Jul 2 01:00:05.725586 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Jul 2 01:00:05.725606 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Jul 1 23:37:37 -00 2024 Jul 2 01:00:05.725613 kernel: efi: EFI v2.70 by EDK II Jul 2 01:00:05.725619 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Jul 2 01:00:05.725624 kernel: random: crng init done Jul 2 01:00:05.725629 kernel: ACPI: Early table checksum verification disabled Jul 2 01:00:05.725636 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Jul 2 01:00:05.725642 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Jul 2 01:00:05.725648 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 01:00:05.725653 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 01:00:05.725658 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 01:00:05.725663 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 01:00:05.725668 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 01:00:05.725674 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 01:00:05.725681 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 01:00:05.725687 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 01:00:05.725693 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 01:00:05.725699 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Jul 2 01:00:05.725704 kernel: NUMA: Failed to initialise from firmware Jul 2 01:00:05.725710 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Jul 2 01:00:05.725864 kernel: NUMA: NODE_DATA [mem 0xdcb0a900-0xdcb0ffff] Jul 2 01:00:05.725880 kernel: Zone ranges: Jul 2 01:00:05.725886 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Jul 2 01:00:05.725896 kernel: DMA32 empty Jul 2 01:00:05.725901 kernel: Normal empty Jul 2 01:00:05.725907 kernel: Movable zone start for each node Jul 2 01:00:05.725913 kernel: Early memory node ranges Jul 2 01:00:05.725918 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Jul 2 01:00:05.725924 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Jul 2 01:00:05.725930 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Jul 2 01:00:05.725935 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Jul 2 01:00:05.725941 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Jul 2 01:00:05.725947 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Jul 2 01:00:05.725952 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Jul 2 01:00:05.725958 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Jul 2 01:00:05.725965 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Jul 2 01:00:05.725971 kernel: psci: probing for conduit method from ACPI. Jul 2 01:00:05.725976 kernel: psci: PSCIv1.1 detected in firmware. Jul 2 01:00:05.725982 kernel: psci: Using standard PSCI v0.2 function IDs Jul 2 01:00:05.725988 kernel: psci: Trusted OS migration not required Jul 2 01:00:05.725996 kernel: psci: SMC Calling Convention v1.1 Jul 2 01:00:05.726002 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Jul 2 01:00:05.726009 kernel: ACPI: SRAT not present Jul 2 01:00:05.726016 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Jul 2 01:00:05.726022 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Jul 2 01:00:05.726028 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Jul 2 01:00:05.726034 kernel: Detected PIPT I-cache on CPU0 Jul 2 01:00:05.726040 kernel: CPU features: detected: GIC system register CPU interface Jul 2 01:00:05.726046 kernel: CPU features: detected: Hardware dirty bit management Jul 2 01:00:05.726052 kernel: CPU features: detected: Spectre-v4 Jul 2 01:00:05.726057 kernel: CPU features: detected: Spectre-BHB Jul 2 01:00:05.726065 kernel: CPU features: kernel page table isolation forced ON by KASLR Jul 2 01:00:05.726070 kernel: CPU features: detected: Kernel page table isolation (KPTI) Jul 2 01:00:05.726076 kernel: CPU features: detected: ARM erratum 1418040 Jul 2 01:00:05.726082 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Jul 2 01:00:05.726088 kernel: Policy zone: DMA Jul 2 01:00:05.726096 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=7b86ecfcd4701bdf4668db795601b20c118ac0b117c34a9b3836e0a5236b73b0 Jul 2 01:00:05.726102 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 01:00:05.726108 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 2 01:00:05.726114 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 2 01:00:05.726120 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 01:00:05.726127 kernel: Memory: 2457464K/2572288K available (9792K kernel code, 2092K rwdata, 7572K rodata, 36352K init, 777K bss, 114824K reserved, 0K cma-reserved) Jul 2 01:00:05.726134 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Jul 2 01:00:05.726140 kernel: trace event string verifier disabled Jul 2 01:00:05.726146 kernel: rcu: Preemptible hierarchical RCU implementation. Jul 2 01:00:05.726153 kernel: rcu: RCU event tracing is enabled. Jul 2 01:00:05.726159 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Jul 2 01:00:05.726165 kernel: Trampoline variant of Tasks RCU enabled. Jul 2 01:00:05.726171 kernel: Tracing variant of Tasks RCU enabled. Jul 2 01:00:05.726177 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 01:00:05.726183 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Jul 2 01:00:05.726189 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Jul 2 01:00:05.726195 kernel: GICv3: 256 SPIs implemented Jul 2 01:00:05.726202 kernel: GICv3: 0 Extended SPIs implemented Jul 2 01:00:05.726208 kernel: GICv3: Distributor has no Range Selector support Jul 2 01:00:05.726214 kernel: Root IRQ handler: gic_handle_irq Jul 2 01:00:05.726220 kernel: GICv3: 16 PPIs implemented Jul 2 01:00:05.726226 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Jul 2 01:00:05.726232 kernel: ACPI: SRAT not present Jul 2 01:00:05.726238 kernel: ITS [mem 0x08080000-0x0809ffff] Jul 2 01:00:05.726244 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Jul 2 01:00:05.726250 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Jul 2 01:00:05.726256 kernel: GICv3: using LPI property table @0x00000000400d0000 Jul 2 01:00:05.726262 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Jul 2 01:00:05.726268 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 2 01:00:05.726277 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Jul 2 01:00:05.726283 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Jul 2 01:00:05.726289 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Jul 2 01:00:05.726295 kernel: arm-pv: using stolen time PV Jul 2 01:00:05.726302 kernel: Console: colour dummy device 80x25 Jul 2 01:00:05.726308 kernel: ACPI: Core revision 20210730 Jul 2 01:00:05.726314 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Jul 2 01:00:05.726320 kernel: pid_max: default: 32768 minimum: 301 Jul 2 01:00:05.726326 kernel: LSM: Security Framework initializing Jul 2 01:00:05.726332 kernel: SELinux: Initializing. Jul 2 01:00:05.726340 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 2 01:00:05.726347 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 2 01:00:05.726353 kernel: rcu: Hierarchical SRCU implementation. Jul 2 01:00:05.726359 kernel: Platform MSI: ITS@0x8080000 domain created Jul 2 01:00:05.726365 kernel: PCI/MSI: ITS@0x8080000 domain created Jul 2 01:00:05.726371 kernel: Remapping and enabling EFI services. Jul 2 01:00:05.726377 kernel: smp: