May 10 00:40:02.121478 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 9 23:12:23 -00 2025 May 10 00:40:02.121505 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:40:02.125549 kernel: BIOS-provided physical RAM map: May 10 00:40:02.125575 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 10 00:40:02.125586 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved May 10 00:40:02.125597 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable May 10 00:40:02.125615 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved May 10 00:40:02.125626 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data May 10 00:40:02.125636 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS May 10 00:40:02.125646 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable May 10 00:40:02.125663 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable May 10 00:40:02.125674 kernel: printk: bootconsole [earlyser0] enabled May 10 00:40:02.125684 kernel: NX (Execute Disable) protection: active May 10 00:40:02.125695 kernel: efi: EFI v2.70 by Microsoft May 10 00:40:02.125712 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c7a98 RNG=0x3ffd1018 May 10 00:40:02.125724 kernel: random: crng init done May 10 00:40:02.125736 kernel: SMBIOS 3.1.0 present. May 10 00:40:02.125747 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 03/08/2024 May 10 00:40:02.125759 kernel: Hypervisor detected: Microsoft Hyper-V May 10 00:40:02.125770 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 May 10 00:40:02.125782 kernel: Hyper-V Host Build:20348-10.0-1-0.1827 May 10 00:40:02.125793 kernel: Hyper-V: Nested features: 0x1e0101 May 10 00:40:02.125806 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 May 10 00:40:02.125817 kernel: Hyper-V: Using hypercall for remote TLB flush May 10 00:40:02.125834 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns May 10 00:40:02.125846 kernel: tsc: Marking TSC unstable due to running on Hyper-V May 10 00:40:02.125859 kernel: tsc: Detected 2593.906 MHz processor May 10 00:40:02.125871 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 10 00:40:02.125883 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 10 00:40:02.125895 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 May 10 00:40:02.125907 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 10 00:40:02.125918 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved May 10 00:40:02.125938 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 May 10 00:40:02.125951 kernel: Using GB pages for direct mapping May 10 00:40:02.125962 kernel: Secure boot disabled May 10 00:40:02.125974 kernel: ACPI: Early table checksum verification disabled May 10 00:40:02.125986 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) May 10 00:40:02.125998 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:40:02.126010 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:40:02.126022 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) May 10 00:40:02.126047 kernel: ACPI: FACS 0x000000003FFFE000 000040 May 10 00:40:02.126061 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:40:02.126073 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:40:02.126084 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:40:02.126096 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:40:02.126108 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:40:02.126130 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:40:02.126143 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) May 10 00:40:02.126155 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] May 10 00:40:02.126174 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] May 10 00:40:02.126187 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] May 10 00:40:02.126198 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] May 10 00:40:02.126211 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] May 10 00:40:02.126228 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] May 10 00:40:02.126245 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] May 10 00:40:02.126257 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] May 10 00:40:02.126269 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] May 10 00:40:02.126287 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] May 10 00:40:02.126301 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 10 00:40:02.126313 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 10 00:40:02.126331 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug May 10 00:40:02.126344 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug May 10 00:40:02.126356 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug May 10 00:40:02.126377 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug May 10 00:40:02.126392 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug May 10 00:40:02.126405 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug May 10 00:40:02.126423 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug May 10 00:40:02.126436 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug May 10 00:40:02.126449 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug May 10 00:40:02.126467 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug May 10 00:40:02.126480 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug May 10 00:40:02.126492 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug May 10 00:40:02.126507 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug May 10 00:40:02.126624 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug May 10 00:40:02.126638 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug May 10 00:40:02.126650 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug May 10 00:40:02.126663 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] May 10 00:40:02.126681 kernel: NODE_DATA(0) allocated [mem 0x2bfff9000-0x2bfffefff] May 10 00:40:02.126694 kernel: Zone ranges: May 10 00:40:02.126707 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 10 00:40:02.126719 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] May 10 00:40:02.126741 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] May 10 00:40:02.126754 kernel: Movable zone start for each node May 10 00:40:02.126766 kernel: Early memory node ranges May 10 00:40:02.126779 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 10 00:40:02.126792 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] May 10 00:40:02.126810 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] May 10 00:40:02.126823 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] May 10 00:40:02.126835 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] May 10 00:40:02.126848 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 10 00:40:02.126869 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 10 00:40:02.126883 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges May 10 00:40:02.126896 kernel: ACPI: PM-Timer IO Port: 0x408 May 10 00:40:02.126907 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) May 10 00:40:02.126926 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 May 10 00:40:02.126939 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 10 00:40:02.126950 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 10 00:40:02.126968 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 May 10 00:40:02.126981 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 10 00:40:02.126997 kernel: [mem 0x40000000-0xffffffff] available for PCI devices May 10 00:40:02.127015 kernel: Booting paravirtualized kernel on Hyper-V May 10 00:40:02.127028 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 10 00:40:02.127040 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 10 00:40:02.127052 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 10 00:40:02.127065 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 10 00:40:02.127077 kernel: pcpu-alloc: [0] 0 1 May 10 00:40:02.127090 kernel: Hyper-V: PV spinlocks enabled May 10 00:40:02.127102 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 10 00:40:02.127119 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 May 10 00:40:02.127132 kernel: Policy zone: Normal May 10 00:40:02.127147 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:40:02.127160 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 10 00:40:02.127173 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) May 10 00:40:02.127186 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 10 00:40:02.127198 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 10 00:40:02.127212 kernel: Memory: 8079140K/8387460K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 308060K reserved, 0K cma-reserved) May 10 00:40:02.127227 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 10 00:40:02.127240 kernel: ftrace: allocating 34584 entries in 136 pages May 10 00:40:02.127263 kernel: ftrace: allocated 136 pages with 2 groups May 10 00:40:02.127278 kernel: rcu: Hierarchical RCU implementation. May 10 00:40:02.127292 kernel: rcu: RCU event tracing is enabled. May 10 00:40:02.127306 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 10 00:40:02.127320 kernel: Rude variant of Tasks RCU enabled. May 10 00:40:02.127334 kernel: Tracing variant of Tasks RCU enabled. May 10 00:40:02.127347 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 10 00:40:02.127361 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 10 00:40:02.127374 kernel: Using NULL legacy PIC May 10 00:40:02.127391 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 May 10 00:40:02.127404 kernel: Console: colour dummy device 80x25 May 10 00:40:02.127417 kernel: printk: console [tty1] enabled May 10 00:40:02.127431 kernel: printk: console [ttyS0] enabled May 10 00:40:02.127443 kernel: printk: bootconsole [earlyser0] disabled May 10 00:40:02.127459 kernel: ACPI: Core revision 20210730 May 10 00:40:02.127472 kernel: Failed to register legacy timer interrupt May 10 00:40:02.127486 kernel: APIC: Switch to symmetric I/O mode setup May 10 00:40:02.127499 kernel: Hyper-V: Using IPI hypercalls May 10 00:40:02.127513 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593906) May 10 00:40:02.127547 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 May 10 00:40:02.127560 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 May 10 00:40:02.127574 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 10 00:40:02.127587 kernel: Spectre V2 : Mitigation: Retpolines May 10 00:40:02.127600 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 10 00:40:02.127616 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! May 10 00:40:02.127629 kernel: RETBleed: Vulnerable May 10 00:40:02.127643 kernel: Speculative Store Bypass: Vulnerable May 10 00:40:02.127656 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode May 10 00:40:02.127668 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 10 00:40:02.127682 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 10 00:40:02.127695 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 10 00:40:02.127708 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 10 00:40:02.127722 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' May 10 00:40:02.127735 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' May 10 00:40:02.127751 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' May 10 00:40:02.127764 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 10 00:40:02.127777 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 May 10 00:40:02.127790 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 May 10 00:40:02.127803 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 May 10 00:40:02.127817 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. May 10 00:40:02.127829 kernel: Freeing SMP alternatives memory: 32K May 10 00:40:02.127842 kernel: pid_max: default: 32768 minimum: 301 May 10 00:40:02.127859 kernel: LSM: Security Framework initializing May 10 00:40:02.127872 kernel: SELinux: Initializing. May 10 00:40:02.127885 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) May 10 00:40:02.127898 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) May 10 00:40:02.127914 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) May 10 00:40:02.127927 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. May 10 00:40:02.127941 kernel: signal: max sigframe size: 3632 May 10 00:40:02.127954 kernel: rcu: Hierarchical SRCU implementation. May 10 00:40:02.127967 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 10 00:40:02.127981 kernel: smp: Bringing up secondary CPUs ... May 10 00:40:02.127994 kernel: x86: Booting SMP configuration: May 10 00:40:02.128007 kernel: .... node #0, CPUs: #1 May 10 00:40:02.128020 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. May 10 00:40:02.128037 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. May 10 00:40:02.128051 kernel: smp: Brought up 1 node, 2 CPUs May 10 00:40:02.128064 kernel: smpboot: Max logical packages: 1 May 10 00:40:02.128077 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) May 10 00:40:02.128091 kernel: devtmpfs: initialized May 10 00:40:02.128104 kernel: x86/mm: Memory block size: 128MB May 10 00:40:02.128117 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) May 10 00:40:02.128131 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 10 00:40:02.128144 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 10 00:40:02.128159 kernel: pinctrl core: initialized pinctrl subsystem May 10 00:40:02.128173 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 10 00:40:02.128186 kernel: audit: initializing netlink subsys (disabled) May 10 00:40:02.128200 kernel: audit: type=2000 audit(1746837600.026:1): state=initialized audit_enabled=0 res=1 May 10 00:40:02.128213 kernel: thermal_sys: Registered thermal governor 'step_wise' May 10 00:40:02.128225 kernel: thermal_sys: Registered thermal governor 'user_space' May 10 00:40:02.128238 kernel: cpuidle: using governor menu May 10 00:40:02.128252 kernel: ACPI: bus type PCI registered May 10 00:40:02.128265 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 10 00:40:02.128280 kernel: dca service started, version 1.12.1 May 10 00:40:02.128294 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 10 00:40:02.128307 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 10 00:40:02.128320 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 10 00:40:02.128334 kernel: ACPI: Added _OSI(Module Device) May 10 00:40:02.128348 kernel: ACPI: Added _OSI(Processor Device) May 10 00:40:02.128361 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 10 00:40:02.128374 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 10 00:40:02.128387 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 10 00:40:02.128402 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 10 00:40:02.128416 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 10 00:40:02.128429 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 10 00:40:02.128442 kernel: ACPI: Interpreter enabled May 10 00:40:02.128456 kernel: ACPI: PM: (supports S0 S5) May 10 00:40:02.128469 kernel: ACPI: Using IOAPIC for interrupt routing May 10 00:40:02.128482 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 10 00:40:02.128494 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F May 10 00:40:02.128507 kernel: iommu: Default domain type: Translated May 10 00:40:02.128530 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 10 00:40:02.128543 kernel: vgaarb: loaded May 10 00:40:02.128557 kernel: pps_core: LinuxPPS API ver. 1 registered May 10 00:40:02.128570 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 10 00:40:02.128583 kernel: PTP clock support registered May 10 00:40:02.128596 kernel: Registered efivars operations May 10 00:40:02.128609 kernel: PCI: Using ACPI for IRQ routing May 10 00:40:02.128622 kernel: PCI: System does not support PCI May 10 00:40:02.128635 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page May 10 00:40:02.128651 kernel: VFS: Disk quotas dquot_6.6.0 May 10 00:40:02.128664 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 10 00:40:02.128678 kernel: pnp: PnP ACPI init May 10 00:40:02.128691 kernel: pnp: PnP ACPI: found 3 devices May 10 00:40:02.128705 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 10 00:40:02.128718 kernel: NET: Registered PF_INET protocol family May 10 00:40:02.128731 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 10 00:40:02.128745 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) May 10 00:40:02.128758 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 10 00:40:02.128774 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) May 10 00:40:02.128787 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) May 10 00:40:02.128801 kernel: TCP: Hash tables configured (established 65536 bind 65536) May 10 00:40:02.128813 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) May 10 00:40:02.128826 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) May 10 00:40:02.128839 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 10 00:40:02.128853 kernel: NET: Registered PF_XDP protocol family May 10 00:40:02.128867 kernel: PCI: CLS 0 bytes, default 64 May 10 00:40:02.128880 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 10 00:40:02.128895 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) May 10 00:40:02.128908 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 10 00:40:02.128921 kernel: Initialise system trusted keyrings May 10 00:40:02.128935 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 May 10 00:40:02.128948 kernel: Key type asymmetric registered May 10 00:40:02.128961 kernel: Asymmetric key parser 'x509' registered May 10 00:40:02.128974 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 10 00:40:02.128987 kernel: io scheduler mq-deadline registered May 10 00:40:02.129000 kernel: io scheduler kyber registered May 10 00:40:02.129016 kernel: io scheduler bfq registered May 10 00:40:02.129029 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 10 00:40:02.129042 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 10 00:40:02.129055 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 10 00:40:02.129068 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A May 10 00:40:02.129082 kernel: i8042: PNP: No PS/2 controller found. May 10 00:40:02.129264 kernel: rtc_cmos 00:02: registered as rtc0 May 10 00:40:02.129372 kernel: rtc_cmos 00:02: setting system clock to 2025-05-10T00:40:01 UTC (1746837601) May 10 00:40:02.129479 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram May 10 00:40:02.129497 kernel: intel_pstate: CPU model not supported May 10 00:40:02.129510 kernel: efifb: probing for efifb May 10 00:40:02.129531 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k May 10 00:40:02.129545 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 May 10 00:40:02.129558 kernel: efifb: scrolling: redraw May 10 00:40:02.129571 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 10 00:40:02.129585 kernel: Console: switching to colour frame buffer device 128x48 May 10 00:40:02.129601 kernel: fb0: EFI VGA frame buffer device May 10 00:40:02.129615 kernel: pstore: Registered efi as persistent store backend May 10 00:40:02.129628 kernel: NET: Registered PF_INET6 protocol family May 10 00:40:02.129641 kernel: Segment Routing with IPv6 May 10 00:40:02.129655 kernel: In-situ OAM (IOAM) with IPv6 May 10 00:40:02.129668 kernel: NET: Registered PF_PACKET protocol family May 10 00:40:02.129682 kernel: Key type dns_resolver registered May 10 00:40:02.129695 kernel: IPI shorthand broadcast: enabled May 10 00:40:02.129708 kernel: sched_clock: Marking stable (888598100, 30781500)->(1140132500, -220752900) May 10 00:40:02.129722 kernel: registered taskstats version 1 May 10 00:40:02.129737 kernel: Loading compiled-in X.509 certificates May 10 00:40:02.129751 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 0c62a22cd9157131d2e97d5a2e1bd9023e187117' May 10 00:40:02.129764 kernel: Key type .fscrypt registered May 10 00:40:02.129777 kernel: Key type fscrypt-provisioning registered May 10 00:40:02.129790 kernel: pstore: Using crash dump compression: deflate May 10 00:40:02.129803 kernel: ima: No TPM chip found, activating TPM-bypass! May 10 00:40:02.129817 kernel: ima: Allocated hash algorithm: sha1 May 10 00:40:02.129829 kernel: ima: No architecture policies found May 10 00:40:02.129845 kernel: clk: Disabling unused clocks May 10 00:40:02.129859 kernel: Freeing unused kernel image (initmem) memory: 47456K May 10 00:40:02.129873 kernel: Write protecting the kernel read-only data: 28672k May 10 00:40:02.129886 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 10 00:40:02.129899 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 10 00:40:02.129912 kernel: Run /init as init process May 10 00:40:02.129924 kernel: with arguments: May 10 00:40:02.129938 kernel: /init May 10 00:40:02.129951 kernel: with environment: May 10 00:40:02.129966 kernel: HOME=/ May 10 00:40:02.129979 kernel: TERM=linux May 10 00:40:02.129992 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 10 00:40:02.130008 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:40:02.130024 systemd[1]: Detected virtualization microsoft. May 10 00:40:02.130039 systemd[1]: Detected architecture x86-64. May 10 00:40:02.130053 systemd[1]: Running in initrd. May 10 00:40:02.130066 systemd[1]: No hostname configured, using default hostname. May 10 00:40:02.130081 systemd[1]: Hostname set to . May 10 00:40:02.130095 systemd[1]: Initializing machine ID from random generator. May 10 00:40:02.130109 systemd[1]: Queued start job for default target initrd.target. May 10 00:40:02.130122 systemd[1]: Started systemd-ask-password-console.path. May 10 00:40:02.130135 systemd[1]: Reached target cryptsetup.target. May 10 00:40:02.130149 systemd[1]: Reached target paths.target. May 10 00:40:02.130163 systemd[1]: Reached target slices.target. May 10 00:40:02.130177 systemd[1]: Reached target swap.target. May 10 00:40:02.130192 systemd[1]: Reached target timers.target. May 10 00:40:02.130207 systemd[1]: Listening on iscsid.socket. May 10 00:40:02.130221 systemd[1]: Listening on iscsiuio.socket. May 10 00:40:02.130235 systemd[1]: Listening on systemd-journald-audit.socket. May 10 00:40:02.130250 systemd[1]: Listening on systemd-journald-dev-log.socket. May 10 00:40:02.130264 systemd[1]: Listening on systemd-journald.socket. May 10 00:40:02.130278 systemd[1]: Listening on systemd-networkd.socket. May 10 00:40:02.130292 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:40:02.130308 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:40:02.130322 systemd[1]: Reached target sockets.target. May 10 00:40:02.130335 systemd[1]: Starting kmod-static-nodes.service... May 10 00:40:02.130349 systemd[1]: Finished network-cleanup.service. May 10 00:40:02.130364 systemd[1]: Starting systemd-fsck-usr.service... May 10 00:40:02.130378 systemd[1]: Starting systemd-journald.service... May 10 00:40:02.130392 systemd[1]: Starting systemd-modules-load.service... May 10 00:40:02.130406 systemd[1]: Starting systemd-resolved.service... May 10 00:40:02.130419 systemd[1]: Starting systemd-vconsole-setup.service... May 10 00:40:02.130435 systemd[1]: Finished kmod-static-nodes.service. May 10 00:40:02.130449 kernel: audit: type=1130 audit(1746837602.107:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:02.130464 systemd[1]: Finished systemd-fsck-usr.service. May 10 00:40:02.130484 systemd-journald[183]: Journal started May 10 00:40:02.135599 systemd-journald[183]: Runtime Journal (/run/log/journal/7f0a56c1e345447e9cbd130a6da18582) is 8.0M, max 159.0M, 151.0M free. May 10 00:40:02.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:02.101982 systemd-modules-load[184]: Inserted module 'overlay' May 10 00:40:02.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:02.141087 systemd-resolved[185]: Positive Trust Anchors: May 10 00:40:02.182770 kernel: audit: type=1130 audit(1746837602.141:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:02.182800 systemd[1]: Started systemd-journald.service. May 10 00:40:02.182821 kernel: audit: type=1130 audit(1746837602.161:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:02.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:02.141105 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:40:02.196147 kernel: audit: type=1130 audit(1746837602.161:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:02.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:02.141154 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:40:02.220800 kernel: audit: type=1130 audit(1746837602.161:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:02.