1880]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:27:47.230000 audit[1880]: USER_START pid=1880 uid=500 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:47.232430 sudo[1880]: pam_unix(sudo:session): session closed for user root Dec 13 14:27:47.231000 audit[1880]: USER_END pid=1880 uid=500 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:47.232000 audit[1880]: CRED_DISP pid=1880 uid=500 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:47.351320 sshd[1860]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:47.352000 audit[1860]: USER_END pid=1860 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:47.352000 audit[1860]: CRED_DISP pid=1860 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:47.355023 systemd-logind[1297]: Session 17 logged out. Waiting for processes to exit. Dec 13 14:27:47.355220 systemd[1]: sshd@14-10.200.8.14:22-10.200.16.10:44114.service: Deactivated successfully. Dec 13 14:27:47.356140 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 14:27:47.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.14:22-10.200.16.10:44114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:47.356999 systemd-logind[1297]: Removed session 17. Dec 13 14:27:47.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.14:22-10.200.16.10:44116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:47.471170 systemd[1]: Started sshd@15-10.200.8.14:22-10.200.16.10:44116.service. Dec 13 14:27:48.176000 audit[1884]: USER_ACCT pid=1884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:48.177647 sshd[1884]: Accepted publickey for core from 10.200.16.10 port 44116 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:27:48.178000 audit[1884]: CRED_ACQ pid=1884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:48.178000 audit[1884]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefefd1c30 a2=3 a3=0 items=0 ppid=1 pid=1884 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:48.178000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:48.179299 sshd[1884]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:48.184371 systemd[1]: Started session-18.scope. Dec 13 14:27:48.184831 systemd-logind[1297]: New session 18 of user core. Dec 13 14:27:48.188000 audit[1884]: USER_START pid=1884 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:48.190000 audit[1886]: CRED_ACQ pid=1886 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:48.717588 sshd[1884]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:48.718000 audit[1884]: USER_END pid=1884 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:48.719000 audit[1884]: CRED_DISP pid=1884 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:48.721276 systemd[1]: sshd@15-10.200.8.14:22-10.200.16.10:44116.service: Deactivated successfully. Dec 13 14:27:48.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.14:22-10.200.16.10:44116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:48.722282 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 14:27:48.722955 systemd-logind[1297]: Session 18 logged out. Waiting for processes to exit. Dec 13 14:27:48.723764 systemd-logind[1297]: Removed session 18. Dec 13 14:27:48.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.14:22-10.200.16.10:39824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:48.836344 systemd[1]: Started sshd@16-10.200.8.14:22-10.200.16.10:39824.service. Dec 13 14:27:49.543000 audit[1898]: USER_ACCT pid=1898 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:49.544015 sshd[1898]: Accepted publickey for core from 10.200.16.10 port 39824 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:27:49.544000 audit[1898]: CRED_ACQ pid=1898 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:49.544000 audit[1898]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4a9de6e0 a2=3 a3=0 items=0 ppid=1 pid=1898 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:49.544000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:49.545629 sshd[1898]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:49.550693 systemd[1]: Started session-19.scope. Dec 13 14:27:49.551132 systemd-logind[1297]: New session 19 of user core. Dec 13 14:27:49.555000 audit[1898]: USER_START pid=1898 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:49.556000 audit[1900]: CRED_ACQ pid=1900 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:50.025000 audit[1906]: USER_ACCT pid=1906 uid=500 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:50.026512 sudo[1906]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/blkid -o value -s PTUUID /dev/sda Dec 13 14:27:50.026792 sudo[1906]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:27:50.026000 audit[1906]: CRED_REFR pid=1906 uid=500 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:50.027000 audit[1906]: USER_START pid=1906 uid=500 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:50.117853 sudo[1906]: pam_unix(sudo:session): session closed for user root Dec 13 14:27:50.117000 audit[1906]: USER_END pid=1906 uid=500 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:50.117000 audit[1906]: CRED_DISP pid=1906 uid=500 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:50.234901 sshd[1898]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:50.236000 audit[1898]: USER_END pid=1898 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:50.236000 audit[1898]: CRED_DISP pid=1898 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:50.238551 systemd[1]: sshd@16-10.200.8.14:22-10.200.16.10:39824.service: Deactivated successfully. Dec 13 14:27:50.