Bringing up secondary CPUs ... Jul 2 01:00:05.726383 kernel: Detected PIPT I-cache on CPU1 Jul 2 01:00:05.726389 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Jul 2 01:00:05.726397 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Jul 2 01:00:05.726403 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 2 01:00:05.726409 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Jul 2 01:00:05.726415 kernel: Detected PIPT I-cache on CPU2 Jul 2 01:00:05.726422 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Jul 2 01:00:05.726428 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Jul 2 01:00:05.726434 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 2 01:00:05.726440 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Jul 2 01:00:05.726446 kernel: Detected PIPT I-cache on CPU3 Jul 2 01:00:05.726452 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Jul 2 01:00:05.726460 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Jul 2 01:00:05.726466 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 2 01:00:05.726472 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Jul 2 01:00:05.726478 kernel: smp: Brought up 1 node, 4 CPUs Jul 2 01:00:05.726489 kernel: SMP: Total of 4 processors activated. Jul 2 01:00:05.726496 kernel: CPU features: detected: 32-bit EL0 Support Jul 2 01:00:05.726503 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Jul 2 01:00:05.726510 kernel: CPU features: detected: Common not Private translations Jul 2 01:00:05.726516 kernel: CPU features: detected: CRC32 instructions Jul 2 01:00:05.726522 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Jul 2 01:00:05.726529 kernel: CPU features: detected: LSE atomic instructions Jul 2 01:00:05.726535 kernel: CPU features: detected: Privileged Access Never Jul 2 01:00:05.726543 kernel: CPU features: detected: RAS Extension Support Jul 2 01:00:05.726549 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Jul 2 01:00:05.726556 kernel: CPU: All CPU(s) started at EL1 Jul 2 01:00:05.726562 kernel: alternatives: patching kernel code Jul 2 01:00:05.726570 kernel: devtmpfs: initialized Jul 2 01:00:05.726577 kernel: KASLR enabled Jul 2 01:00:05.726584 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 01:00:05.726590 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Jul 2 01:00:05.726597 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 01:00:05.726603 kernel: SMBIOS 3.0.0 present. Jul 2 01:00:05.726609 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Jul 2 01:00:05.726616 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 01:00:05.726623 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Jul 2 01:00:05.726629 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Jul 2 01:00:05.726637 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Jul 2 01:00:05.726644 kernel: audit: initializing netlink subsys (disabled) Jul 2 01:00:05.726650 kernel: audit: type=2000 audit(0.031:1): state=initialized audit_enabled=0 res=1 Jul 2 01:00:05.726657 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 01:00:05.726663 kernel: cpuidle: using governor menu Jul 2 01:00:05.726669 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Jul 2 01:00:05.726676 kernel: ASID allocator initialised with 32768 entries Jul 2 01:00:05.726682 kernel: ACPI: bus type PCI registered Jul 2 01:00:05.726689 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 01:00:05.726697 kernel: Serial: AMBA PL011 UART driver Jul 2 01:00:05.726703 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 2 01:00:05.726709 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Jul 2 01:00:05.726716 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 01:00:05.726722 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Jul 2 01:00:05.726729 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 01:00:05.726740 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Jul 2 01:00:05.726747 kernel: ACPI: Added _OSI(Module Device) Jul 2 01:00:05.726753 kernel: ACPI: Added _OSI(Processor Device) Jul 2 01:00:05.726761 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 01:00:05.726768 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 01:00:05.726774 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 01:00:05.726781 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 01:00:05.726787 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 01:00:05.726806 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 2 01:00:05.726822 kernel: ACPI: Interpreter enabled Jul 2 01:00:05.726829 kernel: ACPI: Using GIC for interrupt routing Jul 2 01:00:05.726835 kernel: ACPI: MCFG table detected, 1 entries Jul 2 01:00:05.726844 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Jul 2 01:00:05.726850 kernel: printk: console [ttyAMA0] enabled Jul 2 01:00:05.726857 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 2 01:00:05.726994 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 2 01:00:05.727060 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Jul 2 01:00:05.727121 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Jul 2 01:00:05.727180 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Jul 2 01:00:05.727243 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Jul 2 01:00:05.727251 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Jul 2 01:00:05.727258 kernel: PCI host bridge to bus 0000:00 Jul 2 01:00:05.727323 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Jul 2 01:00:05.727379 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Jul 2 01:00:05.727434 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Jul 2 01:00:05.727487 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 2 01:00:05.727560 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Jul 2 01:00:05.727628 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Jul 2 01:00:05.727691 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Jul 2 01:00:05.727754 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Jul 2 01:00:05.727847 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Jul 2 01:00:05.727910 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Jul 2 01:00:05.727971 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Jul 2 01:00:05.728035 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Jul 2 01:00:05.728096 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Jul 2 01:00:05.728151 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Jul 2 01:00:05.728205 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Jul 2 01:00:05.728214 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Jul 2 01:00:05.728221 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Jul 2 01:00:05.728227 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Jul 2 01:00:05.728236 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Jul 2 01:00:05.728242 kernel: iommu: Default domain type: Translated Jul 2 01:00:05.728249 kernel: iommu: DMA domain TLB invalidation policy: strict mode Jul 2 01:00:05.728255 kernel: vgaarb: loaded Jul 2 01:00:05.728262 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 01:00:05.728269 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 01:00:05.728275 kernel: PTP clock support registered Jul 2 01:00:05.728282 kernel: Registered efivars operations Jul 2 01:00:05.728288 kernel: clocksource: Switched to clocksource arch_sys_counter