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:02.156880 systemd-resolved[185]: Defaulting to hostname 'linux'. May 10 00:40:02.240768 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 10 00:40:02.163162 systemd[1]: Started systemd-resolved.service. May 10 00:40:02.163410 systemd[1]: Finished systemd-vconsole-setup.service. May 10 00:40:02.163769 systemd[1]: Reached target nss-lookup.target. May 10 00:40:02.184011 systemd[1]: Starting dracut-cmdline-ask.service... May 10 00:40:02.247687 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:40:02.258167 kernel: Bridge firewalling registered May 10 00:40:02.258233 systemd-modules-load[184]: Inserted module 'br_netfilter' May 10 00:40:02.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:02.264851 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:40:02.279599 kernel: audit: type=1130 audit(1746837602.264:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:02.289561 systemd[1]: Finished dracut-cmdline-ask.service. May 10 00:40:02.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:02.306544 kernel: audit: type=1130 audit(1746837602.291:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:02.306983 systemd[1]: Starting dracut-cmdline.service... May 10 00:40:02.315382 kernel: SCSI subsystem initialized May 10 00:40:02.322251 dracut-cmdline[201]: dracut-dracut-053 May 10 00:40:02.326905 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:40:02.358117 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 10 00:40:02.358190 kernel: device-mapper: uevent: version 1.0.3 May 10 00:40:02.358915 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 10 00:40:02.368159 systemd-modules-load[184]: Inserted module 'dm_multipath' May 10 00:40:02.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:02.368917 systemd[1]: Finished systemd-modules-load.service. May 10 00:40:02.391283 kernel: audit: type=1130 audit(1746837602.372:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:02.373454 systemd[1]: Starting systemd-sysctl.service... May 10 00:40:02.400876 systemd[1]: Finished systemd-sysctl.service. May 10 00:40:02.406647 kernel: Loading iSCSI transport class v2.0-870. May 10 00:40:02.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:02.419535 kernel: audit: type=1130 audit(1746837602.406:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:02.431530 kernel: iscsi: registered transport (tcp) May 10 00:40:02.464334 kernel: iscsi: registered transport (qla4xxx) May 10 00:40:02.464416 kernel: QLogic iSCSI HBA Driver May 10 00:40:02.494708 systemd[1]: Finished dracut-cmdline.service. May 10 00:40:02.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:02.499724 systemd[1]: Starting dracut-pre-udev.service... May 10 00:40:02.550537 kernel: raid6: avx512x4 gen() 18596 MB/s May 10 00:40:02.571536 kernel: raid6: avx512x4 xor() 6825 MB/s May 10 00:40:02.591531 kernel: raid6: avx512x2 gen() 18471 MB/s May 10 00:40:02.611532 kernel: raid6: avx512x2 xor() 29754 MB/s May 10 00:40:02.631529 kernel: raid6: avx512x1 gen() 18361 MB/s May 10 00:40:02.651551 kernel: raid6: avx512x1 xor() 26819 MB/s May 10 00:40:02.671546 kernel: raid6: avx2x4 gen() 18051 MB/s May 10 00:40:02.691531 kernel: raid6: avx2x4 xor() 6552 MB/s May 10 00:40:02.711532 kernel: raid6: avx2x2 gen() 17945 MB/s May 10 00:40:02.732530 kernel: raid6: avx2x2 xor() 21869 MB/s May 10 00:40:02.752530 kernel: raid6: avx2x1 gen() 13574 MB/s May 10 00:40:02.773528 kernel: raid6: avx2x1 xor() 19006 MB/s May 10 00:40:02.793533 kernel: raid6: sse2x4 gen() 11291 MB/s May 10 00:40:02.813529 kernel: raid6: sse2x4 xor() 6084 MB/s May 10 00:40:02.833527 kernel: raid6: sse2x2 gen() 12915 MB/s May 10 00:40:02.853533 kernel: raid6: sse2x2 xor() 7501 MB/s May 10 00:40:02.873530 kernel: raid6: sse2x1 gen() 11270 MB/s May 10 00:40:02.897559 kernel: raid6: sse2x1 xor() 5850 MB/s May 10 00:40:02.897582 kernel: raid6: using algorithm avx512x4 gen() 18596 MB/s May 10 00:40:02.897596 kernel: raid6: .... xor() 6825 MB/s, rmw enabled May 10 00:40:02.904128 kernel: raid6: using avx512x2 recovery algorithm May 10 00:40:02.919546 kernel: xor: automatically using best checksumming function avx May 10 00:40:03.014548 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 10 00:40:03.023045 systemd[1]: Finished dracut-pre-udev.service. May 10 00:40:03.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:03.028000 audit: BPF prog-id=7 op=LOAD May 10 00:40:03.028000 audit: BPF prog-id=8 op=LOAD May 10 00:40:03.030038 systemd[1]: Starting systemd-udevd.service... May 10 00:40:03.044857 systemd-udevd[384]: Using default interface naming scheme 'v252'. May 10 00:40:03.049599 systemd[1]: Started systemd-udevd.service. May 10 00:40:03.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:03.057989 systemd[1]: Starting dracut-pre-trigger.service... May 10 00:40:03.074286 dracut-pre-trigger[399]: rd.md=0: removing MD RAID activation May 10 00:40:03.107113 systemd[1]: Finished dracut-pre-trigger.service. May 10 00:40:03.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:03.110165 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:40:03.149474 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:40:03.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:03.195536 kernel: cryptd: max_cpu_qlen set to 1000 May 10 00:40:03.203540 kernel: hv_vmbus: Vmbus version:5.2 May 10 00:40:03.226540 kernel: AVX2 version of gcm_enc/dec engaged. May 10 00:40:03.231536 kernel: AES CTR mode by8 optimization enabled May 10 00:40:03.244837 kernel: hv_vmbus: registering driver hyperv_keyboard May 10 00:40:03.256544 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 May 10 00:40:03.278541 kernel: hid: raw HID events driver (C) Jiri Kosina May 10 00:40:03.284552 kernel: hv_vmbus: registering driver hv_storvsc May 10 00:40:03.293483 kernel: scsi host0: storvsc_host_t May 10 00:40:03.293567 kernel: scsi host1: storvsc_host_t May 10 00:40:03.293597 kernel: hv_vmbus: registering driver hid_hyperv May 10 00:40:03.301083 kernel: hv_vmbus: registering driver hv_netvsc May 10 00:40:03.301131 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 May 10 00:40:03.311252 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 May 10 00:40:03.311306 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on May 10 00:40:03.316738 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 May 10 00:40:03.359817 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) May 10 00:40:03.381898 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks May 10 00:40:03.382096 kernel: sd 0:0:0:0: [sda] Write Protect is off May 10 00:40:03.382257 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 May 10 00:40:03.382416 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA May 10 00:40:03.382619 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 10 00:40:03.382639 kernel: sd 0:0:0:0: [sda] Attached SCSI disk May 10 00:40:03.391926 kernel: sr 0:0:0:2: [sr0] scsi-1 drive May 10 00:40:03.395025 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 10 00:40:03.395041 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 May 10 00:40:03.517024 kernel: hv_netvsc 6045bdde-178e-6045-bdde-178e6045bdde eth0: VF slot 1 added May 10 00:40:03.530824 kernel: hv_vmbus: registering driver hv_pci May 10 00:40:03.530885 kernel: hv_pci f5b1d66a-3cee-4a3c-9405-efb77b947645: PCI VMBus probing: Using version 0x10004 May 10 00:40:03.621686 kernel: hv_pci f5b1d66a-3cee-4a3c-9405-efb77b947645: PCI host bridge to bus 3cee:00 May 10 00:40:03.621873 kernel: pci_bus 3cee:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] May 10 00:40:03.622049 kernel: pci_bus 3cee:00: No busn resource found for root bus, will use [bus 00-ff] May 10 00:40:03.622204 kernel: pci 3cee:00:02.0: [15b3:1016] type 00 class 0x020000 May 10 00:40:03.622382 kernel: pci 3cee:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] May 10 00:40:03.622562 kernel: pci 3cee:00:02.0: enabling Extended Tags May 10 00:40:03.622842 kernel: pci 3cee:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 3cee:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) May 10 00:40:03.623182 kernel: pci_bus 3cee:00: busn_res: [bus 00-ff] end is updated to 00 May 10 00:40:03.623477 kernel: pci 3cee:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] May 10 00:40:03.719576 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (446) May 10 00:40:03.735249 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 10 00:40:03.738112 kernel: mlx5_core 3cee:00:02.0: firmware version: 14.30.5000 May 10 00:40:04.026485 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 10 00:40:04.026506 kernel: mlx5_core 3cee:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) May 10 00:40:04.026667 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 10 00:40:04.026679 kernel: mlx5_core 3cee:00:02.0: Supported tc offload range - chains: 1, prios: 1 May 10 00:40:04.026777 kernel: mlx5_core 3cee:00:02.0: mlx5e_tc_post_act_init:40:(pid 187): firmware level support is missing May 10 00:40:04.026874 kernel: hv_netvsc 6045bdde-178e-6045-bdde-178e6045bdde eth0: VF registering: eth1 May 10 00:40:04.026976 kernel: mlx5_core 3cee:00:02.0 eth1: joined to eth0 May 10 00:40:03.755661 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:40:03.870499 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 10 00:40:03.875441 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 10 00:40:03.885539 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 10 00:40:03.889013 systemd[1]: Starting disk-uuid.service... May 10 00:40:04.054538 kernel: mlx5_core 3cee:00:02.0 enP15598s1: renamed from eth1 May 10 00:40:04.922541 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 10 00:40:04.923742 disk-uuid[560]: The operation has completed successfully. May 10 00:40:05.008922 systemd[1]: disk-uuid.service: Deactivated successfully. May 10 00:40:05.009033 systemd[1]: Finished disk-uuid.service. May 10 00:40:05.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:05.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:05.020129 systemd[1]: Starting verity-setup.service... May 10 00:40:05.055567 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 10 00:40:05.249290 systemd[1]: Found device dev-mapper-usr.device. May 10 00:40:05.256869 systemd[1]: Mounting sysusr-usr.mount... May 10 00:40:05.263322 systemd[1]: Finished verity-setup.service. May 10 00:40:05.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:05.337549 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 10 00:40:05.338055 systemd[1]: Mounted sysusr-usr.mount. May 10 00:40:05.340055 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 10 00:40:05.341406 systemd[1]: Starting ignition-setup.service... May 10 00:40:05.351239 systemd[1]: Starting parse-ip-for-networkd.service... May 10 00:40:05.372832 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:40:05.372889 kernel: BTRFS info (device sda6): using free space tree May 10 00:40:05.372907 kernel: BTRFS info (device sda6): has skinny extents May 10 00:40:05.421085 systemd[1]: Finished parse-ip-for-networkd.service. May 10 00:40:05.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:05.425000 audit: BPF prog-id=9 op=LOAD May 10 00:40:05.426024 systemd[1]: Starting systemd-networkd.service... May 10 00:40:05.440782 systemd[1]: mnt-oem.mount: Deactivated successfully. May 10 00:40:05.458122 systemd-networkd[805]: lo: Link UP May 10 00:40:05.458132 systemd-networkd[805]: lo: Gained carrier May 10 00:40:05.458703 systemd-networkd[805]: Enumeration completed May 10 00:40:05.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:05.458785 systemd[1]: Started systemd-networkd.service. May 10 00:40:05.466123 systemd-networkd[805]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:40:05.468345 systemd[1]: Reached target network.target. May 10 00:40:05.480477 systemd[1]: Starting iscsiuio.service... May 10 00:40:05.489290 systemd[1]: Started iscsiuio.service. May 10 00:40:05.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:05.502318 systemd[1]: Starting iscsid.service... May 10 00:40:05.507854 iscsid[814]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 10 00:40:05.507854 iscsid[814]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 10 00:40:05.507854 iscsid[814]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 10 00:40:05.507854 iscsid[814]: If using hardware iscsi like qla4xxx this message can be ignored. May 10 00:40:05.507854 iscsid[814]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 10 00:40:05.507854 iscsid[814]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 10 00:40:05.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:05.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:05.508615 systemd[1]: Started iscsid.service. May 10 00:40:05.514057 systemd[1]: Starting dracut-initqueue.service... May 10 00:40:05.528338 systemd[1]: Finished dracut-initqueue.service. May 10 00:40:05.532646 systemd[1]: Reached target remote-fs-pre.target. May 10 00:40:05.537355 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:40:05.545105 systemd[1]: Reached target remote-fs.target. May 10 00:40:05.551990 systemd[1]: Starting dracut-pre-mount.service... May 10 00:40:05.572539 kernel: mlx5_core 3cee:00:02.0 enP15598s1: Link up May 10 00:40:05.572794 systemd[1]: Finished dracut-pre-mount.service. May 10 00:40:05.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:05.583901 systemd[1]: Finished ignition-setup.service. May 10 00:40:05.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:05.588501 systemd[1]: Starting ignition-fetch-offline.service... May 10 00:40:05.615686 kernel: hv_netvsc 6045bdde-178e-6045-bdde-178e6045bdde eth0: Data path switched to VF: enP15598s1 May 10 00:40:05.625115 systemd-networkd[805]: enP15598s1: Link UP May 10 00:40:05.627297 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:40:05.625254 systemd-networkd[805]: eth0: Link UP May 10 00:40:05.625477 systemd-networkd[805]: eth0: Gained carrier May 10 00:40:05.634737 systemd-networkd[805]: enP15598s1: Gained carrier May 10 00:40:05.668634 systemd-networkd[805]: eth0: DHCPv4 address 10.200.8.26/24, gateway 10.200.8.1 acquired from 168.63.129.16 May 10 00:40:06.633799 systemd-networkd[805]: eth0: Gained IPv6LL May 10 00:40:07.471625 ignition[829]: Ignition 2.14.0 May 10 00:40:07.471641 ignition[829]: Stage: fetch-offline May 10 00:40:07.471742 ignition[829]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:40:07.471785 ignition[829]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 10 00:40:07.494961 ignition[829]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 10 00:40:07.531924 ignition[829]: parsed url from cmdline: "" May 10 00:40:07.531942 ignition[829]: no config URL provided May 10 00:40:07.531959 ignition[829]: reading system config file "/usr/lib/ignition/user.ign" May 10 00:40:07.531982 ignition[829]: no config at "/usr/lib/ignition/user.ign" May 10 00:40:07.531995 ignition[829]: failed to fetch config: resource requires networking May 10 00:40:07.532175 ignition[829]: Ignition finished successfully May 10 00:40:07.544288 systemd[1]: Finished ignition-fetch-offline.service. May 10 00:40:07.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:07.550977 systemd[1]: Starting ignition-fetch.service... May 10 00:40:07.568739 kernel: kauditd_printk_skb: 18 callbacks suppressed May 10 00:40:07.568775 kernel: audit: type=1130 audit(1746837607.545:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:07.559347 ignition[835]: Ignition 2.14.0 May 10 00:40:07.559353 ignition[835]: Stage: fetch May 10 00:40:07.559474 ignition[835]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:40:07.559502 ignition[835]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 10 00:40:07.563631 ignition[835]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 10 00:40:07.565689 ignition[835]: parsed url from cmdline: "" May 10 00:40:07.565695 ignition[835]: no config URL provided May 10 00:40:07.565702 ignition[835]: reading system config file "/usr/lib/ignition/user.ign" May 10 00:40:07.565714 ignition[835]: no config at "/usr/lib/ignition/user.ign" May 10 00:40:07.565748 ignition[835]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 May 10 00:40:07.656388 ignition[835]: GET result: OK May 10 00:40:07.656481 ignition[835]: config has been read from IMDS userdata May 10 00:40:07.656504 ignition[835]: parsing config with SHA512: 96f413a893a19db2a5b3beb55deda6fa833480b09a3bf49d70238aa3e6a3f5bde7d3b185414f7dbee42d3d0f90fc2e37b5d5f703b7d68c1269dc6cdbddaa7b48 May 10 00:40:07.660843 unknown[835]: fetched base config from "system" May 10 00:40:07.660863 unknown[835]: fetched base config from "system" May 10 00:40:07.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:07.661313 ignition[835]: fetch: fetch complete May 10 00:40:07.680588 kernel: audit: type=1130 audit(1746837607.664:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:07.660897 unknown[835]: fetched user config from "azure" May 10 00:40:07.661329 ignition[835]: fetch: fetch passed May 10 00:40:07.662920 systemd[1]: Finished ignition-fetch.service. May 10 00:40:07.661378 ignition[835]: Ignition finished successfully May 10 00:40:07.665912 systemd[1]: Starting ignition-kargs.service... May 10 00:40:07.697981 ignition[841]: Ignition 2.14.0 May 10 00:40:07.697991 ignition[841]: Stage: kargs May 10 00:40:07.698143 ignition[841]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:40:07.698178 ignition[841]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 10 00:40:07.710424 ignition[841]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 10 00:40:07.715010 ignition[841]: kargs: kargs passed May 10 00:40:07.715133 ignition[841]: Ignition finished successfully May 10 00:40:07.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:07.720639 systemd[1]: Finished ignition-kargs.service. May 10 00:40:07.737975 kernel: audit: type=1130 audit(1746837607.722:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:07.733188 ignition[847]: Ignition 2.14.0 May 10 00:40:07.724589 systemd[1]: Starting ignition-disks.service... May 10 00:40:07.733198 ignition[847]: Stage: disks May 10 00:40:07.733313 ignition[847]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:40:07.733334 ignition[847]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 10 00:40:07.748938 systemd[1]: Finished ignition-disks.service. May 10 00:40:07.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:07.746769 ignition[847]: no config dir at "/usr/lib/ignition/base.platform.d/azure" May 10 00:40:07.771664 kernel: audit: type=1130 audit(1746837607.752:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:07.753084 systemd[1]: Reached target initrd-root-device.target. May 10 00:40:07.748163 ignition[847]: disks: disks passed May 10 00:40:07.767163 systemd[1]: Reached target local-fs-pre.target. May 10 00:40:07.748216 ignition[847]: Ignition finished successfully May 10 00:40:07.771649 systemd[1]: Reached target local-fs.target. May 10 00:40:07.773582 systemd[1]: Reached target sysinit.target. May 10 00:40:07.777313 systemd[1]: Reached target basic.target. May 10 00:40:07.780452 systemd[1]: Starting systemd-fsck-root.service... May 10 00:40:07.824130 systemd-fsck[855]: ROOT: clean, 623/7326000 files, 481079/7359488 blocks May 10 00:40:07.828650 systemd[1]: Finished systemd-fsck-root.service. May 10 00:40:07.848127 kernel: audit: type=1130 audit(1746837607.830:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:07.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:07.844774 systemd[1]: Mounting sysroot.mount... May 10 00:40:07.875555 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 10 00:40:07.875566 systemd[1]: Mounted sysroot.mount. May 10 00:40:07.880219 systemd[1]: Reached target initrd-root-fs.target. May 10 00:40:07.906864 systemd[1]: Mounting sysroot-usr.mount... May 10 00:40:07.914767 systemd[1]: Starting flatcar-metadata-hostname.service... May 10 00:40:07.919319 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 10 00:40:07.919363 systemd[1]: Reached target ignition-diskful.target. May 10 00:40:07.927537 systemd[1]: Mounted sysroot-usr.mount. May 10 00:40:07.961057 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 00:40:07.966279 systemd[1]: Starting initrd-setup-root.service... May 10 00:40:07.984453 initrd-setup-root[870]: cut: /sysroot/etc/passwd: No such file or directory May 10 00:40:07.987832 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (865) May 10 00:40:07.996657 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:40:07.996705 kernel: BTRFS info (device sda6): using free space tree May 10 00:40:07.996724 kernel: BTRFS info (device sda6): has skinny extents May 10 00:40:08.003472 initrd-setup-root[894]: cut: /sysroot/etc/group: No such file or directory May 10 00:40:08.011087 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 00:40:08.018762 initrd-setup-root[904]: cut: /sysroot/etc/shadow: No such file or directory May 10 00:40:08.025264 initrd-setup-root[912]: cut: /sysroot/etc/gshadow: No such file or directory May 10 00:40:08.331781 systemd[1]: Finished initrd-setup-root.service. May 10 00:40:08.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:08.337134 systemd[1]: Starting ignition-mount.service... May 10 00:40:08.352808 kernel: audit: type=1130 audit(1746837608.335:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:08.351204 systemd[1]: Starting sysroot-boot.service... May 10 00:40:08.357707 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 10 00:40:08.360443 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 10 00:40:08.376948 ignition[932]: INFO : Ignition 2.14.0 May 10 00:40:08.379403 ignition[932]: INFO : Stage: mount May 10 00:40:08.381549 ignition[932]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:40:08.384977 ignition[932]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 10 00:40:08.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:08.408716 kernel: audit: type=1130 audit(1746837608.394:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:08.392160 systemd[1]: Finished sysroot-boot.service. May 10 00:40:08.414129 ignition[932]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 10 00:40:08.414129 ignition[932]: INFO : mount: mount passed May 10 00:40:08.414129 ignition[932]: INFO : Ignition finished successfully May 10 00:40:08.434278 kernel: audit: type=1130 audit(1746837608.418:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:08.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:08.412771 systemd[1]: Finished ignition-mount.service. May 10 00:40:08.820735 coreos-metadata[864]: May 10 00:40:08.820 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 May 10 00:40:08.833984 coreos-metadata[864]: May 10 00:40:08.833 INFO Fetch successful May 10 00:40:08.867532 coreos-metadata[864]: May 10 00:40:08.867 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 May 10 00:40:08.880494 coreos-metadata[864]: May 10 00:40:08.880 INFO Fetch successful May 10 00:40:08.891537 coreos-metadata[864]: May 10 00:40:08.891 INFO wrote hostname ci-3510.3.7-n-45b481fdfb to /sysroot/etc/hostname May 10 00:40:08.