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.14:22-10.200.16.10:39824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:50.239431 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 14:27:50.240057 systemd-logind[1297]: Session 19 logged out. Waiting for processes to exit. Dec 13 14:27:50.240908 systemd-logind[1297]: Removed session 19. Dec 13 14:27:50.360509 systemd[1]: Started sshd@17-10.200.8.14:22-10.200.16.10:39830.service. Dec 13 14:27:50.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.14:22-10.200.16.10:39830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:51.072352 kernel: kauditd_printk_skb: 226 callbacks suppressed Dec 13 14:27:51.072473 kernel: audit: type=1101 audit(1734100071.065:504): pid=1912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:51.065000 audit[1912]: USER_ACCT pid=1912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:51.072153 sshd[1912]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:51.072855 sshd[1912]: Accepted publickey for core from 10.200.16.10 port 39830 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:27:51.077500 systemd[1]: Started session-20.scope. Dec 13 14:27:51.078644 systemd-logind[1297]: New session 20 of user core. Dec 13 14:27:51.071000 audit[1912]: CRED_ACQ pid=1912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:51.103685 kernel: audit: type=1103 audit(1734100071.071:505): pid=1912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:51.103764 kernel: audit: type=1006 audit(1734100071.071:506): pid=1912 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Dec 13 14:27:51.071000 audit[1912]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa292bf20 a2=3 a3=0 items=0 ppid=1 pid=1912 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:51.129592 kernel: audit: type=1300 audit(1734100071.071:506): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa292bf20 a2=3 a3=0 items=0 ppid=1 pid=1912 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:51.071000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:51.083000 audit[1912]: USER_START pid=1912 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:51.135618 kernel: audit: type=1327 audit(1734100071.071:506): proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:51.135650 kernel: audit: type=1105 audit(1734100071.083:507): pid=1912 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:51.084000 audit[1914]: CRED_ACQ pid=1914 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:51.175920 kernel: audit: type=1103 audit(1734100071.084:508): pid=1914 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:51.474000 audit[1920]: USER_ACCT pid=1920 uid=500 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:51.475011 sudo[1920]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/useradd -p * -U -m user1 -G sudo Dec 13 14:27:51.475223 sudo[1920]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:27:51.474000 audit[1920]: CRED_REFR pid=1920 uid=500 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:51.502927 kernel: audit: type=1101 audit(1734100071.474:509): pid=1920 uid=500 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:51.503029 kernel: audit: type=1110 audit(1734100071.474:510): pid=1920 uid=500 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:51.503052 kernel: audit: type=1105 audit(1734100071.477:511): pid=1920 uid=500 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:51.477000 audit[1920]: USER_START pid=1920 uid=500 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:51.650990 useradd[1921]: new group: name=user1, GID=1000 Dec 13 14:27:51.651009 useradd[1921]: new user: name=user1, UID=1000, GID=1000, home=/home/user1, shell=/bin/bash, from=none Dec 13 14:27:51.652401 useradd[1921]: add 'user1' to group 'sudo' Dec 13 14:27:51.652413 useradd[1921]: add 'user1' to shadow group 'sudo' Dec 13 14:27:52.641748 sudo[1920]: pam_unix(sudo:session): session closed for user root Dec 13 14:27:52.641000 audit[1920]: USER_END pid=1920 uid=500 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:52.641000 audit[1920]: CRED_DISP pid=1920 uid=500 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:27:52.790143 sshd[1912]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:52.791000 audit[1912]: USER_END pid=1912 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:52.791000 audit[1912]: CRED_DISP pid=1912 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:52.793882 systemd[1]: sshd@17-10.200.8.14:22-10.200.16.10:39830.service: Deactivated successfully. Dec 13 14:27:52.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.14:22-10.200.16.10:39830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:52.794908 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 14:27:52.795730 systemd-logind[1297]: Session 20 logged out. Waiting for processes to exit. Dec 13 14:27:52.796717 systemd-logind[1297]: Removed session 20. Dec 13 14:27:52.