Jul 2 01:00:05.728294 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 01:00:05.728302 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 01:00:05.728309 kernel: pnp: PnP ACPI init Jul 2 01:00:05.728378 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Jul 2 01:00:05.728387 kernel: pnp: PnP ACPI: found 1 devices Jul 2 01:00:05.728394 kernel: NET: Registered PF_INET protocol family Jul 2 01:00:05.728400 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 2 01:00:05.728407 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jul 2 01:00:05.728414 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 01:00:05.728422 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 2 01:00:05.728429 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jul 2 01:00:05.728435 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jul 2 01:00:05.728442 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 2 01:00:05.728449 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 2 01:00:05.728455 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 01:00:05.728462 kernel: PCI: CLS 0 bytes, default 64 Jul 2 01:00:05.728468 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Jul 2 01:00:05.728476 kernel: kvm [1]: HYP mode not available Jul 2 01:00:05.728483 kernel: Initialise system trusted keyrings Jul 2 01:00:05.728489 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jul 2 01:00:05.728496 kernel: Key type asymmetric registered Jul 2 01:00:05.728502 kernel: Asymmetric key parser 'x509' registered Jul 2 01:00:05.728509 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 01:00:05.728515 kernel: io scheduler mq-deadline registered Jul 2 01:00:05.728522 kernel: io scheduler kyber registered Jul 2 01:00:05.728528 kernel: io scheduler bfq registered Jul 2 01:00:05.728535 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Jul 2 01:00:05.728542 kernel: ACPI: button: Power Button [PWRB] Jul 2 01:00:05.728549 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Jul 2 01:00:05.728611 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Jul 2 01:00:05.728620 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 01:00:05.728626 kernel: thunder_xcv, ver 1.0 Jul 2 01:00:05.728633 kernel: thunder_bgx, ver 1.0 Jul 2 01:00:05.728640 kernel: nicpf, ver 1.0 Jul 2 01:00:05.728646 kernel: nicvf, ver 1.0 Jul 2 01:00:05.728715 kernel: rtc-efi rtc-efi.0: registered as rtc0 Jul 2 01:00:05.728779 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-07-02T01:00:05 UTC (1719882005) Jul 2 01:00:05.728805 kernel: hid: raw HID events driver (C) Jiri Kosina Jul 2 01:00:05.728813 kernel: NET: Registered PF_INET6 protocol family Jul 2 01:00:05.728820 kernel: Segment Routing with IPv6 Jul 2 01:00:05.728826 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 01:00:05.728833 kernel: NET: Registered PF_PACKET protocol family Jul 2 01:00:05.728840 kernel: Key type dns_resolver registered Jul 2 01:00:05.728846 kernel: registered taskstats version 1 Jul 2 01:00:05.728855 kernel: Loading compiled-in X.509 certificates Jul 2 01:00:05.728862 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: c418313b450e4055b23e41c11cb6dc415de0265d' Jul 2 01:00:05.728869 kernel: Key type .fscrypt registered Jul 2 01:00:05.728875 kernel: Key type fscrypt-provisioning registered Jul 2 01:00:05.728882 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 2 01:00:05.728889 kernel: ima: Allocated hash algorithm: sha1 Jul 2 01:00:05.728895 kernel: ima: No architecture policies found Jul 2 01:00:05.728902 kernel: clk: Disabling unused clocks Jul 2 01:00:05.728908 kernel: Freeing unused kernel memory: 36352K Jul 2 01:00:05.728916 kernel: Run /init as init process Jul 2 01:00:05.728923 kernel: with arguments: Jul 2 01:00:05.728929 kernel: /init Jul 2 01:00:05.728936 kernel: with environment: Jul 2 01:00:05.728942 kernel: HOME=/ Jul 2 01:00:05.728949 kernel: TERM=linux Jul 2 01:00:05.728955 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 01:00:05.728963 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 01:00:05.728973 systemd[1]: Detected virtualization kvm. Jul 2 01:00:05.728981 systemd[1]: Detected architecture arm64. Jul 2 01:00:05.728988 systemd[1]: Running in initrd. Jul 2 01:00:05.728995 systemd[1]: No hostname configured, using default hostname. Jul 2 01:00:05.729002 systemd[1]: Hostname set to . Jul 2 01:00:05.729009 systemd[1]: Initializing machine ID from VM UUID. Jul 2 01:00:05.729016 systemd[1]: Queued start job for default target initrd.target. Jul 2 01:00:05.729023 systemd[1]: Started systemd-ask-password-console.path. Jul 2 01:00:05.729032 systemd[1]: Reached target cryptsetup.target. Jul 2 01:00:05.729040 systemd[1]: Reached target paths.target. Jul 2 01:00:05.729047 systemd[1]: Reached target slices.target. Jul 2 01:00:05.729054 systemd[1]: Reached target swap.target. Jul 2 01:00:05.729061 systemd[1]: Reached target timers.target. Jul 2 01:00:05.729068 systemd[1]: Listening on iscsid.socket. Jul 2 01:00:05.729075 systemd[1]: Listening on iscsiuio.socket. Jul 2 01:00:05.729084 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 01:00:05.729091 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 01:00:05.729098 systemd[1]: Listening on systemd-journald.socket. Jul 2 01:00:05.729105 systemd[1]: Listening on systemd-networkd.socket. Jul 2 01:00:05.729112 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 01:00:05.729119 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 01:00:05.729126 systemd[1]: Reached target sockets.target. Jul 2 01:00:05.729134 systemd[1]: Starting kmod-static-nodes.service... Jul 2 01:00:05.729141 systemd[1]: Finished network-cleanup.service. Jul 2 01:00:05.729150 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 01:00:05.729157 systemd[1]: Starting systemd-journald.service... Jul 2 01:00:05.729164 systemd[1]: Starting systemd-modules-load.service... Jul 2 01:00:05.729171 systemd[1]: Starting systemd-resolved.service... Jul 2 01:00:05.729178 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 01:00:05.729185 systemd[1]: Finished kmod-static-nodes.service. Jul 2 01:00:05.729192 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 01:00:05.729199 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 01:00:05.729206 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 01:00:05.729214 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 01:00:05.729224 systemd-journald[290]: Journal started Jul 2 01:00:05.729264 systemd-journald[290]: Runtime Journal (/run/log/journal/15eb17a32cb346c2ae077fa0c81e047c) is 6.0M, max 48.7M, 42.6M free. Jul 2 01:00:05.720057 systemd-modules-load[291]: Inserted module 'overlay' Jul 2 01:00:05.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:05.732825 systemd[1]: Started systemd-journald.service. Jul 2 01:00:05.732844 kernel: audit: type=1130 audit(1719882005.731:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:05.732938 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 01:00:05.737590 kernel: audit: type=1130 audit(1719882005.735:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:05.