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:08.893408 systemd[1]: Finished flatcar-metadata-hostname.service. May 10 00:40:08.914578 kernel: audit: type=1130 audit(1746837608.897:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:08.898925 systemd[1]: Starting ignition-files.service... May 10 00:40:08.917846 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 00:40:08.929531 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (943) May 10 00:40:08.938445 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:40:08.938484 kernel: BTRFS info (device sda6): using free space tree May 10 00:40:08.938498 kernel: BTRFS info (device sda6): has skinny extents May 10 00:40:08.947062 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 00:40:08.961343 ignition[962]: INFO : Ignition 2.14.0 May 10 00:40:08.965443 ignition[962]: INFO : Stage: files May 10 00:40:08.965443 ignition[962]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:40:08.965443 ignition[962]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 10 00:40:08.978433 ignition[962]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 10 00:40:08.989733 ignition[962]: DEBUG : files: compiled without relabeling support, skipping May 10 00:40:08.993035 ignition[962]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 10 00:40:08.993035 ignition[962]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 10 00:40:09.039121 ignition[962]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 10 00:40:09.042986 ignition[962]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 10 00:40:09.050487 unknown[962]: wrote ssh authorized keys file for user: core May 10 00:40:09.053116 ignition[962]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 10 00:40:09.071463 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:40:09.079305 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:40:09.085175 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/systemd/system/waagent.service" May 10 00:40:09.090105 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(4): oem config not found in "/usr/share/oem", looking on oem partition May 10 00:40:09.097610 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3659864919" May 10 00:40:09.097610 ignition[962]: CRITICAL : files: createFilesystemsFiles: createFiles: op(4): op(5): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3659864919": device or resource busy May 10 00:40:09.097610 ignition[962]: ERROR : files: createFilesystemsFiles: createFiles: op(4): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3659864919", trying btrfs: device or resource busy May 10 00:40:09.097610 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3659864919" May 10 00:40:09.119367 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3659864919" May 10 00:40:09.119367 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [started] unmounting "/mnt/oem3659864919" May 10 00:40:09.119367 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [finished] unmounting "/mnt/oem3659864919" May 10 00:40:09.119367 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" May 10 00:40:09.119367 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" May 10 00:40:09.119367 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(8): oem config not found in "/usr/share/oem", looking on oem partition May 10 00:40:09.119367 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2190101070" May 10 00:40:09.119367 ignition[962]: CRITICAL : files: createFilesystemsFiles: createFiles: op(8): op(9): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2190101070": device or resource busy May 10 00:40:09.119367 ignition[962]: ERROR : files: createFilesystemsFiles: createFiles: op(8): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2190101070", trying btrfs: device or resource busy May 10 00:40:09.119367 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2190101070" May 10 00:40:09.180490 kernel: audit: type=1130 audit(1746837609.138:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.103435 systemd[1]: mnt-oem3659864919.mount: Deactivated successfully. May 10 00:40:09.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.187956 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2190101070" May 10 00:40:09.187956 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [started] unmounting "/mnt/oem2190101070" May 10 00:40:09.187956 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [finished] unmounting "/mnt/oem2190101070" May 10 00:40:09.187956 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" May 10 00:40:09.187956 ignition[962]: INFO : files: op(c): [started] processing unit "waagent.service" May 10 00:40:09.187956 ignition[962]: INFO : files: op(c): [finished] processing unit "waagent.service" May 10 00:40:09.187956 ignition[962]: INFO : files: op(d): [started] processing unit "nvidia.service" May 10 00:40:09.187956 ignition[962]: INFO : files: op(d): [finished] processing unit "nvidia.service" May 10 00:40:09.187956 ignition[962]: INFO : files: op(e): [started] setting preset to enabled for "waagent.service" May 10 00:40:09.187956 ignition[962]: INFO : files: op(e): [finished] setting preset to enabled for "waagent.service" May 10 00:40:09.187956 ignition[962]: INFO : files: op(f): [started] setting preset to enabled for "nvidia.service" May 10 00:40:09.187956 ignition[962]: INFO : files: op(f): [finished] setting preset to enabled for "nvidia.service" May 10 00:40:09.187956 ignition[962]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" May 10 00:40:09.187956 ignition[962]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" May 10 00:40:09.187956 ignition[962]: INFO : files: files passed May 10 00:40:09.187956 ignition[962]: INFO : Ignition finished successfully May 10 00:40:09.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.125875 systemd[1]: mnt-oem2190101070.mount: Deactivated successfully. May 10 00:40:09.132670 systemd[1]: Finished ignition-files.service. May 10 00:40:09.226433 initrd-setup-root-after-ignition[987]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 10 00:40:09.152698 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 10 00:40:09.169098 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 10 00:40:09.170713 systemd[1]: Starting ignition-quench.service... May 10 00:40:09.183037 systemd[1]: ignition-quench.service: Deactivated successfully. May 10 00:40:09.183166 systemd[1]: Finished ignition-quench.service. May 10 00:40:09.196541 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 10 00:40:09.221059 systemd[1]: Reached target ignition-complete.target. May 10 00:40:09.277270 systemd[1]: Starting initrd-parse-etc.service... May 10 00:40:09.305633 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 10 00:40:09.312238 systemd[1]: Finished initrd-parse-etc.service. May 10 00:40:09.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.317051 systemd[1]: Reached target initrd-fs.target. May 10 00:40:09.321476 systemd[1]: Reached target initrd.target. May 10 00:40:09.325850 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 10 00:40:09.327970 systemd[1]: Starting dracut-pre-pivot.service... May 10 00:40:09.343086 systemd[1]: Finished dracut-pre-pivot.service. May 10 00:40:09.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.347752 systemd[1]: Starting initrd-cleanup.service... May 10 00:40:09.358037 systemd[1]: Stopped target nss-lookup.target. May 10 00:40:09.362331 systemd[1]: Stopped target remote-cryptsetup.target. May 10 00:40:09.366937 systemd[1]: Stopped target timers.target. May 10 00:40:09.370558 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 10 00:40:09.370691 systemd[1]: Stopped dracut-pre-pivot.service. May 10 00:40:09.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.376287 systemd[1]: Stopped target initrd.target. May 10 00:40:09.379776 systemd[1]: Stopped target basic.target. May 10 00:40:09.383325 systemd[1]: Stopped target ignition-complete.target. May 10 00:40:09.387136 systemd[1]: Stopped target ignition-diskful.target. May 10 00:40:09.391814 systemd[1]: Stopped target initrd-root-device.target. May 10 00:40:09.396048 systemd[1]: Stopped target remote-fs.target. May 10 00:40:09.400118 systemd[1]: Stopped target remote-fs-pre.target. May 10 00:40:09.404042 systemd[1]: Stopped target sysinit.target. May 10 00:40:09.407960 systemd[1]: Stopped target local-fs.target. May 10 00:40:09.411634 systemd[1]: Stopped target local-fs-pre.target. May 10 00:40:09.415307 systemd[1]: Stopped target swap.target. May 10 00:40:09.421949 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 10 00:40:09.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.422225 systemd[1]: Stopped dracut-pre-mount.service. May 10 00:40:09.426224 systemd[1]: Stopped target cryptsetup.target. May 10 00:40:09.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.430408 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 10 00:40:09.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.430578 systemd[1]: Stopped dracut-initqueue.service. May 10 00:40:09.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.434389 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 10 00:40:09.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.434539 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 10 00:40:09.438847 systemd[1]: ignition-files.service: Deactivated successfully. May 10 00:40:09.438971 systemd[1]: Stopped ignition-files.service. May 10 00:40:09.443199 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. May 10 00:40:09.462229 ignition[1000]: INFO : Ignition 2.14.0 May 10 00:40:09.462229 ignition[1000]: INFO : Stage: umount May 10 00:40:09.462229 ignition[1000]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:40:09.462229 ignition[1000]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 May 10 00:40:09.477503 iscsid[814]: iscsid shutting down. May 10 00:40:09.443327 systemd[1]: Stopped flatcar-metadata-hostname.service. May 10 00:40:09.448400 systemd[1]: Stopping ignition-mount.service... May 10 00:40:09.464172 systemd[1]: Stopping iscsid.service... May 10 00:40:09.466596 systemd[1]: Stopping sysroot-boot.service... May 10 00:40:09.469258 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 10 00:40:09.471102 systemd[1]: Stopped systemd-udev-trigger.service. May 10 00:40:09.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.492588 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 10 00:40:09.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.498391 ignition[1000]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" May 10 00:40:09.498391 ignition[1000]: INFO : umount: umount passed May 10 00:40:09.492721 systemd[1]: Stopped dracut-pre-trigger.service. May 10 00:40:09.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.508381 ignition[1000]: INFO : Ignition finished successfully May 10 00:40:09.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.496163 systemd[1]: iscsid.service: Deactivated successfully. May 10 00:40:09.499045 systemd[1]: Stopped iscsid.service. May 10 00:40:09.505282 systemd[1]: ignition-mount.service: Deactivated successfully. May 10 00:40:09.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.505377 systemd[1]: Stopped ignition-mount.service. May 10 00:40:09.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.509649 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 10 00:40:09.509741 systemd[1]: Finished initrd-cleanup.service. May 10 00:40:09.513143 systemd[1]: ignition-disks.service: Deactivated successfully. May 10 00:40:09.513195 systemd[1]: Stopped ignition-disks.service. May 10 00:40:09.522198 systemd[1]: ignition-kargs.service: Deactivated successfully. May 10 00:40:09.524286 systemd[1]: Stopped ignition-kargs.service. May 10 00:40:09.531920 systemd[1]: ignition-fetch.service: Deactivated successfully. May 10 00:40:09.531975 systemd[1]: Stopped ignition-fetch.service. May 10 00:40:09.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.551511 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 10 00:40:09.551594 systemd[1]: Stopped ignition-fetch-offline.service. May 10 00:40:09.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.558334 systemd[1]: Stopped target paths.target. May 10 00:40:09.562272 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 10 00:40:09.564758 systemd[1]: Stopped systemd-ask-password-console.path. May 10 00:40:09.569107 systemd[1]: Stopped target slices.target. May 10 00:40:09.572734 systemd[1]: Stopped target sockets.target. May 10 00:40:09.576397 systemd[1]: iscsid.socket: Deactivated successfully. May 10 00:40:09.576458 systemd[1]: Closed iscsid.socket. May 10 00:40:09.582026 systemd[1]: ignition-setup.service: Deactivated successfully. May 10 00:40:09.584238 systemd[1]: Stopped ignition-setup.service. May 10 00:40:09.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.588146 systemd[1]: Stopping iscsiuio.service... May 10 00:40:09.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.589946 systemd[1]: sysroot-boot.service: Deactivated successfully. May 10 00:40:09.590047 systemd[1]: Stopped sysroot-boot.service. May 10 00:40:09.597854 systemd[1]: iscsiuio.service: Deactivated successfully. May 10 00:40:09.600036 systemd[1]: Stopped iscsiuio.service. May 10 00:40:09.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.603585 systemd[1]: Stopped target network.target. May 10 00:40:09.607212 systemd[1]: iscsiuio.socket: Deactivated successfully. May 10 00:40:09.607264 systemd[1]: Closed iscsiuio.socket. May 10 00:40:09.612742 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 10 00:40:09.612801 systemd[1]: Stopped initrd-setup-root.service. May 10 00:40:09.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.619211 systemd[1]: Stopping systemd-networkd.service... May 10 00:40:09.623298 systemd[1]: Stopping systemd-resolved.service... May 10 00:40:09.628581 systemd-networkd[805]: eth0: DHCPv6 lease lost May 10 00:40:09.631541 systemd[1]: systemd-networkd.service: Deactivated successfully. May 10 00:40:09.634228 systemd[1]: Stopped systemd-networkd.service. May 10 00:40:09.637000 audit: BPF prog-id=9 op=UNLOAD May 10 00:40:09.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.638544 systemd[1]: systemd-resolved.service: Deactivated successfully. May 10 00:40:09.643825 systemd[1]: Stopped systemd-resolved.service. May 10 00:40:09.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.648291 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 10 00:40:09.648352 systemd[1]: Closed systemd-networkd.socket. May 10 00:40:09.653000 audit: BPF prog-id=6 op=UNLOAD May 10 00:40:09.654894 systemd[1]: Stopping network-cleanup.service... May 10 00:40:09.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.656632 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 10 00:40:09.656704 systemd[1]: Stopped parse-ip-for-networkd.service. May 10 00:40:09.659057 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 10 00:40:09.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.659149 systemd[1]: Stopped systemd-sysctl.service. May 10 00:40:09.663100 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 10 00:40:09.665571 systemd[1]: Stopped systemd-modules-load.service. May 10 00:40:09.667755 systemd[1]: Stopping systemd-udevd.service... May 10 00:40:09.685309 systemd[1]: systemd-udevd.service: Deactivated successfully. May 10 00:40:09.685469 systemd[1]: Stopped systemd-udevd.service. May 10 00:40:09.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.691553 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 10 00:40:09.691606 systemd[1]: Closed systemd-udevd-control.socket. May 10 00:40:09.696275 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 10 00:40:09.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.696315 systemd[1]: Closed systemd-udevd-kernel.socket. May 10 00:40:09.700367 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 10 00:40:09.715576 kernel: hv_netvsc 6045bdde-178e-6045-bdde-178e6045bdde eth0: Data path switched from VF: enP15598s1 May 10 00:40:09.700420 systemd[1]: Stopped dracut-pre-udev.service. May 10 00:40:09.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.704961 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 10 00:40:09.705025 systemd[1]: Stopped dracut-cmdline.service. May 10 00:40:09.715638 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 10 00:40:09.715696 systemd[1]: Stopped dracut-cmdline-ask.service. May 10 00:40:09.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.728599 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 10 00:40:09.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.730852 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 10 00:40:09.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.730923 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 10 00:40:09.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:09.733441 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 10 00:40:09.733497 systemd[1]: Stopped kmod-static-nodes.service. May 10 00:40:09.739453 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 10 00:40:09.739512 systemd[1]: Stopped systemd-vconsole-setup.service. May 10 00:40:09.746926 systemd[1]: network-cleanup.service: Deactivated successfully. May 10 00:40:09.747049 systemd[1]: Stopped network-cleanup.service. May 10 00:40:09.749925 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 10 00:40:09.750047 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 10 00:40:09.759358 systemd[1]: Reached target initrd-switch-root.target. May 10 00:40:09.765173 systemd[1]: Starting initrd-switch-root.service... May 10 00:40:09.780073 systemd[1]: Switching root. May 10 00:40:09.804445 systemd-journald[183]: Journal stopped May 10 00:40:24.447339 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). May 10 00:40:24.447379 kernel: SELinux: Class mctp_socket not defined in policy. May 10 00:40:24.447397 kernel: SELinux: Class anon_inode not defined in policy. May 10 00:40:24.447413 kernel: SELinux: the above unknown classes and permissions will be allowed May 10 00:40:24.447426 kernel: SELinux: policy capability network_peer_controls=1 May 10 00:40:24.447440 kernel: SELinux: policy capability open_perms=1 May 10 00:40:24.447458 kernel: SELinux: policy capability extended_socket_class=1 May 10 00:40:24.447473 kernel: SELinux: policy capability always_check_network=0 May 10 00:40:24.447487 kernel: SELinux: policy capability cgroup_seclabel=1 May 10 00:40:24.447501 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 10 00:40:24.447549 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 10 00:40:24.447564 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 10 00:40:24.447580 systemd[1]: Successfully loaded SELinux policy in 198.236ms. May 10 00:40:24.447597 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 21.525ms. May 10 00:40:24.447620 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:40:24.447637 systemd[1]: Detected virtualization microsoft. May 10 00:40:24.447653 systemd[1]: Detected architecture x86-64. May 10 00:40:24.447668 systemd[1]: Detected first boot. May 10 00:40:24.447688 systemd[1]: Hostname set to . May 10 00:40:24.447705 systemd[1]: Initializing machine ID from random generator. May 10 00:40:24.447721 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 10 00:40:24.447736 kernel: kauditd_printk_skb: 51 callbacks suppressed May 10 00:40:24.447753 kernel: audit: type=1400 audit(1746837612.967:90): avc: denied { associate } for pid=1033 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 10 00:40:24.447769 kernel: audit: type=1300 audit(1746837612.967:90): arch=c000003e syscall=188 success=yes exit=0 a0=c000024802 a1=c00002aae0 a2=c000028d00 a3=32 items=0 ppid=1016 pid=1033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:24.447788 kernel: audit: type=1327 audit(1746837612.967:90): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:40:24.447804 kernel: audit: type=1400 audit(1746837612.974:91): avc: denied { associate } for pid=1033 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 10 00:40:24.447822 kernel: audit: type=1300 audit(1746837612.974:91): arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0000248d9 a2=1ed a3=0 items=2 ppid=1016 pid=1033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:24.447837 kernel: audit: type=1307 audit(1746837612.974:91): cwd="/" May 10 00:40:24.447852 kernel: audit: type=1302 audit(1746837612.974:91): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:40:24.447868 kernel: audit: type=1302 audit(1746837612.974:91): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:40:24.447887 kernel: audit: type=1327 audit(1746837612.974:91): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:40:24.447904 systemd[1]: Populated /etc with preset unit settings. May 10 00:40:24.447920 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:40:24.447937 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:40:24.447955 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:40:24.447970 kernel: audit: type=1334 audit(1746837623.814:92): prog-id=12 op=LOAD May 10 00:40:24.447984 kernel: audit: type=1334 audit(1746837623.814:93): prog-id=3 op=UNLOAD May 10 00:40:24.447999 kernel: audit: type=1334 audit(1746837623.820:94): prog-id=13 op=LOAD May 10 00:40:24.448017 kernel: audit: type=1334 audit(1746837623.826:95): prog-id=14 op=LOAD May 10 00:40:24.448032 kernel: audit: type=1334 audit(1746837623.826:96): prog-id=4 op=UNLOAD May 10 00:40:24.448052 kernel: audit: type=1334 audit(1746837623.826:97): prog-id=5 op=UNLOAD May 10 00:40:24.448067 kernel: audit: type=1334 audit(1746837623.831:98): prog-id=15 op=LOAD May 10 00:40:24.448083 kernel: audit: type=1334 audit(1746837623.831:99): prog-id=12 op=UNLOAD May 10 00:40:24.448098 kernel: audit: type=1334 audit(1746837623.853:100): prog-id=16 op=LOAD May 10 00:40:24.448114 kernel: audit: type=1334 audit(1746837623.858:101): prog-id=17 op=LOAD May 10 00:40:24.448127 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 10 00:40:24.448142 systemd[1]: Stopped initrd-switch-root.service. May 10 00:40:24.448161 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 10 00:40:24.448175 systemd[1]: Created slice system-addon\x2dconfig.slice. May 10 00:40:24.448192 systemd[1]: Created slice system-addon\x2drun.slice. May 10 00:40:24.448211 systemd[1]: Created slice system-getty.slice. May 10 00:40:24.448230 systemd[1]: Created slice system-modprobe.slice. May 10 00:40:24.448255 systemd[1]: Created slice system-serial\x2dgetty.slice. May 10 00:40:24.448274 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 10 00:40:24.448292 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 10 00:40:24.448309 systemd[1]: Created slice user.slice. May 10 00:40:24.448325 systemd[1]: Started systemd-ask-password-console.path. May 10 00:40:24.448341 systemd[1]: Started systemd-ask-password-wall.path. May 10 00:40:24.448358 systemd[1]: Set up automount boot.automount. May 10 00:40:24.448375 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 10 00:40:24.448391 systemd[1]: Stopped target initrd-switch-root.target. May 10 00:40:24.448407 systemd[1]: Stopped target initrd-fs.target. May 10 00:40:24.448424 systemd[1]: Stopped target initrd-root-fs.target. May 10 00:40:24.448443 systemd[1]: Reached target integritysetup.target. May 10 00:40:24.448460 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:40:24.448476 systemd[1]: Reached target remote-fs.target. May 10 00:40:24.448493 systemd[1]: Reached target slices.target. May 10 00:40:24.448509 systemd[1]: Reached target swap.target. May 10 00:40:24.448662 systemd[1]: Reached target torcx.target. May 10 00:40:24.448681 systemd[1]: Reached target veritysetup.target. May 10 00:40:24.448702 systemd[1]: Listening on systemd-coredump.socket. May 10 00:40:24.448718 systemd[1]: Listening on systemd-initctl.socket. May 10 00:40:24.448735 systemd[1]: Listening on systemd-networkd.socket. May 10 00:40:24.448754 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:40:24.448771 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:40:24.448790 systemd[1]: Listening on systemd-userdbd.socket. May 10 00:40:24.448806 systemd[1]: Mounting dev-hugepages.mount... May 10 00:40:24.448823 systemd[1]: Mounting dev-mqueue.mount... May 10 00:40:24.448840 systemd[1]: Mounting media.mount... May 10 00:40:24.448857 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:40:24.448874 systemd[1]: Mounting sys-kernel-debug.mount... May 10 00:40:24.448890 systemd[1]: Mounting sys-kernel-tracing.mount... May 10 00:40:24.448907 systemd[1]: Mounting tmp.mount... May 10 00:40:24.448924 systemd[1]: Starting flatcar-tmpfiles.service... May 10 00:40:24.448944 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:40:24.448961 systemd[1]: Starting kmod-static-nodes.service... May 10 00:40:24.448978 systemd[1]: Starting modprobe@configfs.service... May 10 00:40:24.448995 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:40:24.449012 systemd[1]: Starting modprobe@drm.service... May 10 00:40:24.449028 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:40:24.449047 systemd[1]: Starting modprobe@fuse.service... May 10 00:40:24.449064 systemd[1]: Starting modprobe@loop.service... May 10 00:40:24.449081 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 10 00:40:24.449101 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 10 00:40:24.449118 systemd[1]: Stopped systemd-fsck-root.service. May 10 00:40:24.449134 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 10 00:40:24.449151 systemd[1]: Stopped systemd-fsck-usr.service. May 10 00:40:24.449168 systemd[1]: Stopped systemd-journald.service. May 10 00:40:24.449184 systemd[1]: Starting systemd-journald.service... May 10 00:40:24.449201 systemd[1]: Starting systemd-modules-load.service... May 10 00:40:24.449218 systemd[1]: Starting systemd-network-generator.service... May 10 00:40:24.449235 systemd[1]: Starting systemd-remount-fs.service... May 10 00:40:24.449254 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:40:24.449270 kernel: loop: module loaded May 10 00:40:24.449287 systemd[1]: verity-setup.service: Deactivated successfully. May 10 00:40:24.449303 systemd[1]: Stopped verity-setup.service. May 10 00:40:24.449321 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:40:24.449338 systemd[1]: Mounted dev-hugepages.mount. May 10 00:40:24.449354 systemd[1]: Mounted dev-mqueue.mount. May 10 00:40:24.449371 systemd[1]: Mounted media.mount. May 10 00:40:24.449387 systemd[1]: Mounted sys-kernel-debug.mount. May 10 00:40:24.449408 systemd[1]: Mounted sys-kernel-tracing.mount. May 10 00:40:24.449424 systemd[1]: Mounted tmp.mount. May 10 00:40:24.449441 systemd[1]: Finished flatcar-tmpfiles.service. May 10 00:40:24.449457 systemd[1]: Finished kmod-static-nodes.service. May 10 00:40:24.449474 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 10 00:40:24.449491 systemd[1]: Finished modprobe@configfs.service. May 10 00:40:24.449509 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:40:24.449545 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:40:24.449562 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:40:24.449580 systemd[1]: Finished modprobe@drm.service. May 10 00:40:24.449597 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:40:24.449617 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:40:24.449640 systemd-journald[1142]: Journal started May 10 00:40:24.449720 systemd-journald[1142]: Runtime Journal (/run/log/journal/0c98c246fa824c229c75d5538902c6f0) is 8.0M, max 159.0M, 151.0M free. May 10 00:40:11.579000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 10 00:40:12.095000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 00:40:12.