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.14:22-10.200.16.10:39836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:52.908876 systemd[1]: Started sshd@18-10.200.8.14:22-10.200.16.10:39836.service. Dec 13 14:27:53.614000 audit[1931]: USER_ACCT pid=1931 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:53.615380 sshd[1931]: Accepted publickey for core from 10.200.16.10 port 39836 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:27:53.615000 audit[1931]: CRED_ACQ pid=1931 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:53.616000 audit[1931]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0dd6f440 a2=3 a3=0 items=0 ppid=1 pid=1931 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:53.616000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:53.617086 sshd[1931]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:53.622734 systemd[1]: Started session-21.scope. Dec 13 14:27:53.623263 systemd-logind[1297]: New session 21 of user core. Dec 13 14:27:53.627000 audit[1931]: USER_START pid=1931 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:53.628000 audit[1933]: CRED_ACQ pid=1933 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:54.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-127.0.0.1:22-127.0.0.1:39466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:54.025696 systemd[1]: Started sshd@19-127.0.0.1:22-127.0.0.1:39466.service. Dec 13 14:27:54.033733 sshd[1940]: kex_exchange_identification: Connection closed by remote host Dec 13 14:27:54.033733 sshd[1940]: Connection closed by 127.0.0.1 port 39466 Dec 13 14:27:54.034226 systemd[1]: sshd@19-127.0.0.1:22-127.0.0.1:39466.service: Deactivated successfully. Dec 13 14:27:54.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-127.0.0.1:22-127.0.0.1:39466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:54.140505 sshd[1931]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:54.141000 audit[1931]: USER_END pid=1931 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:54.141000 audit[1931]: CRED_DISP pid=1931 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:54.144078 systemd[1]: sshd@18-10.200.8.14:22-10.200.16.10:39836.service: Deactivated successfully. Dec 13 14:27:54.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.14:22-10.200.16.10:39836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:54.144885 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 14:27:54.145505 systemd-logind[1297]: Session 21 logged out. Waiting for processes to exit. Dec 13 14:27:54.146348 systemd-logind[1297]: Removed session 21. Dec 13 14:27:54.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.14:22-10.200.16.10:39850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:54.259764 systemd[1]: Started sshd@20-10.200.8.14:22-10.200.16.10:39850.service. Dec 13 14:27:54.967000 audit[1944]: USER_ACCT pid=1944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:54.968222 sshd[1944]: Accepted publickey for core from 10.200.16.10 port 39850 ssh2: RSA SHA256:VL8LvbxVNxa7jmY6OervfMBnEuOtBvTKJ3L6x/+vjOM Dec 13 14:27:54.968000 audit[1944]: CRED_ACQ pid=1944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:54.968000 audit[1944]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc5922d00 a2=3 a3=0 items=0 ppid=1 pid=1944 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:54.968000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:54.969910 sshd[1944]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:54.974795 systemd[1]: Started session-22.scope. Dec 13 14:27:54.975238 systemd-logind[1297]: New session 22 of user core. Dec 13 14:27:54.979000 audit[1944]: USER_START pid=1944 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:54.980000 audit[1946]: CRED_ACQ pid=1946 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:55.492034 sshd[1944]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:55.493000 audit[1944]: USER_END pid=1944 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:55.493000 audit[1944]: CRED_DISP pid=1944 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:27:55.495553 systemd[1]: sshd@20-10.200.8.14:22-10.200.16.10:39850.service: Deactivated successfully. Dec 13 14:27:55.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.14:22-10.200.16.10:39850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:55.496577 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 14:27:55.497353 systemd-logind[1297]: Session 22 logged out. Waiting for processes to exit. Dec 13 14:27:55.498451 systemd-logind[1297]: Removed session 22. Dec 13 14:27:57.239858 systemd[1]: coreos-cloudinit-496277901.service: Deactivated successfully. Dec 13 14:27:57.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-cloudinit-496277901 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:57.244206 kernel: kauditd_printk_skb: 29 callbacks suppressed Dec 13 14:27:57.244276 kernel: audit: type=1131 audit(1734100077.238:537): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-cloudinit-496277901 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'