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:05.740265 systemd-resolved[292]: Positive Trust Anchors: Jul 2 01:00:05.740280 systemd-resolved[292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 01:00:05.740309 systemd-resolved[292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 01:00:05.747464 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 01:00:05.747485 kernel: Bridge firewalling registered Jul 2 01:00:05.745017 systemd-resolved[292]: Defaulting to hostname 'linux'. Jul 2 01:00:05.750743 kernel: audit: type=1130 audit(1719882005.747:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:05.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:05.745731 systemd[1]: Started systemd-resolved.service. Jul 2 01:00:05.747397 systemd-modules-load[291]: Inserted module 'br_netfilter' Jul 2 01:00:05.748087 systemd[1]: Reached target nss-lookup.target. Jul 2 01:00:05.756949 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 01:00:05.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:05.758552 systemd[1]: Starting dracut-cmdline.service... Jul 2 01:00:05.761222 kernel: audit: type=1130 audit(1719882005.756:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:05.761826 kernel: SCSI subsystem initialized Jul 2 01:00:05.767237 dracut-cmdline[309]: dracut-dracut-053 Jul 2 01:00:05.769659 dracut-cmdline[309]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=7b86ecfcd4701bdf4668db795601b20c118ac0b117c34a9b3836e0a5236b73b0 Jul 2 01:00:05.773248 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 01:00:05.773265 kernel: device-mapper: uevent: version 1.0.3 Jul 2 01:00:05.773274 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 01:00:05.776131 systemd-modules-load[291]: Inserted module 'dm_multipath' Jul 2 01:00:05.776909 systemd[1]: Finished systemd-modules-load.service. Jul 2 01:00:05.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:05.779809 kernel: audit: type=1130 audit(1719882005.776:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:05.778230 systemd[1]: Starting systemd-sysctl.service... Jul 2 01:00:05.786397 systemd[1]: Finished systemd-sysctl.service. Jul 2 01:00:05.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:05.789826 kernel: audit: type=1130 audit(1719882005.786:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:05.830820 kernel: Loading iSCSI transport class v2.0-870. Jul 2 01:00:05.842819 kernel: iscsi: registered transport (tcp) Jul 2 01:00:05.857829 kernel: iscsi: registered transport (qla4xxx) Jul 2 01:00:05.857842 kernel: QLogic iSCSI HBA Driver Jul 2 01:00:05.890968 systemd[1]: Finished dracut-cmdline.service. Jul 2 01:00:05.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:05.893821 kernel: audit: type=1130 audit(1719882005.890:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:05.892347 systemd[1]: Starting dracut-pre-udev.service... Jul 2 01:00:05.935822 kernel: raid6: neonx8 gen() 13776 MB/s Jul 2 01:00:05.952813 kernel: raid6: neonx8 xor() 10744 MB/s Jul 2 01:00:05.969813 kernel: raid6: neonx4 gen() 12380 MB/s Jul 2 01:00:05.986813 kernel: raid6: neonx4 xor() 10943 MB/s Jul 2 01:00:06.003813 kernel: raid6: neonx2 gen() 12950 MB/s Jul 2 01:00:06.020814 kernel: raid6: neonx2 xor() 10262 MB/s Jul 2 01:00:06.037815 kernel: raid6: neonx1 gen() 10542 MB/s Jul 2 01:00:06.054818 kernel: raid6: neonx1 xor() 8784 MB/s Jul 2 01:00:06.071816 kernel: raid6: int64x8 gen() 6272 MB/s Jul 2 01:00:06.088824 kernel: raid6: int64x8 xor() 3541 MB/s Jul 2 01:00:06.105813 kernel: raid6: int64x4 gen() 7205 MB/s Jul 2 01:00:06.122815 kernel: raid6: int64x4 xor() 3854 MB/s Jul 2 01:00:06.139813 kernel: raid6: int64x2 gen() 6149 MB/s Jul 2 01:00:06.156814 kernel: raid6: int64x2 xor() 3321 MB/s Jul 2 01:00:06.173813 kernel: raid6: int64x1 gen() 5041 MB/s Jul 2 01:00:06.191066 kernel: raid6: int64x1 xor() 2644 MB/s Jul 2 01:00:06.191078 kernel: raid6: using algorithm neonx8 gen() 13776 MB/s Jul 2 01:00:06.191087 kernel: raid6: .... xor() 10744 MB/s, rmw enabled Jul 2 01:00:06.191099 kernel: raid6: using neon recovery algorithm Jul 2 01:00:06.202815 kernel: xor: measuring software checksum speed Jul 2 01:00:06.204068 kernel: 8regs : 17271 MB/sec Jul 2 01:00:06.204080 kernel: 32regs : 20760 MB/sec Jul 2 01:00:06.205317 kernel: arm64_neon : 27930 MB/sec Jul 2 01:00:06.205329 kernel: xor: using function: arm64_neon (27930 MB/sec) Jul 2 01:00:06.258828 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Jul 2 01:00:06.269427 systemd[1]: Finished dracut-pre-udev.service. Jul 2 01:00:06.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:06.270975 systemd[1]: Starting systemd-udevd.service... Jul 2 01:00:06.273856 kernel: audit: type=1130 audit(1719882006.269:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:06.273873 kernel: audit: type=1334 audit(1719882006.269:10): prog-id=7 op=LOAD Jul 2 01:00:06.269000 audit: BPF prog-id=7 op=LOAD Jul 2 01:00:06.269000 audit: BPF prog-id=8 op=LOAD Jul 2 01:00:06.284615 systemd-udevd[492]: Using default interface naming scheme 'v252'. Jul 2 01:00:06.288849 systemd[1]: Started systemd-udevd.service. Jul 2 01:00:06.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:06.290130 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 01:00:06.301078 dracut-pre-trigger[498]: rd.md=0: removing MD RAID activation Jul 2 01:00:06.325996 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 01:00:06.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:06.327314 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 01:00:06.361194 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 01:00:06.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:06.394852 kernel: virtio_blk virtio1: [vda] 9289728 512-byte logical blocks (4.76 GB/4.43 GiB) Jul 2 01:00:06.397826 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 01:00:06.406595 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 01:00:06.407487 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 01:00:06.411528 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 01:00:06.413050 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (551) Jul 2 01:00:06.416638 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 01:00:06.423440 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 01:00:06.425194 systemd[1]: Starting disk-uuid.service... Jul 2 01:00:06.434822 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 01:00:07.446415 disk-uuid[565]: The operation has completed successfully. Jul 2 01:00:07.447743 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 01:00:07.470327 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 01:00:07.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:07.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:07.470428 systemd[1]: Finished disk-uuid.service. Jul 2 01:00:07.471938 systemd[1]: Starting verity-setup.service... Jul 2 01:00:07.487085 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Jul 2 01:00:07.507523 systemd[1]: Found device dev-mapper-usr.device. Jul 2 01:00:07.509563 systemd[1]: Mounting sysusr-usr.mount... Jul 2 01:00:07.511633 systemd[1]: Finished verity-setup.service. Jul 2 01:00:07.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:07.560819 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 01:00:07.560977 systemd[1]: Mounted sysusr-usr.mount. Jul 2 01:00:07.561603 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 01:00:07.562340 systemd[1]: Starting ignition-setup.service... Jul 2 01:00:07.563921 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 01:00:07.571254 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Jul 2 01:00:07.571290 kernel: BTRFS info (device vda6): using free space tree Jul 2 01:00:07.571304 kernel: BTRFS info (device vda6): has skinny extents Jul 2 01:00:07.579505 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 2 01:00:07.585758 systemd[1]: Finished ignition-setup.service. Jul 2 01:00:07.