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:40:12.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:40:12.107000 audit: BPF prog-id=10 op=LOAD May 10 00:40:12.107000 audit: BPF prog-id=10 op=UNLOAD May 10 00:40:12.107000 audit: BPF prog-id=11 op=LOAD May 10 00:40:12.107000 audit: BPF prog-id=11 op=UNLOAD May 10 00:40:12.967000 audit[1033]: AVC avc: denied { associate } for pid=1033 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 10 00:40:12.967000 audit[1033]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c000024802 a1=c00002aae0 a2=c000028d00 a3=32 items=0 ppid=1016 pid=1033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:12.967000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:40:12.974000 audit[1033]: AVC avc: denied { associate } for pid=1033 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 10 00:40:12.974000 audit[1033]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0000248d9 a2=1ed a3=0 items=2 ppid=1016 pid=1033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:12.974000 audit: CWD cwd="/" May 10 00:40:12.974000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:40:12.974000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:40:12.974000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:40:23.814000 audit: BPF prog-id=12 op=LOAD May 10 00:40:23.814000 audit: BPF prog-id=3 op=UNLOAD May 10 00:40:23.820000 audit: BPF prog-id=13 op=LOAD May 10 00:40:23.826000 audit: BPF prog-id=14 op=LOAD May 10 00:40:23.826000 audit: BPF prog-id=4 op=UNLOAD May 10 00:40:23.826000 audit: BPF prog-id=5 op=UNLOAD May 10 00:40:23.831000 audit: BPF prog-id=15 op=LOAD May 10 00:40:23.831000 audit: BPF prog-id=12 op=UNLOAD May 10 00:40:23.853000 audit: BPF prog-id=16 op=LOAD May 10 00:40:23.858000 audit: BPF prog-id=17 op=LOAD May 10 00:40:23.858000 audit: BPF prog-id=13 op=UNLOAD May 10 00:40:23.858000 audit: BPF prog-id=14 op=UNLOAD May 10 00:40:23.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:23.881000 audit: BPF prog-id=15 op=UNLOAD May 10 00:40:23.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:23.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:24.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:24.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:24.455551 systemd[1]: Started systemd-journald.service. May 10 00:40:24.455575 kernel: fuse: init (API version 7.34) May 10 00:40:24.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:24.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:24.259000 audit: BPF prog-id=18 op=LOAD May 10 00:40:24.260000 audit: BPF prog-id=19 op=LOAD May 10 00:40:24.260000 audit: BPF prog-id=20 op=LOAD May 10 00:40:24.260000 audit: BPF prog-id=16 op=UNLOAD May 10 00:40:24.260000 audit: BPF prog-id=17 op=UNLOAD May 10 00:40:24.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:24.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:24.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:24.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:24.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:24.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:24.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:24.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:24.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:24.442000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 10 00:40:24.442000 audit[1142]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffcb7c98760 a2=4000 a3=7ffcb7c987fc items=0 ppid=1 pid=1142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:24.442000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 10 00:40:24.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:24.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:12.936848 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2025-05-10T00:40:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:40:23.813602 systemd[1]: Queued start job for default target multi-user.target. May 10 00:40:12.946781 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2025-05-10T00:40:12Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:40:23.813616 systemd[1]: Unnecessary job was removed for dev-sda6.device. May 10 00:40:12.946818 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2025-05-10T00:40:12Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:40:23.859856 systemd[1]: systemd-journald.service: Deactivated successfully. May 10 00:40:12.946867 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2025-05-10T00:40:12Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 10 00:40:12.946879 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2025-05-10T00:40:12Z" level=debug msg="skipped missing lower profile" missing profile=oem May 10 00:40:12.946930 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2025-05-10T00:40:12Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 10 00:40:12.946945 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2025-05-10T00:40:12Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 10 00:40:12.947198 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2025-05-10T00:40:12Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 10 00:40:12.947237 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2025-05-10T00:40:12Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:40:12.947259 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2025-05-10T00:40:12Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:40:12.957805 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2025-05-10T00:40:12Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 10 00:40:12.957849 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2025-05-10T00:40:12Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 10 00:40:12.957884 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2025-05-10T00:40:12Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 10 00:40:12.957900 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2025-05-10T00:40:12Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 10 00:40:12.957921 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2025-05-10T00:40:12Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 10 00:40:12.957934 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2025-05-10T00:40:12Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 10 00:40:22.456278 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2025-05-10T00:40:22Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:40:22.456594 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2025-05-10T00:40:22Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:40:22.456728 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2025-05-10T00:40:22Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:40:22.457134 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2025-05-10T00:40:22Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:40:22.457187 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2025-05-10T00:40:22Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 10 00:40:22.457248 /usr/lib/systemd/system-generators/torcx-generator[1033]: time="2025-05-10T00:40:22Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 10 00:40:24.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:24.461267 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 10 00:40:24.461430 systemd[1]: Finished modprobe@fuse.service. May 10 00:40:24.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:24.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:24.463994 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:40:24.464142 systemd[1]: Finished modprobe@loop.service. May 10 00:40:24.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:24.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:24.466353 systemd[1]: Finished systemd-network-generator.service. May 10 00:40:24.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:24.468791 systemd[1]: Finished systemd-remount-fs.service. May 10 00:40:24.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:24.471283 systemd[1]: Reached target network-pre.target. May 10 00:40:24.474792 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 10 00:40:24.478117 systemd[1]: Mounting sys-kernel-config.mount... May 10 00:40:24.482618 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 10 00:40:24.484988 systemd[1]: Starting systemd-hwdb-update.service... May 10 00:40:24.488035 systemd[1]: Starting systemd-journal-flush.service... May 10 00:40:24.489909 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:40:24.491163 systemd[1]: Starting systemd-random-seed.service... May 10 00:40:24.493271 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:40:24.494424 systemd[1]: Starting systemd-sysusers.service... May 10 00:40:24.498185 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 10 00:40:24.500513 systemd[1]: Mounted sys-kernel-config.mount. May 10 00:40:24.812440 systemd-journald[1142]: Time spent on flushing to /var/log/journal/0c98c246fa824c229c75d5538902c6f0 is 27.309ms for 1123 entries. May 10 00:40:24.812440 systemd-journald[1142]: System Journal (/var/log/journal/0c98c246fa824c229c75d5538902c6f0) is 8.0M, max 2.6G, 2.6G free. May 10 00:40:25.129489 systemd-journald[1142]: Received client request to flush runtime journal. May 10 00:40:24.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:24.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:24.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:25.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:24.844179 systemd[1]: Finished systemd-random-seed.service. May 10 00:40:24.848561 systemd[1]: Reached target first-boot-complete.target. May 10 00:40:25.130374 udevadm[1157]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 10 00:40:24.852663 systemd[1]: Finished systemd-modules-load.service. May 10 00:40:24.856872 systemd[1]: Starting systemd-sysctl.service... May 10 00:40:24.994383 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:40:25.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:24.998224 systemd[1]: Starting systemd-udev-settle.service... May 10 00:40:25.045949 systemd[1]: Finished systemd-sysctl.service. May 10 00:40:25.130724 systemd[1]: Finished systemd-journal-flush.service. May 10 00:40:25.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:25.851434 systemd[1]: Finished systemd-sysusers.service. May 10 00:40:25.855937 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:40:26.568816 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:40:26.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:27.455529 systemd[1]: Finished systemd-hwdb-update.service. May 10 00:40:27.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:27.458000 audit: BPF prog-id=21 op=LOAD May 10 00:40:27.458000 audit: BPF prog-id=22 op=LOAD May 10 00:40:27.458000 audit: BPF prog-id=7 op=UNLOAD May 10 00:40:27.458000 audit: BPF prog-id=8 op=UNLOAD May 10 00:40:27.459504 systemd[1]: Starting systemd-udevd.service... May 10 00:40:27.479199 systemd-udevd[1161]: Using default interface naming scheme 'v252'. May 10 00:40:27.599641 systemd[1]: Started systemd-udevd.service. May 10 00:40:27.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:27.602000 audit: BPF prog-id=23 op=LOAD May 10 00:40:27.604086 systemd[1]: Starting systemd-networkd.service... May 10 00:40:27.641441 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 10 00:40:27.696000 audit: BPF prog-id=24 op=LOAD May 10 00:40:27.696000 audit: BPF prog-id=25 op=LOAD May 10 00:40:27.696000 audit: BPF prog-id=26 op=LOAD May 10 00:40:27.698533 systemd[1]: Starting systemd-userdbd.service... May 10 00:40:27.718544 kernel: mousedev: PS/2 mouse device common for all mice May 10 00:40:27.745000 audit[1173]: AVC avc: denied { confidentiality } for pid=1173 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 00:40:27.771668 kernel: hv_vmbus: registering driver hv_balloon May 10 00:40:27.778542 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 May 10 00:40:27.745000 audit[1173]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56444587bc40 a1=f884 a2=7fd54cd89bc5 a3=5 items=12 ppid=1161 pid=1173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:27.745000 audit: CWD cwd="/" May 10 00:40:27.745000 audit: PATH item=0 name=(null) inode=1237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:40:27.745000 audit: PATH item=1 name=(null) inode=15244 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:40:27.745000 audit: PATH item=2 name=(null) inode=15244 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:40:27.745000 audit: PATH item=3 name=(null) inode=15245 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:40:27.745000 audit: PATH item=4 name=(null) inode=15244 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:40:27.745000 audit: PATH item=5 name=(null) inode=15246 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:40:27.745000 audit: PATH item=6 name=(null) inode=15244 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:40:27.745000 audit: PATH item=7 name=(null) inode=15247 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:40:27.745000 audit: PATH item=8 name=(null) inode=15244 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:40:27.745000 audit: PATH item=9 name=(null) inode=15248 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:40:27.745000 audit: PATH item=10 name=(null) inode=15244 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:40:27.745000 audit: PATH item=11 name=(null) inode=15249 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:40:27.745000 audit: PROCTITLE proctitle="(udev-worker)" May 10 00:40:27.815302 systemd[1]: Started systemd-userdbd.service. May 10 00:40:27.817533 kernel: hv_vmbus: registering driver hyperv_fb May 10 00:40:27.828076 kernel: hv_utils: Registering HyperV Utility Driver May 10 00:40:27.828185 kernel: hv_vmbus: registering driver hv_utils May 10 00:40:27.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:27.841139 kernel: hyperv_fb: Synthvid Version major 3, minor 5 May 10 00:40:27.841226 kernel: hv_utils: Heartbeat IC version 3.0 May 10 00:40:27.841247 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 May 10 00:40:27.841265 kernel: hv_utils: Shutdown IC version 3.2 May 10 00:40:27.844615 kernel: hv_utils: TimeSync IC version 4.0 May 10 00:40:27.844690 kernel: Console: switching to colour dummy device 80x25 May 10 00:40:28.163781 kernel: Console: switching to colour frame buffer device 128x48 May 10 00:40:28.790949 kernel: KVM: vmx: using Hyper-V Enlightened VMCS May 10 00:40:28.873303 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:40:28.905151 systemd[1]: Finished systemd-udev-settle.service. May 10 00:40:28.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:28.908594 systemd[1]: Starting lvm2-activation-early.service... May 10 00:40:28.926546 systemd-networkd[1167]: lo: Link UP May 10 00:40:28.926560 systemd-networkd[1167]: lo: Gained carrier May 10 00:40:28.927253 systemd-networkd[1167]: Enumeration completed May 10 00:40:28.927425 systemd[1]: Started systemd-networkd.service. May 10 00:40:28.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:28.932093 systemd[1]: Starting systemd-networkd-wait-online.service... May 10 00:40:28.954374 systemd-networkd[1167]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:40:29.016793 kernel: mlx5_core 3cee:00:02.0 enP15598s1: Link up May 10 00:40:29.041785 kernel: hv_netvsc 6045bdde-178e-6045-bdde-178e6045bdde eth0: Data path switched to VF: enP15598s1 May 10 00:40:29.042443 systemd-networkd[1167]: enP15598s1: Link UP May 10 00:40:29.042727 systemd-networkd[1167]: eth0: Link UP May 10 00:40:29.042838 systemd-networkd[1167]: eth0: Gained carrier May 10 00:40:29.050136 systemd-networkd[1167]: enP15598s1: Gained carrier May 10 00:40:29.087956 systemd-networkd[1167]: eth0: DHCPv4 address 10.200.8.26/24, gateway 10.200.8.1 acquired from 168.63.129.16 May 10 00:40:29.444626 lvm[1238]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:40:29.481937 systemd[1]: Finished lvm2-activation-early.service. May 10 00:40:29.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:29.484570 systemd[1]: Reached target cryptsetup.target. May 10 00:40:29.487053 kernel: kauditd_printk_skb: 72 callbacks suppressed May 10 00:40:29.487124 kernel: audit: type=1130 audit(1746837629.483:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:29.500874 systemd[1]: Starting lvm2-activation.service... May 10 00:40:29.506904 lvm[1240]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:40:29.536076 systemd[1]: Finished lvm2-activation.service. May 10 00:40:29.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:29.540050 systemd[1]: Reached target local-fs-pre.target. May 10 00:40:29.557155 kernel: audit: type=1130 audit(1746837629.538:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:29.560240 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 10 00:40:29.560290 systemd[1]: Reached target local-fs.target. May 10 00:40:29.562321 systemd[1]: Reached target machines.target. May 10 00:40:29.565802 systemd[1]: Starting ldconfig.service... May 10 00:40:29.568556 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:40:29.568665 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:40:29.570007 systemd[1]: Starting systemd-boot-update.service... May 10 00:40:29.573894 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 10 00:40:29.578363 systemd[1]: Starting systemd-machine-id-commit.service... May 10 00:40:29.583526 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. May 10 00:40:29.583622 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. May 10 00:40:29.585031 systemd[1]: Starting systemd-tmpfiles-setup.service... May 10 00:40:29.599376 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1242 (bootctl) May 10 00:40:29.600850 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 10 00:40:29.757694 systemd-tmpfiles[1245]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 10 00:40:30.011825 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 10 00:40:30.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:30.026775 kernel: audit: type=1130 audit(1746837630.014:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:30.055150 systemd-tmpfiles[1245]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 10 00:40:30.214999 systemd-tmpfiles[1245]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 10 00:40:30.883059 systemd-networkd[1167]: eth0: Gained IPv6LL May 10 00:40:31.547778 kernel: audit: type=1130 audit(1746837630.891:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:30.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:30.888734 systemd[1]: Finished systemd-networkd-wait-online.service. May 10 00:40:32.798822 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 10 00:40:32.799564 systemd[1]: Finished systemd-machine-id-commit.service. May 10 00:40:32.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:32.814824 kernel: audit: type=1130 audit(1746837632.801:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:33.518369 systemd-fsck[1250]: fsck.fat 4.2 (2021-01-31) May 10 00:40:33.518369 systemd-fsck[1250]: /dev/sda1: 790 files, 120688/258078 clusters May 10 00:40:33.521015 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 10 00:40:33.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:33.525448 systemd[1]: Mounting boot.mount... May 10 00:40:33.537140 kernel: audit: type=1130 audit(1746837633.523:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:33.555431 systemd[1]: Mounted boot.mount. May 10 00:40:33.571640 systemd[1]: Finished systemd-boot-update.service. May 10 00:40:33.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:33.585921 kernel: audit: type=1130 audit(1746837633.573:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:34.124073 systemd[1]: Finished systemd-tmpfiles-setup.service. May 10 00:40:34.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:34.130828 systemd[1]: Starting audit-rules.service... May 10 00:40:34.149727 kernel: audit: type=1130 audit(1746837634.126:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:34.151259 systemd[1]: Starting clean-ca-certificates.service... May 10 00:40:34.156140 systemd[1]: Starting systemd-journal-catalog-update.service... May 10 00:40:34.159000 audit: BPF prog-id=27 op=LOAD May 10 00:40:34.160947 systemd[1]: Starting systemd-resolved.service... May 10 00:40:34.179552 kernel: audit: type=1334 audit(1746837634.159:165): prog-id=27 op=LOAD May 10 00:40:34.179639 kernel: audit: type=1334 audit(1746837634.169:166): prog-id=28 op=LOAD May 10 00:40:34.169000 audit: BPF prog-id=28 op=LOAD May 10 00:40:34.171056 systemd[1]: Starting systemd-timesyncd.service... May 10 00:40:34.178504 systemd[1]: Starting systemd-update-utmp.service... May 10 00:40:34.185000 audit[1262]: SYSTEM_BOOT pid=1262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 10 00:40:34.191560 systemd[1]: Finished systemd-update-utmp.service. May 10 00:40:34.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:34.260385 systemd[1]: Finished clean-ca-certificates.service. May 10 00:40:34.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:34.263241 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:40:34.269059 systemd[1]: Started systemd-timesyncd.service. May 10 00:40:34.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:34.271488 systemd[1]: Reached target time-set.target. May 10 00:40:34.571450 systemd[1]: Finished systemd-journal-catalog-update.service. May 10 00:40:34.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:34.578819 kernel: kauditd_printk_skb: 4 callbacks suppressed May 10 00:40:34.578907 kernel: audit: type=1130 audit(1746837634.574:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:40:34.725548 systemd-resolved[1260]: Positive Trust Anchors: May 10 00:40:34.725570 systemd-resolved[1260]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:40:34.725620 systemd-resolved[1260]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:40:34.807347 systemd-timesyncd[1261]: Contacted time server 193.1.12.167:123 (0.flatcar.pool.ntp.org). May 10 00:40:34.807520 systemd-timesyncd[1261]: Initial clock synchronization to Sat 2025-05-10 00:40:34.807527 UTC. May 10 00:40:34.808000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 10 00:40:34.810230 systemd[1]: Finished audit-rules.service. May 10 00:40:34.810995 augenrules[1278]: No rules May 10 00:40:34.808000 audit[1278]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdfe029d10 a2=420 a3=0 items=0 ppid=1257 pid=1278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:34.821782 kernel: audit: type=1305 audit(1746837634.808:172): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 10 00:40:34.821837 kernel: audit: type=1300 audit(1746837634.808:172): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdfe029d10 a2=420 a3=0 items=0 ppid=1257 pid=1278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:40:34.808000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 10 00:40:34.822771 kernel: audit: type=1327 audit(1746837634.808:172): proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 10 00:40:34.823897 systemd-resolved[1260]: Using system hostname 'ci-3510.3.7-n-45b481fdfb'. May 10 00:40:34.851841 systemd[1]: Started systemd-resolved.service. May 10 00:40:34.854097 systemd[1]: Reached target network.target. May 10 00:40:34.856078 systemd[1]: Reached target network-online.target. May 10 00:40:34.858344 systemd[1]: Reached target nss-lookup.target. May 10 00:40:38.136119 ldconfig[1241]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 10 00:40:38.153926 systemd[1]: Finished ldconfig.service. May 10 00:40:38.158058 systemd[1]: Starting systemd-update-done.service... May 10 00:40:38.164831 systemd[1]: Finished systemd-update-done.service. May 10 00:40:38.167459 systemd[1]: Reached target sysinit.target. May 10 00:40:38.169524 systemd[1]: Started motdgen.path. May 10 00:40:38.171336 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 10 00:40:38.174084 systemd[1]: Started logrotate.timer. May 10 00:40:38.175856 systemd[1]: Started mdadm.timer. May 10 00:40:38.177385 systemd[1]: Started systemd-tmpfiles-clean.timer. May 10 00:40:38.179469 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 10 00:40:38.179507 systemd[1]: Reached target paths.target. May 10 00:40:38.181468 systemd[1]: Reached target timers.target. May 10 00:40:38.183538 systemd[1]: Listening on dbus.socket. May 10 00:40:38.186418 systemd[1]: Starting docker.socket... May 10 00:40:38.199964 systemd[1]: Listening on sshd.socket. May 10 00:40:38.202157 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:40:38.202641 systemd[1]: Listening on docker.socket. May 10 00:40:38.204576 systemd[1]: Reached target sockets.target. May 10 00:40:38.206556 systemd[1]: Reached target basic.target. May 10 00:40:38.208487 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:40:38.208523 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:40:38.209603 systemd[1]: Starting containerd.service... May 10 00:40:38.212538 systemd[1]: Starting dbus.service... May 10 00:40:38.217398 systemd[1]: Starting enable-oem-cloudinit.service... May 10 00:40:38.220604 systemd[1]: Starting extend-filesystems.service... May 10 00:40:38.222622 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 10 00:40:38.223964 systemd[1]: Starting motdgen.service... May 10 00:40:38.227315 systemd[1]: Started nvidia.service. May 10 00:40:38.230518 systemd[1]: Starting ssh-key-proc-cmdline.service... May 10 00:40:38.234458 systemd[1]: Starting sshd-keygen.service... May 10 00:40:38.239342 systemd[1]: Starting systemd-logind.service... May 10 00:40:38.244576 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:40:38.244671 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 10 00:40:38.245221 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 10 00:40:38.246491 systemd[1]: Starting update-engine.service... May 10 00:40:38.251526 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 10 00:40:38.256309 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 10 00:40:38.256538 systemd[1]: Finished ssh-key-proc-cmdline.service. May 10 00:40:38.257409 jq[1288]: false May 10 00:40:38.261047 jq[1301]: true May 10 00:40:38.261426 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 10 00:40:38.261646 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 10 00:40:38.280273 jq[1304]: true May 10 00:40:38.316598 systemd[1]: motdgen.service: Deactivated successfully. May 10 00:40:38.316830 systemd[1]: Finished motdgen.service. May 10 00:40:38.333878 extend-filesystems[1289]: Found sda May 10 00:40:38.333878 extend-filesystems[1289]: Found sda1 May 10 00:40:38.333878 extend-filesystems[1289]: Found sda2 May 10 00:40:38.333878 extend-filesystems[1289]: Found sda3 May 10 00:40:38.333878 extend-filesystems[1289]: Found usr May 10 00:40:38.333878 extend-filesystems[1289]: Found sda4 May 10 00:40:38.333878 extend-filesystems[1289]: Found sda6 May 10 00:40:38.333878 extend-filesystems[1289]: Found sda7 May 10 00:40:38.333878 extend-filesystems[1289]: Found sda9 May 10 00:40:38.333878 extend-filesystems[1289]: Checking size of /dev/sda9 May 10 00:40:38.395938 systemd-logind[1296]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 10 00:40:38.401261 systemd-logind[1296]: New seat seat0. May 10 00:40:38.406052 extend-filesystems[1289]: Old size kept for /dev/sda9 May 10 00:40:38.411446 extend-filesystems[1289]: Found sr0 May 10 00:40:38.406601 systemd[1]: extend-filesystems.service: Deactivated successfully. May 10 00:40:38.414197 dbus-daemon[1287]: [system] SELinux support is enabled May 10 00:40:38.417586 env[1308]: time="2025-05-10T00:40:38.412898634Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 10 00:40:38.406781 systemd[1]: Finished extend-filesystems.service. May 10 00:40:38.414361 systemd[1]: Started dbus.service. May 10 00:40:38.417865 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 10 00:40:38.417894 systemd[1]: Reached target system-config.target. May 10 00:40:38.419901 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 10 00:40:38.419922 systemd[1]: Reached target user-config.target. May 10 00:40:38.429926 systemd[1]: Started systemd-logind.service. May 10 00:40:38.442439 bash[1335]: Updated "/home/core/.ssh/authorized_keys" May 10 00:40:38.443288 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 10 00:40:38.483267 env[1308]: time="2025-05-10T00:40:38.483202342Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 10 00:40:38.483432 env[1308]: time="2025-05-10T00:40:38.483403445Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 10 00:40:38.485291 env[1308]: time="2025-05-10T00:40:38.485243874Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 10 00:40:38.485291 env[1308]: time="2025-05-10T00:40:38.485285474Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 10 00:40:38.485595 env[1308]: time="2025-05-10T00:40:38.485565479Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:40:38.485666 env[1308]: time="2025-05-10T00:40:38.485597179Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 10 00:40:38.485666 env[1308]: time="2025-05-10T00:40:38.485615780Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 10 00:40:38.485666 env[1308]: time="2025-05-10T00:40:38.485630080Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 10 00:40:38.485811 env[1308]: time="2025-05-10T00:40:38.485731581Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 10 00:40:38.486043 env[1308]: time="2025-05-10T00:40:38.486015186Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 10 00:40:38.486239 env[1308]: time="2025-05-10T00:40:38.486211389Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:40:38.486291 env[1308]: time="2025-05-10T00:40:38.486238989Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 10 00:40:38.486339 env[1308]: time="2025-05-10T00:40:38.486306890Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 10 00:40:38.486339 env[1308]: time="2025-05-10T00:40:38.486325291Z" level=info msg="metadata content store policy set" policy=shared May 10 00:40:38.491949 systemd[1]: nvidia.service: Deactivated successfully. May 10 00:40:38.506760 env[1308]: time="2025-05-10T00:40:38.506712512Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 10 00:40:38.506888 env[1308]: time="2025-05-10T00:40:38.506821414Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 10 00:40:38.506888 env[1308]: time="2025-05-10T00:40:38.506844714Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 10 00:40:38.506973 env[1308]: time="2025-05-10T00:40:38.506890515Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 10 00:40:38.506973 env[1308]: time="2025-05-10T00:40:38.506915115Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 10 00:40:38.506973 env[1308]: time="2025-05-10T00:40:38.506935915Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 10 00:40:38.506973 env[1308]: time="2025-05-10T00:40:38.506955816Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 10 00:40:38.507112 env[1308]: time="2025-05-10T00:40:38.506976116Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 10 00:40:38.507112 env[1308]: time="2025-05-10T00:40:38.506994716Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 10 00:40:38.507112 env[1308]: time="2025-05-10T00:40:38.507021717Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 10 00:40:38.507112 env[1308]: time="2025-05-10T00:40:38.507042517Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 10 00:40:38.507112 env[1308]: time="2025-05-10T00:40:38.507061617Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 10 00:40:38.507291 env[1308]: time="2025-05-10T00:40:38.507202420Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 10 00:40:38.507332 env[1308]: time="2025-05-10T00:40:38.507299421Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 10 00:40:38.507634 env[1308]: time="2025-05-10T00:40:38.507611126Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 10 00:40:38.507710 env[1308]: time="2025-05-10T00:40:38.507653427Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 10 00:40:38.507710 env[1308]: time="2025-05-10T00:40:38.507674327Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 10 00:40:38.507824 env[1308]: time="2025-05-10T00:40:38.507735428Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 10 00:40:38.507824 env[1308]: time="2025-05-10T00:40:38.507772629Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 10 00:40:38.507824 env[1308]: time="2025-05-10T00:40:38.507792329Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 10 00:40:38.507824 env[1308]: time="2025-05-10T00:40:38.507809829Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 10 00:40:38.507958 env[1308]: time="2025-05-10T00:40:38.507828129Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 10 00:40:38.507958 env[1308]: time="2025-05-10T00:40:38.507847830Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 10 00:40:38.507958 env[1308]: time="2025-05-10T00:40:38.507866930Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 10 00:40:38.507958 env[1308]: time="2025-05-10T00:40:38.507885130Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 10 00:40:38.507958 env[1308]: time="2025-05-10T00:40:38.507905231Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 10 00:40:38.508146 env[1308]: time="2025-05-10T00:40:38.508067133Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 10 00:40:38.508146 env[1308]: time="2025-05-10T00:40:38.508090134Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 10 00:40:38.508146 env[1308]: time="2025-05-10T00:40:38.508108234Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 10 00:40:38.508146 env[1308]: time="2025-05-10T00:40:38.508127534Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 10 00:40:38.508283 env[1308]: time="2025-05-10T00:40:38.508151835Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 10 00:40:38.508283 env[1308]: time="2025-05-10T00:40:38.508167335Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 10 00:40:38.508283 env[1308]: time="2025-05-10T00:40:38.508199135Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 10 00:40:38.508283 env[1308]: time="2025-05-10T00:40:38.508242336Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 10 00:40:38.508579 env[1308]: time="2025-05-10T00:40:38.508512840Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 10 00:40:38.531180 env[1308]: time="2025-05-10T00:40:38.508590541Z" level=info msg="Connect containerd service" May 10 00:40:38.531180 env[1308]: time="2025-05-10T00:40:38.508633042Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 10 00:40:38.531180 env[1308]: time="2025-05-10T00:40:38.509396954Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:40:38.531180 env[1308]: time="2025-05-10T00:40:38.509498056Z" level=info msg="Start subscribing containerd event" May 10 00:40:38.531180 env[1308]: time="2025-05-10T00:40:38.509554457Z" level=info msg="Start recovering state" May 10 00:40:38.531180 env[1308]: time="2025-05-10T00:40:38.509633458Z" level=info msg="Start event monitor" May 10 00:40:38.531180 env[1308]: time="2025-05-10T00:40:38.509666558Z" level=info msg="Start snapshots syncer" May 10 00:40:38.531180 env[1308]: time="2025-05-10T00:40:38.509680359Z" level=info msg="Start cni network conf syncer for default" May 10 00:40:38.531180 env[1308]: time="2025-05-10T00:40:38.509696559Z" level=info msg="Start streaming server" May 10 00:40:38.531180 env[1308]: time="2025-05-10T00:40:38.509700259Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 10 00:40:38.531180 env[1308]: time="2025-05-10T00:40:38.509747360Z" level=info msg=serving... address=/run/containerd/containerd.sock May 10 00:40:38.531180 env[1308]: time="2025-05-10T00:40:38.512057096Z" level=info msg="containerd successfully booted in 0.129845s" May 10 00:40:38.510802 systemd[1]: Started containerd.service. May 10 00:40:38.788694 update_engine[1300]: I0510 00:40:38.787860 1300 main.cc:92] Flatcar Update Engine starting May 10 00:40:38.844337 systemd[1]: Started update-engine.service. May 10 00:40:38.849249 systemd[1]: Started locksmithd.service. May 10 00:40:38.852372 update_engine[1300]: I0510 00:40:38.852344 1300 update_check_scheduler.cc:74] Next update check in 4m32s May 10 00:40:38.894492 sshd_keygen[1306]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 10 00:40:38.915108 systemd[1]: Finished sshd-keygen.service. May 10 00:40:38.919611 systemd[1]: Starting issuegen.service... May 10 00:40:38.922858 systemd[1]: Started waagent.service. May 10 00:40:38.929689 systemd[1]: issuegen.service: Deactivated successfully. May 10 00:40:38.929912 systemd[1]: Finished issuegen.service. May 10 00:40:38.933794 systemd[1]: Starting systemd-user-sessions.service... May 10 00:40:38.941468 systemd[1]: Finished systemd-user-sessions.service. May 10 00:40:38.945422 systemd[1]: Started getty@tty1.service. May 10 00:40:38.949142 systemd[1]: Started serial-getty@ttyS0.service. May 10 00:40:38.951627 systemd[1]: Reached target getty.target. May 10 00:40:38.954056 systemd[1]: Reached target multi-user.target. May 10 00:40:38.957685 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 10 00:40:38.967201 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 10 00:40:38.967345 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 10 00:40:38.969977 systemd[1]: Startup finished in 756ms (firmware) + 18.204s (loader) + 1.064s (kernel) + 9.515s (initrd) + 27.414s (userspace) = 56.955s. May 10 00:40:39.240740 login[1399]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 10 00:40:39.240974 login[1398]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) May 10 00:40:39.271135 systemd[1]: Created slice user-500.slice. May 10 00:40:39.273136 systemd[1]: Starting user-runtime-dir@500.service... May 10 00:40:39.278158 systemd-logind[1296]: New session 1 of user core. May 10 00:40:39.282294 systemd-logind[1296]: New session 2 of user core. May 10 00:40:39.288124 systemd[1]: Finished user-runtime-dir@500.service. May 10 00:40:39.290746 systemd[1]: Starting user@500.service... May 10 00:40:39.303857 (systemd)[1406]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 10 00:40:39.434775 systemd[1406]: Queued start job for default target default.target. May 10 00:40:39.435391 systemd[1406]: Reached target paths.target. May 10 00:40:39.435419 systemd[1406]: Reached target sockets.target. May 10 00:40:39.435437 systemd[1406]: Reached target timers.target. May 10 00:40:39.435451 systemd[1406]: Reached target basic.target. May 10 00:40:39.435585 systemd[1]: Started user@500.service. May 10 00:40:39.436841 systemd[1406]: Reached target default.target. May 10 00:40:39.436900 systemd[1406]: Startup finished in 125ms. May 10 00:40:39.437081 systemd[1]: Started session-1.scope. May 10 00:40:39.437778 systemd[1]: Started session-2.scope. May 10 00:40:39.696941 locksmithd[1384]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 10 00:40:43.118539 waagent[1393]: 2025-05-10T00:40:43.118160Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 May 10 00:40:43.123716 waagent[1393]: 2025-05-10T00:40:43.122587Z INFO Daemon Daemon OS: flatcar 3510.3.7 May 10 00:40:43.127024 waagent[1393]: 2025-05-10T00:40:43.126936Z INFO Daemon Daemon Python: 3.9.16 May 10 00:40:43.129763 waagent[1393]: 2025-05-10T00:40:43.129675Z INFO Daemon Daemon Run daemon May 10 00:40:43.132024 waagent[1393]: 2025-05-10T00:40:43.131962Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.7' May 10 00:40:43.145413 waagent[1393]: 2025-05-10T00:40:43.145285Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. May 10 00:40:43.152628 waagent[1393]: 2025-05-10T00:40:43.152484Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' May 10 00:40:43.188770 waagent[1393]: 2025-05-10T00:40:43.154240Z INFO Daemon Daemon cloud-init is enabled: False May 10 00:40:43.188770 waagent[1393]: 2025-05-10T00:40:43.155073Z INFO Daemon Daemon Using waagent for provisioning May 10 00:40:43.188770 waagent[1393]: 2025-05-10T00:40:43.156477Z INFO Daemon Daemon Activate resource disk May 10 00:40:43.188770 waagent[1393]: 2025-05-10T00:40:43.157762Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb May 10 00:40:43.188770 waagent[1393]: 2025-05-10T00:40:43.165824Z INFO Daemon Daemon Found device: None May 10 00:40:43.188770 waagent[1393]: 2025-05-10T00:40:43.166530Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology May 10 00:40:43.188770 waagent[1393]: 2025-05-10T00:40:43.167315Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 May 10 00:40:43.188770 waagent[1393]: 2025-05-10T00:40:43.169120Z INFO Daemon Daemon Clean protocol and wireserver endpoint May 10 00:40:43.188770 waagent[1393]: 2025-05-10T00:40:43.169971Z INFO Daemon Daemon Running default provisioning handler May 10 00:40:43.188770 waagent[1393]: 2025-05-10T00:40:43.179927Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. May 10 00:40:43.188770 waagent[1393]: 2025-05-10T00:40:43.182703Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' May 10 00:40:43.188770 waagent[1393]: 2025-05-10T00:40:43.183733Z INFO Daemon Daemon cloud-init is enabled: False May 10 00:40:43.188770 waagent[1393]: 2025-05-10T00:40:43.184592Z INFO Daemon Daemon Copying ovf-env.xml May 10 00:40:43.241286 waagent[1393]: 2025-05-10T00:40:43.241097Z INFO Daemon Daemon Successfully mounted dvd May 10 00:40:43.307266 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. May 10 00:40:43.322212 waagent[1393]: 2025-05-10T00:40:43.322068Z INFO Daemon Daemon Detect protocol endpoint May 10 00:40:43.324863 waagent[1393]: 2025-05-10T00:40:43.324774Z INFO Daemon Daemon Clean protocol and wireserver endpoint May 10 00:40:43.331057 waagent[1393]: 2025-05-10T00:40:43.330937Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler May 10 00:40:43.334503 waagent[1393]: 2025-05-10T00:40:43.334410Z INFO Daemon Daemon Test for route to 168.63.129.16 May 10 00:40:43.337357 waagent[1393]: 2025-05-10T00:40:43.337278Z INFO Daemon Daemon Route to 168.63.129.16 exists May 10 00:40:43.339926 waagent[1393]: 2025-05-10T00:40:43.339859Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 May 10 00:40:43.404493 waagent[1393]: 2025-05-10T00:40:43.404333Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 May 10 00:40:43.411823 waagent[1393]: 2025-05-10T00:40:43.406139Z INFO Daemon Daemon Wire protocol version:2012-11-30 May 10 00:40:43.411823 waagent[1393]: 2025-05-10T00:40:43.406822Z INFO Daemon Daemon Server preferred version:2015-04-05 May 10 00:40:43.879603 waagent[1393]: 2025-05-10T00:40:43.879425Z INFO Daemon Daemon Initializing goal state during protocol detection May 10 00:40:43.891031 waagent[1393]: 2025-05-10T00:40:43.890939Z INFO Daemon Daemon Forcing an update of the goal state.. May 10 00:40:43.895998 waagent[1393]: 2025-05-10T00:40:43.892228Z INFO Daemon Daemon Fetching goal state [incarnation 1] May 10 00:40:43.968548 waagent[1393]: 2025-05-10T00:40:43.968411Z INFO Daemon Daemon Found private key matching thumbprint 0585F6AE93599B7F7858C773B91DE74E3237895D May 10 00:40:43.974284 waagent[1393]: 2025-05-10T00:40:43.974177Z INFO Daemon Daemon Certificate with thumbprint 1AA11FF2B5E86C0345E135C01754DABBE019B025 has no matching private key. May 10 00:40:43.979086 waagent[1393]: 2025-05-10T00:40:43.979000Z INFO Daemon Daemon Fetch goal state completed May 10 00:40:44.005159 waagent[1393]: 2025-05-10T00:40:44.005088Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 282f8841-8b78-4dee-9dc8-68fdddc47376 New eTag: 5368931874405091745] May 10 00:40:44.010537 waagent[1393]: 2025-05-10T00:40:44.010462Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob May 10 00:40:44.022586 waagent[1393]: 2025-05-10T00:40:44.022523Z INFO Daemon Daemon Starting provisioning May 10 00:40:44.024978 waagent[1393]: 2025-05-10T00:40:44.024915Z INFO Daemon Daemon Handle ovf-env.xml. May 10 00:40:44.027219 waagent[1393]: 2025-05-10T00:40:44.027160Z INFO Daemon Daemon Set hostname [ci-3510.3.7-n-45b481fdfb] May 10 00:40:44.042619 waagent[1393]: 2025-05-10T00:40:44.042514Z INFO Daemon Daemon Publish hostname [ci-3510.3.7-n-45b481fdfb] May 10 00:40:44.046198 waagent[1393]: 2025-05-10T00:40:44.046104Z INFO Daemon Daemon Examine /proc/net/route for primary interface May 10 00:40:44.049465 waagent[1393]: 2025-05-10T00:40:44.049391Z INFO Daemon Daemon Primary interface is [eth0] May 10 00:40:44.065115 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. May 10 00:40:44.065386 systemd[1]: Stopped systemd-networkd-wait-online.service. May 10 00:40:44.065465 systemd[1]: Stopping systemd-networkd-wait-online.service... May 10 00:40:44.065842 systemd[1]: Stopping systemd-networkd.service... May 10 00:40:44.070819 systemd-networkd[1167]: eth0: DHCPv6 lease lost May 10 00:40:44.072924 systemd[1]: systemd-networkd.service: Deactivated successfully. May 10 00:40:44.073129 systemd[1]: Stopped systemd-networkd.service. May 10 00:40:44.075633 systemd[1]: Starting systemd-networkd.service... May 10 00:40:44.110303 systemd-networkd[1446]: enP15598s1: Link UP May 10 00:40:44.110314 systemd-networkd[1446]: enP15598s1: Gained carrier May 10 00:40:44.111685 systemd-networkd[1446]: eth0: Link UP May 10 00:40:44.111694 systemd-networkd[1446]: eth0: Gained carrier May 10 00:40:44.112229 systemd-networkd[1446]: lo: Link UP May 10 00:40:44.112239 systemd-networkd[1446]: lo: Gained carrier May 10 00:40:44.112548 systemd-networkd[1446]: eth0: Gained IPv6LL May 10 00:40:44.113163 systemd-networkd[1446]: Enumeration completed May 10 00:40:44.113294 systemd[1]: Started systemd-networkd.service. May 10 00:40:44.115589 waagent[1393]: 2025-05-10T00:40:44.115397Z INFO Daemon Daemon Create user account if not exists May 10 00:40:44.115910 systemd[1]: Starting systemd-networkd-wait-online.service... May 10 00:40:44.120715 waagent[1393]: 2025-05-10T00:40:44.120617Z INFO Daemon Daemon User core already exists, skip useradd May 10 00:40:44.121825 systemd-networkd[1446]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:40:44.125453 waagent[1393]: 2025-05-10T00:40:44.125368Z INFO Daemon Daemon Configure sudoer May 10 00:40:44.128739 waagent[1393]: 2025-05-10T00:40:44.128665Z INFO Daemon Daemon Configure sshd May 10 00:40:44.131967 waagent[1393]: 2025-05-10T00:40:44.131725Z INFO Daemon Daemon Deploy ssh public key. May 10 00:40:44.157872 systemd-networkd[1446]: eth0: DHCPv4 address 10.200.8.26/24, gateway 10.200.8.1 acquired from 168.63.129.16 May 10 00:40:44.161387 systemd[1]: Finished systemd-networkd-wait-online.service. May 10 00:40:45.242389 waagent[1393]: 2025-05-10T00:40:45.242296Z INFO Daemon Daemon Provisioning complete May 10 00:40:45.256189 waagent[1393]: 2025-05-10T00:40:45.256098Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping May 10 00:40:45.259379 waagent[1393]: 2025-05-10T00:40:45.259294Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. May 10 00:40:45.264639 waagent[1393]: 2025-05-10T00:40:45.264556Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent May 10 00:40:45.533843 waagent[1456]: 2025-05-10T00:40:45.533715Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent May 10 00:40:45.534633 waagent[1456]: 2025-05-10T00:40:45.534563Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 10 00:40:45.534801 waagent[1456]: 2025-05-10T00:40:45.534725Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 May 10 00:40:45.545915 waagent[1456]: 2025-05-10T00:40:45.545836Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. May 10 00:40:45.546089 waagent[1456]: 2025-05-10T00:40:45.546035Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] May 10 00:40:45.608403 waagent[1456]: 2025-05-10T00:40:45.608267Z INFO ExtHandler ExtHandler Found private key matching thumbprint 0585F6AE93599B7F7858C773B91DE74E3237895D May 10 00:40:45.608646 waagent[1456]: 2025-05-10T00:40:45.608575Z INFO ExtHandler ExtHandler Certificate with thumbprint 1AA11FF2B5E86C0345E135C01754DABBE019B025 has no matching private key. May 10 00:40:45.608909 waagent[1456]: 2025-05-10T00:40:45.608855Z INFO ExtHandler ExtHandler Fetch goal state completed May 10 00:40:45.623154 waagent[1456]: 2025-05-10T00:40:45.623076Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: d301f88d-101a-4c98-ad32-ed4c5f2da1e5 New eTag: 5368931874405091745] May 10 00:40:45.623718 waagent[1456]: 2025-05-10T00:40:45.623656Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob May 10 00:40:45.714090 waagent[1456]: 2025-05-10T00:40:45.713931Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; May 10 00:40:45.731484 waagent[1456]: 2025-05-10T00:40:45.731378Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1456 May 10 00:40:45.735067 waagent[1456]: 