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:07.587155 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 01:00:07.646911 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 01:00:07.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:07.647000 audit: BPF prog-id=9 op=LOAD Jul 2 01:00:07.648879 systemd[1]: Starting systemd-networkd.service... Jul 2 01:00:07.682306 ignition[652]: Ignition 2.14.0 Jul 2 01:00:07.682315 ignition[652]: Stage: fetch-offline Jul 2 01:00:07.682843 systemd-networkd[741]: lo: Link UP Jul 2 01:00:07.682351 ignition[652]: no configs at "/usr/lib/ignition/base.d" Jul 2 01:00:07.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:07.682847 systemd-networkd[741]: lo: Gained carrier Jul 2 01:00:07.682360 ignition[652]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 01:00:07.683372 systemd-networkd[741]: Enumeration completed Jul 2 01:00:07.682506 ignition[652]: parsed url from cmdline: "" Jul 2 01:00:07.683571 systemd[1]: Started systemd-networkd.service. Jul 2 01:00:07.682509 ignition[652]: no config URL provided Jul 2 01:00:07.683678 systemd-networkd[741]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 01:00:07.682513 ignition[652]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 01:00:07.684297 systemd[1]: Reached target network.target. Jul 2 01:00:07.682520 ignition[652]: no config at "/usr/lib/ignition/user.ign" Jul 2 01:00:07.684805 systemd-networkd[741]: eth0: Link UP Jul 2 01:00:07.682537 ignition[652]: op(1): [started] loading QEMU firmware config module Jul 2 01:00:07.684809 systemd-networkd[741]: eth0: Gained carrier Jul 2 01:00:07.682542 ignition[652]: op(1): executing: "modprobe" "qemu_fw_cfg" Jul 2 01:00:07.686263 systemd[1]: Starting iscsiuio.service... Jul 2 01:00:07.690887 ignition[652]: op(1): [finished] loading QEMU firmware config module Jul 2 01:00:07.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:07.695599 systemd[1]: Started iscsiuio.service. Jul 2 01:00:07.697705 systemd[1]: Starting iscsid.service... Jul 2 01:00:07.700789 ignition[652]: parsing config with SHA512: 149a2cf15df97086eb354c2d1a7ca8b326664f501632370926683ecb670c39666b8daafad1c5c2a2d00d5d742e21e031f49a7b831fc313330f7b81ddf7d864b7 Jul 2 01:00:07.701030 iscsid[748]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 01:00:07.701030 iscsid[748]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 01:00:07.701030 iscsid[748]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 01:00:07.701030 iscsid[748]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 01:00:07.701030 iscsid[748]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 01:00:07.701030 iscsid[748]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 01:00:07.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:07.704729 systemd[1]: Started iscsid.service. Jul 2 01:00:07.708013 systemd[1]: Starting dracut-initqueue.service... Jul 2 01:00:07.712891 systemd-networkd[741]: eth0: DHCPv4 address 10.0.0.124/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 2 01:00:07.718927 systemd[1]: Finished dracut-initqueue.service. Jul 2 01:00:07.719600 systemd[1]: Reached target remote-fs-pre.target. Jul 2 01:00:07.720520 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 01:00:07.721548 systemd[1]: Reached target remote-fs.target. Jul 2 01:00:07.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:07.723586 systemd[1]: Starting dracut-pre-mount.service... Jul 2 01:00:07.724395 ignition[652]: fetch-offline: fetch-offline passed Jul 2 01:00:07.724186 unknown[652]: fetched base config from "system" Jul 2 01:00:07.724478 ignition[652]: Ignition finished successfully Jul 2 01:00:07.724194 unknown[652]: fetched user config from "qemu" Jul 2 01:00:07.728234 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 01:00:07.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:07.729241 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Jul 2 01:00:07.729991 systemd[1]: Starting ignition-kargs.service... Jul 2 01:00:07.731580 systemd[1]: Finished dracut-pre-mount.service. Jul 2 01:00:07.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:07.738980 ignition[762]: Ignition 2.14.0 Jul 2 01:00:07.738991 ignition[762]: Stage: kargs Jul 2 01:00:07.739108 ignition[762]: no configs at "/usr/lib/ignition/base.d" Jul 2 01:00:07.741044 systemd[1]: Finished ignition-kargs.service. Jul 2 01:00:07.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:07.739119 ignition[762]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 01:00:07.739722 ignition[762]: kargs: kargs passed Jul 2 01:00:07.742944 systemd[1]: Starting ignition-disks.service... Jul 2 01:00:07.739763 ignition[762]: Ignition finished successfully Jul 2 01:00:07.749873 ignition[768]: Ignition 2.14.0 Jul 2 01:00:07.749883 ignition[768]: Stage: disks Jul 2 01:00:07.749978 ignition[768]: no configs at "/usr/lib/ignition/base.d" Jul 2 01:00:07.749988 ignition[768]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 01:00:07.750527 ignition[768]: disks: disks passed Jul 2 01:00:07.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:07.752233 systemd[1]: Finished ignition-disks.service. Jul 2 01:00:07.750564 ignition[768]: Ignition finished successfully Jul 2 01:00:07.753502 systemd[1]: Reached target initrd-root-device.target. Jul 2 01:00:07.754695 systemd[1]: Reached target local-fs-pre.target. Jul 2 01:00:07.755670 systemd[1]: Reached target local-fs.target. Jul 2 01:00:07.756613 systemd[1]: Reached target sysinit.target. Jul 2 01:00:07.757598 systemd[1]: Reached target basic.target. Jul 2 01:00:07.759435 systemd[1]: Starting systemd-fsck-root.service... Jul 2 01:00:07.770064 systemd-fsck[776]: ROOT: clean, 614/553520 files, 56019/553472 blocks Jul 2 01:00:07.773806 systemd[1]: Finished systemd-fsck-root.service. Jul 2 01:00:07.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:07.777059 systemd[1]: Mounting sysroot.mount... Jul 2 01:00:07.783484 systemd[1]: Mounted sysroot.mount. Jul 2 01:00:07.784587 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 01:00:07.784091 systemd[1]: Reached target initrd-root-fs.target. Jul 2 01:00:07.786028 systemd[1]: Mounting sysroot-usr.mount... Jul 2 01:00:07.786727 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 2 01:00:07.786763 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 01:00:07.786784 systemd[1]: Reached target ignition-diskful.target. Jul 2 01:00:07.788671 systemd[1]: Mounted sysroot-usr.mount. Jul 2 01:00:07.790734 systemd[1]: Starting initrd-setup-root.service... Jul 2 01:00:07.794870 initrd-setup-root[786]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 01:00:07.799258 initrd-setup-root[794]: cut: /sysroot/etc/group: No such file or directory Jul 2 01:00:07.802894 initrd-setup-root[802]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 01:00:07.806833 initrd-setup-root[810]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 01:00:07.834117 systemd[1]: Finished initrd-setup-root.service. Jul 2 01:00:07.