2025-05-10T00:40:45.734989Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] May 10 00:40:45.736299 waagent[1456]: 2025-05-10T00:40:45.736236Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules May 10 00:40:45.797571 waagent[1456]: 2025-05-10T00:40:45.797442Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service May 10 00:40:45.797954 waagent[1456]: 2025-05-10T00:40:45.797890Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup May 10 00:40:45.806034 waagent[1456]: 2025-05-10T00:40:45.805974Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now May 10 00:40:45.806514 waagent[1456]: 2025-05-10T00:40:45.806451Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' May 10 00:40:45.807603 waagent[1456]: 2025-05-10T00:40:45.807536Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] May 10 00:40:45.808920 waagent[1456]: 2025-05-10T00:40:45.808861Z INFO ExtHandler ExtHandler Starting env monitor service. May 10 00:40:45.810265 waagent[1456]: 2025-05-10T00:40:45.810209Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 10 00:40:45.810392 waagent[1456]: 2025-05-10T00:40:45.810312Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 10 00:40:45.810492 waagent[1456]: 2025-05-10T00:40:45.810422Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. May 10 00:40:45.810730 waagent[1456]: 2025-05-10T00:40:45.810680Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 May 10 00:40:45.811367 waagent[1456]: 2025-05-10T00:40:45.811313Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 May 10 00:40:45.811660 waagent[1456]: 2025-05-10T00:40:45.811602Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread May 10 00:40:45.812303 waagent[1456]: 2025-05-10T00:40:45.812245Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. May 10 00:40:45.812440 waagent[1456]: 2025-05-10T00:40:45.812387Z INFO ExtHandler ExtHandler Start Extension Telemetry service. May 10 00:40:45.813296 waagent[1456]: 2025-05-10T00:40:45.813239Z INFO EnvHandler ExtHandler Configure routes May 10 00:40:45.813926 waagent[1456]: 2025-05-10T00:40:45.813868Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True May 10 00:40:45.814047 waagent[1456]: 2025-05-10T00:40:45.813976Z INFO EnvHandler ExtHandler Gateway:None May 10 00:40:45.814146 waagent[1456]: 2025-05-10T00:40:45.814078Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. May 10 00:40:45.814372 waagent[1456]: 2025-05-10T00:40:45.814325Z INFO EnvHandler ExtHandler Routes:None May 10 00:40:45.815225 waagent[1456]: 2025-05-10T00:40:45.815165Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: May 10 00:40:45.815225 waagent[1456]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT May 10 00:40:45.815225 waagent[1456]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 May 10 00:40:45.815225 waagent[1456]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 May 10 00:40:45.815225 waagent[1456]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 May 10 00:40:45.815225 waagent[1456]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 10 00:40:45.815225 waagent[1456]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 10 00:40:45.817981 waagent[1456]: 2025-05-10T00:40:45.817872Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread May 10 00:40:45.835008 waagent[1456]: 2025-05-10T00:40:45.834946Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) May 10 00:40:45.836454 waagent[1456]: 2025-05-10T00:40:45.836394Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required May 10 00:40:45.839914 waagent[1456]: 2025-05-10T00:40:45.839858Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' May 10 00:40:45.855266 waagent[1456]: 2025-05-10T00:40:45.855205Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1446' May 10 00:40:45.878906 waagent[1456]: 2025-05-10T00:40:45.878826Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. May 10 00:40:45.940483 waagent[1456]: 2025-05-10T00:40:45.940346Z INFO MonitorHandler ExtHandler Network interfaces: May 10 00:40:45.940483 waagent[1456]: Executing ['ip', '-a', '-o', 'link']: May 10 00:40:45.940483 waagent[1456]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 May 10 00:40:45.940483 waagent[1456]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:de:17:8e brd ff:ff:ff:ff:ff:ff May 10 00:40:45.940483 waagent[1456]: 3: enP15598s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:de:17:8e brd ff:ff:ff:ff:ff:ff\ altname enP15598p0s2 May 10 00:40:45.940483 waagent[1456]: Executing ['ip', '-4', '-a', '-o', 'address']: May 10 00:40:45.940483 waagent[1456]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever May 10 00:40:45.940483 waagent[1456]: 2: eth0 inet 10.200.8.26/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever May 10 00:40:45.940483 waagent[1456]: Executing ['ip', '-6', '-a', '-o', 'address']: May 10 00:40:45.940483 waagent[1456]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever May 10 00:40:45.940483 waagent[1456]: 2: eth0 inet6 fe80::6245:bdff:fede:178e/64 scope link \ valid_lft forever preferred_lft forever May 10 00:40:46.097633 waagent[1456]: 2025-05-10T00:40:46.097513Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.13.1.1 -- exiting May 10 00:40:46.268356 waagent[1393]: 2025-05-10T00:40:46.268139Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running May 10 00:40:46.274940 waagent[1393]: 2025-05-10T00:40:46.274698Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.13.1.1 to be the latest agent May 10 00:40:47.335785 waagent[1493]: 2025-05-10T00:40:47.335671Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.13.1.1) May 10 00:40:47.337154 waagent[1493]: 2025-05-10T00:40:47.337080Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.7 May 10 00:40:47.337300 waagent[1493]: 2025-05-10T00:40:47.337247Z INFO ExtHandler ExtHandler Python: 3.9.16 May 10 00:40:47.337449 waagent[1493]: 2025-05-10T00:40:47.337403Z INFO ExtHandler ExtHandler CPU Arch: x86_64 May 10 00:40:47.353100 waagent[1493]: 2025-05-10T00:40:47.352980Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; systemd_version: systemd 252 (252); LISDrivers: Absent; logrotate: logrotate 3.20.1; May 10 00:40:47.353533 waagent[1493]: 2025-05-10T00:40:47.353468Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 10 00:40:47.353707 waagent[1493]: 2025-05-10T00:40:47.353658Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 May 10 00:40:47.353963 waagent[1493]: 2025-05-10T00:40:47.353912Z INFO ExtHandler ExtHandler Initializing the goal state... May 10 00:40:47.366221 waagent[1493]: 2025-05-10T00:40:47.366142Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] May 10 00:40:47.374359 waagent[1493]: 2025-05-10T00:40:47.374295Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.164 May 10 00:40:47.375327 waagent[1493]: 2025-05-10T00:40:47.375265Z INFO ExtHandler May 10 00:40:47.375475 waagent[1493]: 2025-05-10T00:40:47.375426Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 70f8c8c9-52b1-4c97-a71b-26cae772f5d7 eTag: 5368931874405091745 source: Fabric] May 10 00:40:47.376189 waagent[1493]: 2025-05-10T00:40:47.376132Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. May 10 00:40:47.377278 waagent[1493]: 2025-05-10T00:40:47.377219Z INFO ExtHandler May 10 00:40:47.377412 waagent[1493]: 2025-05-10T00:40:47.377360Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] May 10 00:40:47.384728 waagent[1493]: 2025-05-10T00:40:47.384677Z INFO ExtHandler ExtHandler Downloading artifacts profile blob May 10 00:40:47.385164 waagent[1493]: 2025-05-10T00:40:47.385117Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required May 10 00:40:47.403182 waagent[1493]: 2025-05-10T00:40:47.403103Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. May 10 00:40:47.469580 waagent[1493]: 2025-05-10T00:40:47.469432Z INFO ExtHandler Downloaded certificate {'thumbprint': '1AA11FF2B5E86C0345E135C01754DABBE019B025', 'hasPrivateKey': False} May 10 00:40:47.470578 waagent[1493]: 2025-05-10T00:40:47.470509Z INFO ExtHandler Downloaded certificate {'thumbprint': '0585F6AE93599B7F7858C773B91DE74E3237895D', 'hasPrivateKey': True} May 10 00:40:47.471550 waagent[1493]: 2025-05-10T00:40:47.471487Z INFO ExtHandler Fetch goal state from WireServer completed May 10 00:40:47.472355 waagent[1493]: 2025-05-10T00:40:47.472296Z INFO ExtHandler ExtHandler Goal state initialization completed. May 10 00:40:47.490262 waagent[1493]: 2025-05-10T00:40:47.490156Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) May 10 00:40:47.498320 waagent[1493]: 2025-05-10T00:40:47.498225Z INFO ExtHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules May 10 00:40:47.501877 waagent[1493]: 2025-05-10T00:40:47.501781Z INFO ExtHandler ExtHandler Did not find a legacy firewall rule: ['iptables', '-w', '-t', 'security', '-C', 'OUTPUT', '-d', '168.63.129.16', '-p', 'tcp', '-m', 'conntrack', '--ctstate', 'INVALID,NEW', '-j', 'ACCEPT'] May 10 00:40:47.502081 waagent[1493]: 2025-05-10T00:40:47.502029Z INFO ExtHandler ExtHandler Checking state of the firewall May 10 00:40:47.524285 waagent[1493]: 2025-05-10T00:40:47.524169Z WARNING ExtHandler ExtHandler The firewall rules for Azure Fabric are not setup correctly (the environment thread will fix it): The following rules are missing: ['ACCEPT DNS', 'DROP'] due to: ['iptables: Bad rule (does a matching rule exist in that chain?).\n', 'iptables: Bad rule (does a matching rule exist in that chain?).\n']. Current state: May 10 00:40:47.524285 waagent[1493]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 10 00:40:47.524285 waagent[1493]: pkts bytes target prot opt in out source destination May 10 00:40:47.524285 waagent[1493]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 10 00:40:47.524285 waagent[1493]: pkts bytes target prot opt in out source destination May 10 00:40:47.524285 waagent[1493]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 10 00:40:47.524285 waagent[1493]: pkts bytes target prot opt in out source destination May 10 00:40:47.524285 waagent[1493]: 54 7805 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 10 00:40:47.525350 waagent[1493]: 2025-05-10T00:40:47.525283Z INFO ExtHandler ExtHandler Setting up persistent firewall rules May 10 00:40:47.527931 waagent[1493]: 2025-05-10T00:40:47.527833Z INFO ExtHandler ExtHandler The firewalld service is not present on the system May 10 00:40:47.528173 waagent[1493]: 2025-05-10T00:40:47.528121Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service May 10 00:40:47.528526 waagent[1493]: 2025-05-10T00:40:47.528471Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup May 10 00:40:47.536484 waagent[1493]: 2025-05-10T00:40:47.536429Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now May 10 00:40:47.536959 waagent[1493]: 2025-05-10T00:40:47.536906Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' May 10 00:40:47.544258 waagent[1493]: 2025-05-10T00:40:47.544190Z INFO ExtHandler ExtHandler WALinuxAgent-2.13.1.1 running as process 1493 May 10 00:40:47.547185 waagent[1493]: 2025-05-10T00:40:47.547126Z INFO ExtHandler ExtHandler [CGI] Cgroups is not currently supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] May 10 00:40:47.547918 waagent[1493]: 2025-05-10T00:40:47.547860Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case cgroup usage went from enabled to disabled May 10 00:40:47.548690 waagent[1493]: 2025-05-10T00:40:47.548633Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False May 10 00:40:47.551251 waagent[1493]: 2025-05-10T00:40:47.551190Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] May 10 00:40:47.552491 waagent[1493]: 2025-05-10T00:40:47.552433Z INFO ExtHandler ExtHandler Starting env monitor service. May 10 00:40:47.552936 waagent[1493]: 2025-05-10T00:40:47.552881Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 10 00:40:47.553093 waagent[1493]: 2025-05-10T00:40:47.553046Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 May 10 00:40:47.553594 waagent[1493]: 2025-05-10T00:40:47.553541Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. May 10 00:40:47.554209 waagent[1493]: 2025-05-10T00:40:47.554147Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: May 10 00:40:47.554209 waagent[1493]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT May 10 00:40:47.554209 waagent[1493]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 May 10 00:40:47.554209 waagent[1493]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 May 10 00:40:47.554209 waagent[1493]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 May 10 00:40:47.554209 waagent[1493]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 10 00:40:47.554209 waagent[1493]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 May 10 00:40:47.554712 waagent[1493]: 2025-05-10T00:40:47.554658Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. May 10 00:40:47.557479 waagent[1493]: 2025-05-10T00:40:47.557383Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread May 10 00:40:47.557817 waagent[1493]: 2025-05-10T00:40:47.557716Z INFO ExtHandler ExtHandler Start Extension Telemetry service. May 10 00:40:47.558619 waagent[1493]: 2025-05-10T00:40:47.558551Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True May 10 00:40:47.558737 waagent[1493]: 2025-05-10T00:40:47.558681Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. May 10 00:40:47.559447 waagent[1493]: 2025-05-10T00:40:47.559390Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file May 10 00:40:47.561936 waagent[1493]: 2025-05-10T00:40:47.561709Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread May 10 00:40:47.565411 waagent[1493]: 2025-05-10T00:40:47.565362Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 May 10 00:40:47.566058 waagent[1493]: 2025-05-10T00:40:47.566002Z INFO EnvHandler ExtHandler Configure routes May 10 00:40:47.569844 waagent[1493]: 2025-05-10T00:40:47.569764Z INFO EnvHandler ExtHandler Gateway:None May 10 00:40:47.570189 waagent[1493]: 2025-05-10T00:40:47.570127Z INFO EnvHandler ExtHandler Routes:None May 10 00:40:47.573223 waagent[1493]: 2025-05-10T00:40:47.573167Z INFO MonitorHandler ExtHandler Network interfaces: May 10 00:40:47.573223 waagent[1493]: Executing ['ip', '-a', '-o', 'link']: May 10 00:40:47.573223 waagent[1493]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 May 10 00:40:47.573223 waagent[1493]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:de:17:8e brd ff:ff:ff:ff:ff:ff May 10 00:40:47.573223 waagent[1493]: 3: enP15598s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 60:45:bd:de:17:8e brd ff:ff:ff:ff:ff:ff\ altname enP15598p0s2 May 10 00:40:47.573223 waagent[1493]: Executing ['ip', '-4', '-a', '-o', 'address']: May 10 00:40:47.573223 waagent[1493]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever May 10 00:40:47.573223 waagent[1493]: 2: eth0 inet 10.200.8.26/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever May 10 00:40:47.573223 waagent[1493]: Executing ['ip', '-6', '-a', '-o', 'address']: May 10 00:40:47.573223 waagent[1493]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever May 10 00:40:47.573223 waagent[1493]: 2: eth0 inet6 fe80::6245:bdff:fede:178e/64 scope link \ valid_lft forever preferred_lft forever May 10 00:40:47.582190 waagent[1493]: 2025-05-10T00:40:47.582129Z INFO ExtHandler ExtHandler Downloading agent manifest May 10 00:40:47.607054 waagent[1493]: 2025-05-10T00:40:47.606941Z INFO EnvHandler ExtHandler Using iptables [version 1.8.8] to manage firewall rules May 10 00:40:47.631475 waagent[1493]: 2025-05-10T00:40:47.631398Z INFO ExtHandler ExtHandler May 10 00:40:47.633948 waagent[1493]: 2025-05-10T00:40:47.633711Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 816100e3-04aa-424e-b322-b58af44b90e1 correlation af5aac2e-c8d5-4f8f-9188-430891fe1586 created: 2025-05-10T00:39:28.712257Z] May 10 00:40:47.635478 waagent[1493]: 2025-05-10T00:40:47.635391Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. May 10 00:40:47.640013 waagent[1493]: 2025-05-10T00:40:47.639953Z WARNING EnvHandler ExtHandler The firewall is not configured correctly. The following rules are missing: ['ACCEPT DNS', 'DROP'] due to: ['iptables: Bad rule (does a matching rule exist in that chain?).\n', 'iptables: Bad rule (does a matching rule exist in that chain?).\n']. Will reset it. Current state: May 10 00:40:47.640013 waagent[1493]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 10 00:40:47.640013 waagent[1493]: pkts bytes target prot opt in out source destination May 10 00:40:47.640013 waagent[1493]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 10 00:40:47.640013 waagent[1493]: pkts bytes target prot opt in out source destination May 10 00:40:47.640013 waagent[1493]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 10 00:40:47.640013 waagent[1493]: pkts bytes target prot opt in out source destination May 10 00:40:47.640013 waagent[1493]: 86 11668 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 10 00:40:47.641159 waagent[1493]: 2025-05-10T00:40:47.641101Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 9 ms] May 10 00:40:47.669912 waagent[1493]: 2025-05-10T00:40:47.669841Z INFO ExtHandler ExtHandler Looking for existing remote access users. May 10 00:40:47.678042 waagent[1493]: 2025-05-10T00:40:47.677749Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.13.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 1E9D4772-1B06-4D7B-80C2-8B290A6CA460;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] May 10 00:40:47.685861 waagent[1493]: 2025-05-10T00:40:47.685704Z INFO EnvHandler ExtHandler The firewall was setup successfully: May 10 00:40:47.685861 waagent[1493]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) May 10 00:40:47.685861 waagent[1493]: pkts bytes target prot opt in out source destination May 10 00:40:47.685861 waagent[1493]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) May 10 00:40:47.685861 waagent[1493]: pkts bytes target prot opt in out source destination May 10 00:40:47.685861 waagent[1493]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) May 10 00:40:47.685861 waagent[1493]: pkts bytes target prot opt in out source destination May 10 00:40:47.685861 waagent[1493]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 May 10 00:40:47.685861 waagent[1493]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 May 10 00:40:47.685861 waagent[1493]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW May 10 00:40:47.687169 waagent[1493]: 2025-05-10T00:40:47.687113Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 May 10 00:41:15.768996 systemd[1]: Created slice system-sshd.slice. May 10 00:41:15.770633 systemd[1]: Started sshd@0-10.200.8.26:22-10.200.16.10:39988.service. May 10 00:41:16.248209 kernel: hv_balloon: Max. dynamic memory size: 8192 MB May 10 00:41:16.520669 sshd[1540]: Accepted publickey for core from 10.200.16.10 port 39988 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:41:16.522153 sshd[1540]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:41:16.526587 systemd-logind[1296]: New session 3 of user core. May 10 00:41:16.527510 systemd[1]: Started session-3.scope. May 10 00:41:17.063352 systemd[1]: Started sshd@1-10.200.8.26:22-10.200.16.10:39998.service. May 10 00:41:17.688937 sshd[1545]: Accepted publickey for core from 10.200.16.10 port 39998 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:41:17.690461 sshd[1545]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:41:17.694351 systemd-logind[1296]: New session 4 of user core. May 10 00:41:17.695669 systemd[1]: Started session-4.scope. May 10 00:41:18.132630 sshd[1545]: pam_unix(sshd:session): session closed for user core May 10 00:41:18.136223 systemd[1]: sshd@1-10.200.8.26:22-10.200.16.10:39998.service: Deactivated successfully. May 10 00:41:18.137301 systemd[1]: session-4.scope: Deactivated successfully. May 10 00:41:18.138133 systemd-logind[1296]: Session 4 logged out. Waiting for processes to exit. May 10 00:41:18.138976 systemd-logind[1296]: Removed session 4. May 10 00:41:18.240688 systemd[1]: Started sshd@2-10.200.8.26:22-10.200.16.10:40006.service. May 10 00:41:18.864673 sshd[1551]: Accepted publickey for core from 10.200.16.10 port 40006 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:41:18.866426 sshd[1551]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:41:18.871587 systemd[1]: Started session-5.scope. May 10 00:41:18.872072 systemd-logind[1296]: New session 5 of user core. May 10 00:41:19.305877 sshd[1551]: pam_unix(sshd:session): session closed for user core May 10 00:41:19.309249 systemd[1]: sshd@2-10.200.8.26:22-10.200.16.10:40006.service: Deactivated successfully. May 10 00:41:19.310299 systemd[1]: session-5.scope: Deactivated successfully. May 10 00:41:19.311094 systemd-logind[1296]: Session 5 logged out. Waiting for processes to exit. May 10 00:41:19.311947 systemd-logind[1296]: Removed session 5. May 10 00:41:19.412941 systemd[1]: Started sshd@3-10.200.8.26:22-10.200.16.10:39032.service. May 10 00:41:20.034831 sshd[1557]: Accepted publickey for core from 10.200.16.10 port 39032 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:41:20.036443 sshd[1557]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:41:20.041801 systemd[1]: Started session-6.scope. May 10 00:41:20.042421 systemd-logind[1296]: New session 6 of user core. May 10 00:41:20.479797 sshd[1557]: pam_unix(sshd:session): session closed for user core May 10 00:41:20.483027 systemd[1]: sshd@3-10.200.8.26:22-10.200.16.10:39032.service: Deactivated successfully. May 10 00:41:20.484136 systemd-logind[1296]: Session 6 logged out. Waiting for processes to exit. May 10 00:41:20.484229 systemd[1]: session-6.scope: Deactivated successfully. May 10 00:41:20.485315 systemd-logind[1296]: Removed session 6. May 10 00:41:20.583966 systemd[1]: Started sshd@4-10.200.8.26:22-10.200.16.10:39034.service. May 10 00:41:21.206980 sshd[1563]: Accepted publickey for core from 10.200.16.10 port 39034 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:41:21.208614 sshd[1563]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:41:21.214116 systemd[1]: Started session-7.scope. May 10 00:41:21.214646 systemd-logind[1296]: New session 7 of user core. May 10 00:41:21.749182 sudo[1566]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 10 00:41:21.749463 sudo[1566]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:41:21.766018 dbus-daemon[1287]: \xd0\u001d\xb4`\xe8U: received setenforce notice (enforcing=1987346832) May 10 00:41:21.767951 sudo[1566]: pam_unix(sudo:session): session closed for user root May 10 00:41:21.879265 sshd[1563]: pam_unix(sshd:session): session closed for user core May 10 00:41:21.882977 systemd[1]: sshd@4-10.200.8.26:22-10.200.16.10:39034.service: Deactivated successfully. May 10 00:41:21.884118 systemd[1]: session-7.scope: Deactivated successfully. May 10 00:41:21.884933 systemd-logind[1296]: Session 7 logged out. Waiting for processes to exit. May 10 00:41:21.885970 systemd-logind[1296]: Removed session 7. May 10 00:41:21.984319 systemd[1]: Started sshd@5-10.200.8.26:22-10.200.16.10:39046.service. May 10 00:41:22.610871 sshd[1570]: Accepted publickey for core from 10.200.16.10 port 39046 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:41:22.612451 sshd[1570]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:41:22.617449 systemd[1]: Started session-8.scope. May 10 00:41:22.617951 systemd-logind[1296]: New session 8 of user core. May 10 00:41:22.954674 sudo[1574]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 10 00:41:22.954969 sudo[1574]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:41:22.957950 sudo[1574]: pam_unix(sudo:session): session closed for user root May 10 00:41:22.962398 sudo[1573]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 10 00:41:22.962660 sudo[1573]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:41:22.971546 systemd[1]: Stopping audit-rules.service... May 10 00:41:22.971000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:41:22.973911 auditctl[1577]: No rules May 10 00:41:22.971000 audit[1577]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdf53dd890 a2=420 a3=0 items=0 ppid=1 pid=1577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:41:22.979098 systemd[1]: audit-rules.service: Deactivated successfully. May 10 00:41:22.979277 systemd[1]: Stopped audit-rules.service. May 10 00:41:22.980940 systemd[1]: Starting audit-rules.service... May 10 00:41:22.994926 kernel: audit: type=1305 audit(1746837682.971:173): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:41:22.994997 kernel: audit: type=1300 audit(1746837682.971:173): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdf53dd890 a2=420 a3=0 items=0 ppid=1 pid=1577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:41:22.995026 kernel: audit: type=1327 audit(1746837682.971:173): proctitle=2F7362696E2F617564697463746C002D44 May 10 00:41:22.971000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 10 00:41:22.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:23.003495 augenrules[1594]: No rules May 10 00:41:23.004250 systemd[1]: Finished audit-rules.service. May 10 00:41:23.006484 sudo[1573]: pam_unix(sudo:session): session closed for user root May 10 00:41:23.008652 kernel: audit: type=1131 audit(1746837682.977:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:23.008714 kernel: audit: type=1130 audit(1746837682.998:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:22.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:23.003000 audit[1573]: USER_END pid=1573 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:23.029994 kernel: audit: type=1106 audit(1746837683.003:176): pid=1573 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:23.030786 kernel: audit: type=1104 audit(1746837683.003:177): pid=1573 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:23.003000 audit[1573]: CRED_DISP pid=1573 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:23.109876 sshd[1570]: pam_unix(sshd:session): session closed for user core May 10 00:41:23.109000 audit[1570]: USER_END pid=1570 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:23.113079 systemd[1]: sshd@5-10.200.8.26:22-10.200.16.10:39046.service: Deactivated successfully. May 10 00:41:23.113884 systemd[1]: session-8.scope: Deactivated successfully. May 10 00:41:23.115159 systemd-logind[1296]: Session 8 logged out. Waiting for processes to exit. May 10 00:41:23.116120 systemd-logind[1296]: Removed session 8. May 10 00:41:23.109000 audit[1570]: CRED_DISP pid=1570 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:23.138778 kernel: audit: type=1106 audit(1746837683.109:178): pid=1570 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:23.138867 kernel: audit: type=1104 audit(1746837683.109:179): pid=1570 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:23.139011 kernel: audit: type=1131 audit(1746837683.111:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.26:22-10.200.16.10:39046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:23.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.26:22-10.200.16.10:39046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:23.214177 systemd[1]: Started sshd@6-10.200.8.26:22-10.200.16.10:39054.service. May 10 00:41:23.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.26:22-10.200.16.10:39054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:23.835000 audit[1600]: USER_ACCT pid=1600 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:23.837591 sshd[1600]: Accepted publickey for core from 10.200.16.10 port 39054 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:41:23.837000 audit[1600]: CRED_ACQ pid=1600 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:23.837000 audit[1600]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed7990350 a2=3 a3=0 items=0 ppid=1 pid=1600 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:41:23.837000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:41:23.839357 sshd[1600]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:41:23.845107 systemd[1]: Started session-9.scope. May 10 00:41:23.845864 systemd-logind[1296]: New session 9 of user core. May 10 00:41:23.848000 audit[1600]: USER_START pid=1600 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:23.850000 audit[1602]: CRED_ACQ pid=1602 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:23.976363 update_engine[1300]: I0510 00:41:23.976291 1300 update_attempter.cc:509] Updating boot flags... May 10 00:41:24.178000 audit[1642]: USER_ACCT pid=1642 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:24.178000 audit[1642]: CRED_REFR pid=1642 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:24.180145 sudo[1642]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/mkdir -p . May 10 00:41:24.180434 sudo[1642]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:41:24.180000 audit[1642]: USER_START pid=1642 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:24.183743 sudo[1642]: pam_unix(sudo:session): session closed for user root May 10 00:41:24.182000 audit[1642]: USER_END pid=1642 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:24.182000 audit[1642]: CRED_DISP pid=1642 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:24.286148 sshd[1600]: pam_unix(sshd:session): session closed for user core May 10 00:41:24.286000 audit[1600]: USER_END pid=1600 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:24.286000 audit[1600]: CRED_DISP pid=1600 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:24.289740 systemd[1]: sshd@6-10.200.8.26:22-10.200.16.10:39054.service: Deactivated successfully. May 10 00:41:24.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.26:22-10.200.16.10:39054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:24.290714 systemd[1]: session-9.scope: Deactivated successfully. May 10 00:41:24.291408 systemd-logind[1296]: Session 9 logged out. Waiting for processes to exit. May 10 00:41:24.292228 systemd-logind[1296]: Removed session 9. May 10 00:41:24.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.26:22-10.200.16.10:39056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:24.390989 systemd[1]: Started sshd@7-10.200.8.26:22-10.200.16.10:39056.service. May 10 00:41:25.010000 audit[1646]: USER_ACCT pid=1646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:25.012661 sshd[1646]: Accepted publickey for core from 10.200.16.10 port 39056 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:41:25.011000 audit[1646]: CRED_ACQ pid=1646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:25.011000 audit[1646]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce36190a0 a2=3 a3=0 items=0 ppid=1 pid=1646 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:41:25.011000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:41:25.014137 sshd[1646]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:41:25.019193 systemd[1]: Started session-10.scope. May 10 00:41:25.019819 systemd-logind[1296]: New session 10 of user core. May 10 00:41:25.022000 audit[1646]: USER_START pid=1646 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:25.023000 audit[1648]: CRED_ACQ pid=1648 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:25.354000 audit[1649]: USER_ACCT pid=1649 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:25.354000 audit[1649]: CRED_REFR pid=1649 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:25.355980 sudo[1649]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/install -m 0755 /dev/stdin kolet May 10 00:41:25.356258 sudo[1649]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:41:25.356000 audit[1649]: USER_START pid=1649 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:28.431003 sudo[1649]: pam_unix(sudo:session): session closed for user root May 10 00:41:28.435066 kernel: kauditd_printk_skb: 27 callbacks suppressed May 10 00:41:28.436097 kernel: audit: type=1106 audit(1746837688.429:204): pid=1649 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:28.429000 audit[1649]: USER_END pid=1649 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:28.429000 audit[1649]: CRED_DISP pid=1649 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:28.465959 kernel: audit: type=1104 audit(1746837688.429:205): pid=1649 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:28.531708 sshd[1646]: pam_unix(sshd:session): session closed for user core May 10 00:41:28.531000 audit[1646]: USER_END pid=1646 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:28.534730 systemd-logind[1296]: Session 10 logged out. Waiting for processes to exit. May 10 00:41:28.536062 systemd[1]: sshd@7-10.200.8.26:22-10.200.16.10:39056.service: Deactivated successfully. May 10 00:41:28.536898 systemd[1]: session-10.scope: Deactivated successfully. May 10 00:41:28.538093 systemd-logind[1296]: Removed session 10. May 10 00:41:28.531000 audit[1646]: CRED_DISP pid=1646 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:28.568565 kernel: audit: type=1106 audit(1746837688.531:206): pid=1646 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:28.568701 kernel: audit: type=1104 audit(1746837688.531:207): pid=1646 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:28.568730 kernel: audit: type=1131 audit(1746837688.531:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.26:22-10.200.16.10:39056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:28.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.26:22-10.200.16.10:39056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:28.637509 systemd[1]: Started sshd@8-10.200.8.26:22-10.200.16.10:39062.service. May 10 00:41:28.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.26:22-10.200.16.10:39062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:28.657974 kernel: audit: type=1130 audit(1746837688.635:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.26:22-10.200.16.10:39062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:29.261000 audit[1656]: USER_ACCT pid=1656 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:29.282801 kernel: audit: type=1101 audit(1746837689.261:210): pid=1656 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:29.282866 sshd[1656]: Accepted publickey for core from 10.200.16.10 port 39062 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:41:29.281000 audit[1656]: CRED_ACQ pid=1656 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:29.283341 sshd[1656]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:41:29.288727 systemd[1]: Started session-11.scope. May 10 00:41:29.289868 systemd-logind[1296]: New session 11 of user core. May 10 00:41:29.309963 kernel: audit: type=1103 audit(1746837689.281:211): pid=1656 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:29.310087 kernel: audit: type=1006 audit(1746837689.281:212): pid=1656 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 10 00:41:29.310111 kernel: audit: type=1300 audit(1746837689.281:212): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb1eed4e0 a2=3 a3=0 items=0 ppid=1 pid=1656 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:41:29.281000 audit[1656]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb1eed4e0 a2=3 a3=0 items=0 ppid=1 pid=1656 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:41:29.281000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:41:29.293000 audit[1656]: USER_START pid=1656 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:29.295000 audit[1658]: CRED_ACQ pid=1658 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:29.637000 audit[1665]: USER_ACCT pid=1665 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:29.639275 sudo[1665]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/coreos-cloudinit --workspace /tmp/coretest-cloudinit-420134438 --from-file /tmp/coretest-168013882 --ssh-key-name coretest May 10 00:41:29.637000 audit[1665]: CRED_REFR pid=1665 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:29.639572 sudo[1665]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:41:29.640000 audit[1665]: USER_START pid=1665 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:30.445367 systemd[1]: Reloading. May 10 00:41:30.537338 /usr/lib/systemd/system-generators/torcx-generator[1693]: time="2025-05-10T00:41:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:41:30.537379 /usr/lib/systemd/system-generators/torcx-generator[1693]: time="2025-05-10T00:41:30Z" level=info msg="torcx already run" May 10 00:41:30.622819 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:41:30.622839 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:41:30.640589 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:41:30.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.705000 audit: BPF prog-id=35 op=LOAD May 10 00:41:30.705000 audit: BPF prog-id=18 op=UNLOAD May 10 00:41:30.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.705000 audit: BPF prog-id=36 op=LOAD May 10 00:41:30.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.705000 audit: BPF prog-id=37 op=LOAD May 10 00:41:30.705000 audit: BPF prog-id=19 op=UNLOAD May 10 00:41:30.705000 audit: BPF prog-id=20 op=UNLOAD May 10 00:41:30.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.707000 audit: BPF prog-id=38 op=LOAD May 10 00:41:30.707000 audit: BPF prog-id=29 op=UNLOAD May 10 00:41:30.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.707000 audit: BPF prog-id=39 op=LOAD May 10 00:41:30.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.707000 audit: BPF prog-id=40 op=LOAD May 10 00:41:30.707000 audit: BPF prog-id=30 op=UNLOAD May 10 00:41:30.707000 audit: BPF prog-id=31 op=UNLOAD May 10 00:41:30.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit: BPF prog-id=41 op=LOAD May 10 00:41:30.708000 audit: BPF prog-id=24 op=UNLOAD May 10 00:41:30.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit: BPF prog-id=42 op=LOAD May 10 00:41:30.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.708000 audit: BPF prog-id=43 op=LOAD May 10 00:41:30.708000 audit: BPF prog-id=25 op=UNLOAD May 10 00:41:30.708000 audit: BPF prog-id=26 op=UNLOAD May 10 00:41:30.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.709000 audit: BPF prog-id=44 op=LOAD May 10 00:41:30.709000 audit: BPF prog-id=32 op=UNLOAD May 10 00:41:30.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.711000 audit: BPF prog-id=45 op=LOAD May 10 00:41:30.711000 audit: BPF prog-id=27 op=UNLOAD May 10 00:41:30.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.712000 audit: BPF prog-id=46 op=LOAD May 10 00:41:30.712000 audit: BPF prog-id=34 op=UNLOAD May 10 00:41:30.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.713000 audit: BPF prog-id=47 op=LOAD May 10 00:41:30.713000 audit: BPF prog-id=28 op=UNLOAD May 10 00:41:30.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.713000 audit: BPF prog-id=48 op=LOAD May 10 00:41:30.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:41:30.713000 audit: BPF prog-id=49 op=LOAD May 10 00:41:30.713000 audit: BPF prog-id=21 op=UNLOAD May 10 00:41:30.713000 audit: BPF prog-id=22 op=UNLOAD May 10 00:41:30.721000 audit[1665]: USER_END pid=1665 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:30.721000 audit[1665]: CRED_DISP pid=1665 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:30.723215 sudo[1665]: pam_unix(sudo:session): session closed for user root May 10 00:41:30.747000 audit[1755]: USER_ACCT pid=1755 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:30.749391 sudo[1755]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /tmp/coretest-cloudinit-420134438 May 10 00:41:30.747000 audit[1755]: CRED_REFR pid=1755 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:30.749673 sudo[1755]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:41:30.749000 audit[1755]: USER_START pid=1755 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:30.752565 sudo[1755]: pam_unix(sudo:session): session closed for user root May 10 00:41:30.750000 audit[1755]: USER_END pid=1755 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:30.750000 audit[1755]: CRED_DISP pid=1755 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:30.855012 sshd[1656]: pam_unix(sshd:session): session closed for user core May 10 00:41:30.854000 audit[1656]: USER_END pid=1656 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:30.855000 audit[1656]: CRED_DISP pid=1656 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:30.858216 systemd[1]: sshd@8-10.200.8.26:22-10.200.16.10:39062.service: Deactivated successfully. May 10 00:41:30.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.26:22-10.200.16.10:39062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:30.859087 systemd[1]: session-11.scope: Deactivated successfully. May 10 00:41:30.859721 systemd-logind[1296]: Session 11 logged out. Waiting for processes to exit. May 10 00:41:30.860548 systemd-logind[1296]: Removed session 11. May 10 00:41:30.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.26:22-10.200.16.10:48718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:30.959419 systemd[1]: Started sshd@9-10.200.8.26:22-10.200.16.10:48718.service. May 10 00:41:31.583000 audit[1759]: USER_ACCT pid=1759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:31.585358 sshd[1759]: Accepted publickey for core from 10.200.16.10 port 48718 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:41:31.584000 audit[1759]: CRED_ACQ pid=1759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:31.586000 audit[1759]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce0136880 a2=3 a3=0 items=0 ppid=1 pid=1759 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:41:31.586000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:41:31.587733 sshd[1759]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:41:31.596423 systemd[1]: Started session-12.scope. May 10 00:41:31.596900 systemd-logind[1296]: New session 12 of user core. May 10 00:41:31.599000 audit[1759]: USER_START pid=1759 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:31.604000 audit[1761]: CRED_ACQ pid=1761 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:31.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-127.0.0.1:22-127.0.0.1:56370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:31.956891 systemd[1]: Started sshd@10-127.0.0.1:22-127.0.0.1:56370.service. May 10 00:41:31.965683 sshd[1768]: kex_exchange_identification: Connection closed by remote host May 10 00:41:31.965683 sshd[1768]: Connection closed by 127.0.0.1 port 56370 May 10 00:41:31.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-127.0.0.1:22-127.0.0.1:56370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:31.966193 systemd[1]: sshd@10-127.0.0.1:22-127.0.0.1:56370.service: Deactivated successfully. May 10 00:41:32.055557 sshd[1759]: pam_unix(sshd:session): session closed for user core May 10 00:41:32.055000 audit[1759]: USER_END pid=1759 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:32.055000 audit[1759]: CRED_DISP pid=1759 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:32.059033 systemd[1]: sshd@9-10.200.8.26:22-10.200.16.10:48718.service: Deactivated successfully. May 10 00:41:32.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.26:22-10.200.16.10:48718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:32.059931 systemd[1]: session-12.scope: Deactivated successfully. May 10 00:41:32.060588 systemd-logind[1296]: Session 12 logged out. Waiting for processes to exit. May 10 00:41:32.061440 systemd-logind[1296]: Removed session 12. May 10 00:41:32.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.26:22-10.200.16.10:48724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:32.160080 systemd[1]: Started sshd@11-10.200.8.26:22-10.200.16.10:48724.service. May 10 00:41:32.781000 audit[1772]: USER_ACCT pid=1772 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:32.784007 sshd[1772]: Accepted publickey for core from 10.200.16.10 port 48724 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:41:32.783000 audit[1772]: CRED_ACQ pid=1772 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:32.783000 audit[1772]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc3def8e0 a2=3 a3=0 items=0 ppid=1 pid=1772 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:41:32.783000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:41:32.785709 sshd[1772]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:41:32.791635 systemd[1]: Started session-13.scope. May 10 00:41:32.792135 systemd-logind[1296]: New session 13 of user core. May 10 00:41:32.795000 audit[1772]: USER_START pid=1772 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:32.796000 audit[1774]: CRED_ACQ pid=1774 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:33.272043 sshd[1772]: pam_unix(sshd:session): session closed for user core May 10 00:41:33.271000 audit[1772]: USER_END pid=1772 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:33.272000 audit[1772]: CRED_DISP pid=1772 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:33.275133 systemd[1]: sshd@11-10.200.8.26:22-10.200.16.10:48724.service: Deactivated successfully. May 10 00:41:33.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.26:22-10.200.16.10:48724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:33.276024 systemd[1]: session-13.scope: Deactivated successfully. May 10 00:41:33.276656 systemd-logind[1296]: Session 13 logged out. Waiting for processes to exit. May 10 00:41:33.277482 systemd-logind[1296]: Removed session 13. May 10 00:41:33.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.26:22-10.200.16.10:48730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:33.377969 systemd[1]: Started sshd@12-10.200.8.26:22-10.200.16.10:48730.service. May 10 00:41:34.006603 kernel: kauditd_printk_skb: 213 callbacks suppressed May 10 00:41:34.006733 kernel: audit: type=1101 audit(1746837693.998:421): pid=1782 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:33.998000 audit[1782]: USER_ACCT pid=1782 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:34.006416 sshd[1782]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:41:34.007089 sshd[1782]: Accepted publickey for core from 10.200.16.10 port 48730 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:41:34.012155 systemd[1]: Started session-14.scope. May 10 00:41:34.013699 systemd-logind[1296]: New session 14 of user core. May 10 00:41:34.004000 audit[1782]: CRED_ACQ pid=1782 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:34.039401 kernel: audit: type=1103 audit(1746837694.004:422): pid=1782 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:34.039500 kernel: audit: type=1006 audit(1746837694.004:423): pid=1782 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 10 00:41:34.004000 audit[1782]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebe5253c0 a2=3 a3=0 items=0 ppid=1 pid=1782 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:41:34.116636 kernel: audit: type=1300 audit(1746837694.004:423): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebe5253c0 a2=3 a3=0 items=0 ppid=1 pid=1782 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:41:34.004000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:41:34.016000 audit[1782]: USER_START pid=1782 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:34.142520 kernel: audit: type=1327 audit(1746837694.004:423): proctitle=737368643A20636F7265205B707269765D May 10 00:41:34.142657 kernel: audit: type=1105 audit(1746837694.016:424): pid=1782 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:34.142678 kernel: audit: type=1103 audit(1746837694.018:425): pid=1784 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:34.018000 audit[1784]: CRED_ACQ pid=1784 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:34.537000 audit[1792]: USER_ACCT pid=1792 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:34.539182 sudo[1792]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/blkid -o value -s PTUUID /dev/sda May 10 00:41:34.539661 sudo[1792]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:41:34.537000 audit[1792]: CRED_REFR pid=1792 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:34.580593 kernel: audit: type=1101 audit(1746837694.537:426): pid=1792 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:34.580722 kernel: audit: type=1110 audit(1746837694.537:427): pid=1792 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:34.580749 kernel: audit: type=1105 audit(1746837694.539:428): pid=1792 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:34.539000 audit[1792]: USER_START pid=1792 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:34.597015 sudo[1792]: pam_unix(sudo:session): session closed for user root May 10 00:41:34.595000 audit[1792]: USER_END pid=1792 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:34.595000 audit[1792]: CRED_DISP pid=1792 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:34.698498 sshd[1782]: pam_unix(sshd:session): session closed for user core May 10 00:41:34.698000 audit[1782]: USER_END pid=1782 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:34.698000 audit[1782]: CRED_DISP pid=1782 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:34.701737 systemd[1]: sshd@12-10.200.8.26:22-10.200.16.10:48730.service: Deactivated successfully. May 10 00:41:34.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.26:22-10.200.16.10:48730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:34.702597 systemd[1]: session-14.scope: Deactivated successfully. May 10 00:41:34.703229 systemd-logind[1296]: Session 14 logged out. Waiting for processes to exit. May 10 00:41:34.704056 systemd-logind[1296]: Removed session 14. May 10 00:41:34.804356 systemd[1]: Started sshd@13-10.200.8.26:22-10.200.16.10:48746.service. May 10 00:41:34.