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:07.835529 systemd[1]: Starting ignition-mount.service... Jul 2 01:00:07.836716 systemd[1]: Starting sysroot-boot.service... Jul 2 01:00:07.841318 bash[827]: umount: /sysroot/usr/share/oem: not mounted. Jul 2 01:00:07.849737 ignition[829]: INFO : Ignition 2.14.0 Jul 2 01:00:07.849737 ignition[829]: INFO : Stage: mount Jul 2 01:00:07.850987 ignition[829]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 2 01:00:07.850987 ignition[829]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 01:00:07.850987 ignition[829]: INFO : mount: mount passed Jul 2 01:00:07.850987 ignition[829]: INFO : Ignition finished successfully Jul 2 01:00:07.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:07.852596 systemd[1]: Finished ignition-mount.service. Jul 2 01:00:07.855971 systemd[1]: Finished sysroot-boot.service. Jul 2 01:00:07.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.518912 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 01:00:08.525360 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (837) Jul 2 01:00:08.525392 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Jul 2 01:00:08.525402 kernel: BTRFS info (device vda6): using free space tree Jul 2 01:00:08.526259 kernel: BTRFS info (device vda6): has skinny extents Jul 2 01:00:08.529012 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 01:00:08.530363 systemd[1]: Starting ignition-files.service... Jul 2 01:00:08.544204 ignition[857]: INFO : Ignition 2.14.0 Jul 2 01:00:08.544204 ignition[857]: INFO : Stage: files Jul 2 01:00:08.545688 ignition[857]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 2 01:00:08.545688 ignition[857]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 01:00:08.545688 ignition[857]: DEBUG : files: compiled without relabeling support, skipping Jul 2 01:00:08.548102 ignition[857]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 01:00:08.548102 ignition[857]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 01:00:08.550012 ignition[857]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 01:00:08.550990 ignition[857]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 01:00:08.550990 ignition[857]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 01:00:08.550660 unknown[857]: wrote ssh authorized keys file for user: core Jul 2 01:00:08.553901 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 01:00:08.553901 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 01:00:08.553901 ignition[857]: INFO : files: op(4): [started] processing unit "etcd-member.service" Jul 2 01:00:08.553901 ignition[857]: INFO : files: op(4): op(5): [started] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Jul 2 01:00:08.553901 ignition[857]: INFO : files: op(4): op(5): [finished] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Jul 2 01:00:08.553901 ignition[857]: INFO : files: op(4): [finished] processing unit "etcd-member.service" Jul 2 01:00:08.553901 ignition[857]: INFO : files: op(6): [started] processing unit "coreos-metadata.service" Jul 2 01:00:08.553901 ignition[857]: INFO : files: op(6): op(7): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 2 01:00:08.553901 ignition[857]: INFO : files: op(6): op(7): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 2 01:00:08.553901 ignition[857]: INFO : files: op(6): [finished] processing unit "coreos-metadata.service" Jul 2 01:00:08.553901 ignition[857]: INFO : files: op(8): [started] setting preset to enabled for "etcd-member.service" Jul 2 01:00:08.553901 ignition[857]: INFO : files: op(8): [finished] setting preset to enabled for "etcd-member.service" Jul 2 01:00:08.553901 ignition[857]: INFO : files: op(9): [started] setting preset to disabled for "coreos-metadata.service" Jul 2 01:00:08.553901 ignition[857]: INFO : files: op(9): op(a): [started] removing enablement symlink(s) for "coreos-metadata.service" Jul 2 01:00:08.586334 ignition[857]: INFO : files: op(9): op(a): [finished] removing enablement symlink(s) for "coreos-metadata.service" Jul 2 01:00:08.587404 ignition[857]: INFO : files: op(9): [finished] setting preset to disabled for "coreos-metadata.service" Jul 2 01:00:08.587404 ignition[857]: INFO : files: createResultFile: createFiles: op(b): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 01:00:08.587404 ignition[857]: INFO : files: createResultFile: createFiles: op(b): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 01:00:08.587404 ignition[857]: INFO : files: files passed Jul 2 01:00:08.587404 ignition[857]: INFO : Ignition finished successfully Jul 2 01:00:08.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.587478 systemd[1]: Finished ignition-files.service. Jul 2 01:00:08.589719 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 01:00:08.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.590614 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 01:00:08.596713 initrd-setup-root-after-ignition[882]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Jul 2 01:00:08.591272 systemd[1]: Starting ignition-quench.service... Jul 2 01:00:08.598916 initrd-setup-root-after-ignition[884]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 01:00:08.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.594007 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 01:00:08.594092 systemd[1]: Finished ignition-quench.service. Jul 2 01:00:08.596878 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 01:00:08.598534 systemd[1]: Reached target ignition-complete.target. Jul 2 01:00:08.600086 systemd[1]: Starting initrd-parse-etc.service... Jul 2 01:00:08.611971 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 01:00:08.612066 systemd[1]: Finished initrd-parse-etc.service. Jul 2 01:00:08.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.613323 systemd[1]: Reached target initrd-fs.target. Jul 2 01:00:08.614183 systemd[1]: Reached target initrd.target. Jul 2 01:00:08.615149 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 01:00:08.615914 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 01:00:08.626059 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 01:00:08.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.627441 systemd[1]: Starting initrd-cleanup.service... Jul 2 01:00:08.634970 systemd[1]: Stopped target network.target. Jul 2 01:00:08.636107 systemd[1]: Stopped target nss-lookup.target. Jul 2 01:00:08.636716 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 01:00:08.637758 systemd[1]: Stopped target timers.target. Jul 2 01:00:08.638760 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 01:00:08.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.638886 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 01:00:08.639890 systemd[1]: Stopped target initrd.target. Jul 2 01:00:08.640840 systemd[1]: Stopped target basic.target. Jul 2 01:00:08.641762 systemd[1]: Stopped target ignition-complete.target. Jul 2 01:00:08.643048 systemd[1]: Stopped target ignition-diskful.target. Jul 2 01:00:08.643976 systemd[1]: Stopped target initrd-root-device.target. Jul 2 01:00:08.645034 systemd[1]: Stopped target remote-fs.target. Jul 2 01:00:08.646016 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 01:00:08.647047 systemd[1]: Stopped target sysinit.target. Jul 2 01:00:08.647963 systemd[1]: Stopped target local-fs.target. Jul 2 01:00:08.648899 systemd[1]: Stopped target local-fs-pre.target. Jul 2 01:00:08.650038 systemd[1]: Stopped target swap.target. Jul 2 01:00:08.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.650898 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 01:00:08.651000 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 01:00:08.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.651973 systemd[1]: Stopped target cryptsetup.target. Jul 2 01:00:08.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.652777 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 01:00:08.652897 systemd[1]: Stopped dracut-initqueue.service. Jul 2 01:00:08.653971 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 01:00:08.654061 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 01:00:08.655024 systemd[1]: Stopped target paths.target. Jul 2 01:00:08.655861 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 01:00:08.658839 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 01:00:08.660118 systemd[1]: Stopped target slices.target. Jul 2 01:00:08.661156 systemd[1]: Stopped target sockets.target. Jul 2 01:00:08.662100 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 01:00:08.662171 systemd[1]: Closed iscsid.socket. Jul 2 01:00:08.662968 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 01:00:08.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.663030 systemd[1]: Closed iscsiuio.socket. Jul 2 01:00:08.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.663923 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 01:00:08.664022 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 01:00:08.664943 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 01:00:08.665031 systemd[1]: Stopped ignition-files.service. Jul 2 01:00:08.666824 systemd[1]: Stopping ignition-mount.service... Jul 2 01:00:08.668272 systemd[1]: Stopping sysroot-boot.service... Jul 2 01:00:08.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.674587 ignition[897]: INFO : Ignition 2.14.0 Jul 2 01:00:08.674587 ignition[897]: INFO : Stage: umount Jul 2 01:00:08.674587 ignition[897]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 2 01:00:08.674587 ignition[897]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 01:00:08.674587 ignition[897]: INFO : umount: umount passed Jul 2 01:00:08.674587 ignition[897]: INFO : Ignition finished successfully Jul 2 01:00:08.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.669405 systemd[1]: Stopping systemd-networkd.service... Jul 2 01:00:08.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.670602 systemd[1]: Stopping systemd-resolved.service... Jul 2 01:00:08.671381 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 01:00:08.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.671492 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 01:00:08.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.672675 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 01:00:08.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.672770 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 01:00:08.675901 systemd-networkd[741]: eth0: DHCPv6 lease lost Jul 2 01:00:08.685000 audit: BPF prog-id=9 op=UNLOAD Jul 2 01:00:08.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.675989 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 01:00:08.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.676069 systemd[1]: Finished initrd-cleanup.service. Jul 2 01:00:08.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.677284 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 01:00:08.677350 systemd[1]: Stopped ignition-mount.service. Jul 2 01:00:08.679260 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 01:00:08.679598 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 01:00:08.679684 systemd[1]: Stopped systemd-networkd.service. Jul 2 01:00:08.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.680844 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 01:00:08.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.680873 systemd[1]: Closed systemd-networkd.socket. Jul 2 01:00:08.681735 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 01:00:08.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.681772 systemd[1]: Stopped ignition-disks.service. Jul 2 01:00:08.699000 audit: BPF prog-id=6 op=UNLOAD Jul 2 01:00:08.682817 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 01:00:08.682856 systemd[1]: Stopped ignition-kargs.service. Jul 2 01:00:08.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.684008 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 01:00:08.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.684044 systemd[1]: Stopped ignition-setup.service. Jul 2 01:00:08.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.685647 systemd[1]: Stopping network-cleanup.service... Jul 2 01:00:08.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.686217 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 01:00:08.686266 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 01:00:08.687339 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 01:00:08.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.687376 systemd[1]: Stopped systemd-sysctl.service. Jul 2 01:00:08.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.689133 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 01:00:08.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.689172 systemd[1]: Stopped systemd-modules-load.service. Jul 2 01:00:08.692601 systemd[1]: Stopping systemd-udevd.service... Jul 2 01:00:08.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.694588 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 01:00:08.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.695032 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 01:00:08.695118 systemd[1]: Stopped systemd-resolved.service. Jul 2 01:00:08.696612 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 01:00:08.696687 systemd[1]: Stopped sysroot-boot.service. Jul 2 01:00:08.698233 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 01:00:08.698366 systemd[1]: Stopped systemd-udevd.service. Jul 2 01:00:08.699332 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 01:00:08.699364 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 01:00:08.700363 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 01:00:08.700394 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 01:00:08.701354 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 01:00:08.701392 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 01:00:08.702481 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 01:00:08.702517 systemd[1]: Stopped dracut-cmdline.service. Jul 2 01:00:08.703462 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 01:00:08.703498 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 01:00:08.704607 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 01:00:08.704642 systemd[1]: Stopped initrd-setup-root.service. Jul 2 01:00:08.706255 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 01:00:08.707444 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jul 2 01:00:08.707495 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Jul 2 01:00:08.709342 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 