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.26:22-10.200.16.10:48746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:35.432000 audit[1798]: USER_ACCT pid=1798 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:35.434120 sshd[1798]: Accepted publickey for core from 10.200.16.10 port 48746 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:41:35.433000 audit[1798]: CRED_ACQ pid=1798 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:35.433000 audit[1798]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd17d0c7a0 a2=3 a3=0 items=0 ppid=1 pid=1798 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:41:35.433000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:41:35.435607 sshd[1798]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:41:35.440716 systemd[1]: Started session-15.scope. May 10 00:41:35.441185 systemd-logind[1296]: New session 15 of user core. May 10 00:41:35.443000 audit[1798]: USER_START pid=1798 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:35.445000 audit[1800]: CRED_ACQ pid=1800 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:35.915069 sshd[1798]: pam_unix(sshd:session): session closed for user core May 10 00:41:35.915000 audit[1798]: USER_END pid=1798 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:35.915000 audit[1798]: CRED_DISP pid=1798 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:35.918267 systemd[1]: sshd@13-10.200.8.26:22-10.200.16.10:48746.service: Deactivated successfully. May 10 00:41:35.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.26:22-10.200.16.10:48746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:35.919151 systemd[1]: session-15.scope: Deactivated successfully. May 10 00:41:35.919794 systemd-logind[1296]: Session 15 logged out. Waiting for processes to exit. May 10 00:41:35.920681 systemd-logind[1296]: Removed session 15. May 10 00:41:36.020013 systemd[1]: Started sshd@14-10.200.8.26:22-10.200.16.10:48758.service. May 10 00:41:36.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.26:22-10.200.16.10:48758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:36.642000 audit[1814]: USER_ACCT pid=1814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:36.644652 sshd[1814]: Accepted publickey for core from 10.200.16.10 port 48758 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:41:36.644000 audit[1814]: CRED_ACQ pid=1814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:36.644000 audit[1814]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb2d06050 a2=3 a3=0 items=0 ppid=1 pid=1814 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:41:36.644000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:41:36.646358 sshd[1814]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:41:36.652242 systemd[1]: Started session-16.scope. May 10 00:41:36.653160 systemd-logind[1296]: New session 16 of user core. May 10 00:41:36.655000 audit[1814]: USER_START pid=1814 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:36.657000 audit[1816]: CRED_ACQ pid=1816 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:37.107638 sshd[1814]: pam_unix(sshd:session): session closed for user core May 10 00:41:37.107000 audit[1814]: USER_END pid=1814 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:37.107000 audit[1814]: CRED_DISP pid=1814 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:37.110726 systemd[1]: sshd@14-10.200.8.26:22-10.200.16.10:48758.service: Deactivated successfully. May 10 00:41:37.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.26:22-10.200.16.10:48758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:37.111639 systemd[1]: session-16.scope: Deactivated successfully. May 10 00:41:37.112301 systemd-logind[1296]: Session 16 logged out. Waiting for processes to exit. May 10 00:41:37.113233 systemd-logind[1296]: Removed session 16. May 10 00:41:37.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.26:22-10.200.16.10:48764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:37.212410 systemd[1]: Started sshd@15-10.200.8.26:22-10.200.16.10:48764.service. May 10 00:41:37.834000 audit[1824]: USER_ACCT pid=1824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:37.836480 sshd[1824]: Accepted publickey for core from 10.200.16.10 port 48764 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:41:37.835000 audit[1824]: CRED_ACQ pid=1824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:37.835000 audit[1824]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1b0bc520 a2=3 a3=0 items=0 ppid=1 pid=1824 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:41:37.835000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:41:37.838008 sshd[1824]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:41:37.843064 systemd[1]: Started session-17.scope. May 10 00:41:37.843530 systemd-logind[1296]: New session 17 of user core. May 10 00:41:37.846000 audit[1824]: USER_START pid=1824 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:37.847000 audit[1826]: CRED_ACQ pid=1826 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:38.207000 audit[1833]: USER_ACCT pid=1833 uid=500 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:38.209521 sudo[1833]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/useradd -p * -U -m user1 -G sudo May 10 00:41:38.209850 sudo[1833]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:41:38.207000 audit[1833]: CRED_REFR pid=1833 uid=500 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:38.209000 audit[1833]: USER_START pid=1833 uid=500 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:38.343510 useradd[1834]: new group: name=user1, GID=1000 May 10 00:41:38.343531 useradd[1834]: new user: name=user1, UID=1000, GID=1000, home=/home/user1, shell=/bin/bash, from=none May 10 00:41:38.345121 useradd[1834]: add 'user1' to group 'sudo' May 10 00:41:38.345135 useradd[1834]: add 'user1' to shadow group 'sudo' May 10 00:41:39.066680 sudo[1833]: pam_unix(sudo:session): session closed for user root May 10 00:41:39.064000 audit[1833]: USER_END pid=1833 uid=500 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:39.074602 kernel: kauditd_printk_skb: 38 callbacks suppressed May 10 00:41:39.074806 kernel: audit: type=1106 audit(1746837699.064:461): pid=1833 uid=500 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:39.065000 audit[1833]: CRED_DISP pid=1833 uid=500 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:39.105080 kernel: audit: type=1104 audit(1746837699.065:462): pid=1833 uid=500 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:39.208732 sshd[1824]: pam_unix(sshd:session): session closed for user core May 10 00:41:39.208000 audit[1824]: USER_END pid=1824 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:39.211891 systemd-logind[1296]: Session 17 logged out. Waiting for processes to exit. May 10 00:41:39.213155 systemd[1]: sshd@15-10.200.8.26:22-10.200.16.10:48764.service: Deactivated successfully. May 10 00:41:39.213889 systemd[1]: session-17.scope: Deactivated successfully. May 10 00:41:39.214991 systemd-logind[1296]: Removed session 17. May 10 00:41:39.208000 audit[1824]: CRED_DISP pid=1824 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:39.254550 kernel: audit: type=1106 audit(1746837699.208:463): pid=1824 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:39.256426 kernel: audit: type=1104 audit(1746837699.208:464): pid=1824 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:39.256611 kernel: audit: type=1131 audit(1746837699.211:465): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.26:22-10.200.16.10:48764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:39.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.26:22-10.200.16.10:48764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:39.314223 systemd[1]: Started sshd@16-10.200.8.26:22-10.200.16.10:44032.service. May 10 00:41:39.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.26:22-10.200.16.10:44032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:39.337964 kernel: audit: type=1130 audit(1746837699.312:466): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.26:22-10.200.16.10:44032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:39.936000 audit[1844]: USER_ACCT pid=1844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:39.960430 sshd[1844]: Accepted publickey for core from 10.200.16.10 port 44032 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:41:39.960787 kernel: audit: type=1101 audit(1746837699.936:467): pid=1844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:39.958000 audit[1844]: CRED_ACQ pid=1844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:39.960913 sshd[1844]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:41:39.966332 systemd-logind[1296]: New session 18 of user core. May 10 00:41:39.967361 systemd[1]: Started session-18.scope. May 10 00:41:39.987227 kernel: audit: type=1103 audit(1746837699.958:468): pid=1844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:39.987312 kernel: audit: type=1006 audit(1746837699.958:469): pid=1844 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 10 00:41:39.987355 kernel: audit: type=1300 audit(1746837699.958:469): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8cb4a8e0 a2=3 a3=0 items=0 ppid=1 pid=1844 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:41:39.958000 audit[1844]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8cb4a8e0 a2=3 a3=0 items=0 ppid=1 pid=1844 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:41:39.958000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:41:39.970000 audit[1844]: USER_START pid=1844 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:39.972000 audit[1846]: CRED_ACQ pid=1846 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:40.401113 sshd[1844]: pam_unix(sshd:session): session closed for user core May 10 00:41:40.400000 audit[1844]: USER_END pid=1844 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:40.401000 audit[1844]: CRED_DISP pid=1844 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:40.404238 systemd[1]: sshd@16-10.200.8.26:22-10.200.16.10:44032.service: Deactivated successfully. May 10 00:41:40.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.26:22-10.200.16.10:44032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:40.405359 systemd[1]: session-18.scope: Deactivated successfully. May 10 00:41:40.406024 systemd-logind[1296]: Session 18 logged out. Waiting for processes to exit. May 10 00:41:40.406846 systemd-logind[1296]: Removed session 18. May 10 00:41:40.506030 systemd[1]: Started sshd@17-10.200.8.26:22-10.200.16.10:44046.service. May 10 00:41:40.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.26:22-10.200.16.10:44046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:41.127000 audit[1855]: USER_ACCT pid=1855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:41.129813 sshd[1855]: Accepted publickey for core from 10.200.16.10 port 44046 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:41:41.129000 audit[1855]: CRED_ACQ pid=1855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:41.129000 audit[1855]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff17e8cbb0 a2=3 a3=0 items=0 ppid=1 pid=1855 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:41:41.129000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:41:41.131288 sshd[1855]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:41:41.136319 systemd[1]: Started session-19.scope. May 10 00:41:41.136917 systemd-logind[1296]: New session 19 of user core. May 10 00:41:41.139000 audit[1855]: USER_START pid=1855 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:41.140000 audit[1857]: CRED_ACQ pid=1857 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:41.506000 audit[1865]: USER_ACCT pid=1865 uid=500 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:41.508458 sudo[1865]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/coreos-cloudinit --workspace /tmp/coretest-cloudinit-1016599960 --from-file /tmp/coretest-867720104 May 10 00:41:41.508725 sudo[1865]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:41:41.506000 audit[1865]: CRED_REFR pid=1865 uid=500 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:41.509000 audit[1865]: USER_START pid=1865 uid=500 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:41.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-cloudinit-924501379 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:41.518382 systemd[1]: Started coreos-cloudinit-924501379.service. May 10 00:41:41.521560 sudo[1865]: pam_unix(sudo:session): session closed for user root May 10 00:41:41.519000 audit[1865]: USER_END pid=1865 uid=500 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:41.520000 audit[1865]: CRED_DISP pid=1865 uid=500 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:41.534748 dbus-daemon[1287]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.1' (uid=0 pid=1 comm="/usr/lib/systemd/systemd --switched-root --system" label="system_u:system_r:kernel_t:s0") May 10 00:41:41.537780 systemd[1]: Starting polkit.service... May 10 00:41:41.633488 polkitd[1875]: Started polkitd version 121 May 10 00:41:41.778112 polkitd[1875]: Loading rules from directory /etc/polkit-1/rules.d May 10 00:41:41.778202 polkitd[1875]: Loading rules from directory /usr/share/polkit-1/rules.d May 10 00:41:41.779996 polkitd[1875]: Finished loading, compiling and executing 2 rules May 10 00:41:41.780483 dbus-daemon[1287]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' May 10 00:41:41.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=polkit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:41.780689 systemd[1]: Started polkit.service. May 10 00:41:41.781444 polkitd[1875]: Acquired the name org.freedesktop.PolicyKit1 on the system bus May 10 00:41:41.892000 audit[1883]: USER_ACCT pid=1883 uid=500 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:41.894328 sudo[1883]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /tmp/coretest-cloudinit-1016599960 May 10 00:41:41.892000 audit[1883]: CRED_REFR pid=1883 uid=500 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:41.894622 sudo[1883]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:41:41.894000 audit[1883]: USER_START pid=1883 uid=500 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:41.897803 sudo[1883]: pam_unix(sudo:session): session closed for user root May 10 00:41:41.896000 audit[1883]: USER_END pid=1883 uid=500 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:41.896000 audit[1883]: CRED_DISP pid=1883 uid=500 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:41.999463 sshd[1855]: pam_unix(sshd:session): session closed for user core May 10 00:41:41.999000 audit[1855]: USER_END pid=1855 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:41.999000 audit[1855]: CRED_DISP pid=1855 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:42.002914 systemd[1]: sshd@17-10.200.8.26:22-10.200.16.10:44046.service: Deactivated successfully. May 10 00:41:42.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.26:22-10.200.16.10:44046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:42.003865 systemd[1]: session-19.scope: Deactivated successfully. May 10 00:41:42.004519 systemd-logind[1296]: Session 19 logged out. Waiting for processes to exit. May 10 00:41:42.005387 systemd-logind[1296]: Removed session 19. May 10 00:41:42.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.26:22-10.200.16.10:44058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:42.105845 systemd[1]: Started sshd@18-10.200.8.26:22-10.200.16.10:44058.service. May 10 00:41:42.729000 audit[1887]: USER_ACCT pid=1887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:42.731430 sshd[1887]: Accepted publickey for core from 10.200.16.10 port 44058 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:41:42.730000 audit[1887]: CRED_ACQ pid=1887 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:42.730000 audit[1887]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfe53c860 a2=3 a3=0 items=0 ppid=1 pid=1887 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:41:42.730000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:41:42.732900 sshd[1887]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:41:42.737853 systemd[1]: Started session-20.scope. May 10 00:41:42.738560 systemd-logind[1296]: New session 20 of user core. May 10 00:41:42.741000 audit[1887]: USER_START pid=1887 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:42.742000 audit[1889]: CRED_ACQ pid=1889 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:43.103000 audit[1897]: USER_ACCT pid=1897 uid=500 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:43.105004 sudo[1897]: core : PWD=/home/core ; USER=core ; COMMAND=/usr/bin/gdbus call --system --dest org.freedesktop.systemd1 --object-path /org/freedesktop/systemd1 --method org.freedesktop.systemd1.Manager.RestartUnit ntpd.service replace May 10 00:41:43.105266 sudo[1897]: pam_unix(sudo:session): session opened for user core(uid=500) by (uid=500) May 10 00:41:43.103000 audit[1897]: CRED_REFR pid=1897 uid=500 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:43.105000 audit[1897]: USER_START pid=1897 uid=500 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:43.168389 sudo[1897]: pam_unix(sudo:session): session closed for user core May 10 00:41:43.166000 audit[1897]: USER_END pid=1897 uid=500 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:43.166000 audit[1897]: CRED_DISP pid=1897 uid=500 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:43.172000 audit[1903]: USER_ACCT pid=1903 uid=500 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:43.174624 sudo[1903]: core : PWD=/home/core ; USER=core ; COMMAND=/usr/bin/gdbus call --system --dest org.freedesktop.systemd1 --object-path /org/freedesktop/systemd1/unit/ntpd_2eservice --method org.freedesktop.DBus.Properties.GetAll org.freedesktop.systemd1.Unit May 10 00:41:43.174936 sudo[1903]: pam_unix(sudo:session): session opened for user core(uid=500) by (uid=500) May 10 00:41:43.172000 audit[1903]: CRED_REFR pid=1903 uid=500 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:43.174000 audit[1903]: USER_START pid=1903 uid=500 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:43.193391 sudo[1903]: pam_unix(sudo:session): session closed for user core May 10 00:41:43.191000 audit[1903]: USER_END pid=1903 uid=500 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:43.191000 audit[1903]: CRED_DISP pid=1903 uid=500 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:41:43.295329 sshd[1887]: pam_unix(sshd:session): session closed for user core May 10 00:41:43.294000 audit[1887]: USER_END pid=1887 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:43.295000 audit[1887]: CRED_DISP pid=1887 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:43.298643 systemd[1]: sshd@18-10.200.8.26:22-10.200.16.10:44058.service: Deactivated successfully. May 10 00:41:43.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.26:22-10.200.16.10:44058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:43.299525 systemd[1]: session-20.scope: Deactivated successfully. May 10 00:41:43.300181 systemd-logind[1296]: Session 20 logged out. Waiting for processes to exit. May 10 00:41:43.301044 systemd-logind[1296]: Removed session 20. May 10 00:41:43.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.26:22-10.200.16.10:44068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:43.400361 systemd[1]: Started sshd@19-10.200.8.26:22-10.200.16.10:44068.service. May 10 00:41:44.023000 audit[1909]: USER_ACCT pid=1909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:44.025212 sshd[1909]: Accepted publickey for core from 10.200.16.10 port 44068 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:41:44.024000 audit[1909]: CRED_ACQ pid=1909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:44.024000 audit[1909]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfe57b870 a2=3 a3=0 items=0 ppid=1 pid=1909 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:41:44.024000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:41:44.026701 sshd[1909]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:41:44.031710 systemd[1]: Started session-21.scope. May 10 00:41:44.032490 systemd-logind[1296]: New session 21 of user core. May 10 00:41:44.035000 audit[1909]: USER_START pid=1909 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:44.036000 audit[1911]: CRED_ACQ pid=1911 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:44.486406 sshd[1909]: pam_unix(sshd:session): session closed for user core May 10 00:41:44.486000 audit[1909]: USER_END pid=1909 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:44.490701 systemd[1]: sshd@19-10.200.8.26:22-10.200.16.10:44068.service: Deactivated successfully. May 10 00:41:44.491560 systemd[1]: session-21.scope: Deactivated successfully. May 10 00:41:44.493033 systemd-logind[1296]: Session 21 logged out. Waiting for processes to exit. May 10 00:41:44.493823 kernel: kauditd_printk_skb: 58 callbacks suppressed May 10 00:41:44.493865 kernel: audit: type=1106 audit(1746837704.486:521): pid=1909 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:44.494320 systemd-logind[1296]: Removed session 21. May 10 00:41:44.486000 audit[1909]: CRED_DISP pid=1909 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:44.532442 kernel: audit: type=1104 audit(1746837704.486:522): pid=1909 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:44.532574 kernel: audit: type=1131 audit(1746837704.486:523): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.26:22-10.200.16.10:44068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:44.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.26:22-10.200.16.10:44068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:44.591556 systemd[1]: Started sshd@20-10.200.8.26:22-10.200.16.10:44074.service. May 10 00:41:44.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.26:22-10.200.16.10:44074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:44.611786 kernel: audit: type=1130 audit(1746837704.590:524): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.26:22-10.200.16.10:44074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:45.212000 audit[1919]: USER_ACCT pid=1919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:45.235884 kernel: audit: type=1101 audit(1746837705.212:525): pid=1919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:45.235941 sshd[1919]: Accepted publickey for core from 10.200.16.10 port 44074 ssh2: RSA SHA256:BLSLhhUraDEt88EfUErhlSBtLTKQ7R9lQ68MHwbBo5g May 10 00:41:45.234000 audit[1919]: CRED_ACQ pid=1919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:45.236359 sshd[1919]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:41:45.241658 systemd[1]: Started session-22.scope. May 10 00:41:45.242846 systemd-logind[1296]: New session 22 of user core. May 10 00:41:45.263096 kernel: audit: type=1103 audit(1746837705.234:526): pid=1919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:45.263226 kernel: audit: type=1006 audit(1746837705.234:527): pid=1919 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 10 00:41:45.263252 kernel: audit: type=1300 audit(1746837705.234:527): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdda3972d0 a2=3 a3=0 items=0 ppid=1 pid=1919 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:41:45.234000 audit[1919]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdda3972d0 a2=3 a3=0 items=0 ppid=1 pid=1919 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:41:45.234000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:41:45.288092 kernel: audit: type=1327 audit(1746837705.234:527): proctitle=737368643A20636F7265205B707269765D May 10 00:41:45.288215 kernel: audit: type=1105 audit(1746837705.246:528): pid=1919 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:45.246000 audit[1919]: USER_START pid=1919 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:45.248000 audit[1921]: CRED_ACQ pid=1921 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:45.678453 sshd[1919]: pam_unix(sshd:session): session closed for user core May 10 00:41:45.679000 audit[1919]: USER_END pid=1919 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:45.679000 audit[1919]: CRED_DISP pid=1919 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' May 10 00:41:45.682078 systemd[1]: sshd@20-10.200.8.26:22-10.200.16.10:44074.service: Deactivated successfully. May 10 00:41:45.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.26:22-10.200.16.10:44074 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:41:45.683083 systemd[1]: session-22.scope: Deactivated successfully. May 10 00:41:45.683851 systemd-logind[1296]: Session 22 logged out. Waiting for processes to exit. May 10 00:41:45.684927 systemd-logind[1296]: Removed session 22.