01:00:08.709381 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 01:00:08.710013 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 01:00:08.710048 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 01:00:08.711746 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jul 2 01:00:08.712240 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 01:00:08.712325 systemd[1]: Stopped network-cleanup.service. Jul 2 01:00:08.713123 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 01:00:08.713199 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 01:00:08.714232 systemd[1]: Reached target initrd-switch-root.target. Jul 2 01:00:08.716143 systemd[1]: Starting initrd-switch-root.service... Jul 2 01:00:08.722158 systemd[1]: Switching root. Jul 2 01:00:08.743096 iscsid[748]: iscsid shutting down. Jul 2 01:00:08.743610 systemd-journald[290]: Journal stopped Jul 2 01:00:10.661961 systemd-journald[290]: Received SIGTERM from PID 1 (systemd). Jul 2 01:00:10.663755 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 01:00:10.663773 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 01:00:10.663789 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 01:00:10.663806 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 01:00:10.663816 kernel: SELinux: policy capability open_perms=1 Jul 2 01:00:10.663827 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 01:00:10.663839 kernel: SELinux: policy capability always_check_network=0 Jul 2 01:00:10.663848 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 01:00:10.663857 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 01:00:10.663867 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 01:00:10.663876 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 01:00:10.663886 systemd[1]: Successfully loaded SELinux policy in 31.519ms. Jul 2 01:00:10.663906 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.991ms. Jul 2 01:00:10.663918 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 01:00:10.663936 systemd[1]: Detected virtualization kvm. Jul 2 01:00:10.663947 systemd[1]: Detected architecture arm64. Jul 2 01:00:10.663957 systemd[1]: Detected first boot. Jul 2 01:00:10.663968 systemd[1]: Initializing machine ID from VM UUID. Jul 2 01:00:10.663980 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 2 01:00:10.663990 systemd[1]: Populated /etc with preset unit settings. Jul 2 01:00:10.664001 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 01:00:10.664013 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 01:00:10.664026 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 01:00:10.664038 kernel: kauditd_printk_skb: 78 callbacks suppressed Jul 2 01:00:10.664047 kernel: audit: type=1334 audit(1719882010.521:82): prog-id=12 op=LOAD Jul 2 01:00:10.664057 kernel: audit: type=1334 audit(1719882010.521:83): prog-id=3 op=UNLOAD Jul 2 01:00:10.664067 kernel: audit: type=1334 audit(1719882010.522:84): prog-id=13 op=LOAD Jul 2 01:00:10.664076 kernel: audit: type=1334 audit(1719882010.523:85): prog-id=14 op=LOAD Jul 2 01:00:10.664086 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 01:00:10.664099 kernel: audit: type=1334 audit(1719882010.523:86): prog-id=4 op=UNLOAD Jul 2 01:00:10.664110 systemd[1]: Stopped iscsiuio.service. Jul 2 01:00:10.664120 kernel: audit: type=1334 audit(1719882010.523:87): prog-id=5 op=UNLOAD Jul 2 01:00:10.664131 kernel: audit: type=1131 audit(1719882010.524:88): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.664141 kernel: audit: type=1131 audit(1719882010.529:89): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.664151 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 01:00:10.664161 systemd[1]: Stopped iscsid.service. Jul 2 01:00:10.664172 kernel: audit: type=1131 audit(1719882010.532:90): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.664181 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 01:00:10.664193 systemd[1]: Stopped initrd-switch-root.service. Jul 2 01:00:10.664204 kernel: audit: type=1130 audit(1719882010.536:91): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.664215 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 01:00:10.664226 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 01:00:10.664236 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 01:00:10.664248 systemd[1]: Created slice system-getty.slice. Jul 2 01:00:10.664258 systemd[1]: Created slice system-modprobe.slice. Jul 2 01:00:10.664269 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 01:00:10.664279 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 01:00:10.664290 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 01:00:10.664300 systemd[1]: Created slice user.slice. Jul 2 01:00:10.664310 systemd[1]: Started systemd-ask-password-console.path. Jul 2 01:00:10.664322 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 01:00:10.664333 systemd[1]: Set up automount boot.automount. Jul 2 01:00:10.664343 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 01:00:10.664354 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 01:00:10.664365 systemd[1]: Stopped target initrd-fs.target. Jul 2 01:00:10.664375 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 01:00:10.664385 systemd[1]: Reached target integritysetup.target. Jul 2 01:00:10.664395 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 01:00:10.664406 systemd[1]: Reached target remote-fs.target. Jul 2 01:00:10.664422 systemd[1]: Reached target slices.target. Jul 2 01:00:10.664433 systemd[1]: Reached target swap.target. Jul 2 01:00:10.664443 systemd[1]: Reached target torcx.target. Jul 2 01:00:10.664454 systemd[1]: Reached target veritysetup.target. Jul 2 01:00:10.664464 systemd[1]: Listening on systemd-coredump.socket. Jul 2 01:00:10.664474 systemd[1]: Listening on systemd-initctl.socket. Jul 2 01:00:10.664485 systemd[1]: Listening on systemd-networkd.socket. Jul 2 01:00:10.664495 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 01:00:10.664505 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 01:00:10.664517 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 01:00:10.664527 systemd[1]: Mounting dev-hugepages.mount... Jul 2 01:00:10.664537 systemd[1]: Mounting dev-mqueue.mount... Jul 2 01:00:10.664549 systemd[1]: Mounting media.mount... Jul 2 01:00:10.664559 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 01:00:10.664570 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 01:00:10.664580 systemd[1]: Mounting tmp.mount... Jul 2 01:00:10.664590 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 01:00:10.664601 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 01:00:10.664613 systemd[1]: Starting kmod-static-nodes.service... Jul 2 01:00:10.664624 systemd[1]: Starting modprobe@configfs.service... Jul 2 01:00:10.664634 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 01:00:10.664644 systemd[1]: Starting modprobe@drm.service... Jul 2 01:00:10.664655 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 01:00:10.664665 systemd[1]: Starting modprobe@fuse.service... Jul 2 01:00:10.664675 systemd[1]: Starting modprobe@loop.service... Jul 2 01:00:10.664686 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 01:00:10.664697 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 01:00:10.664708 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 01:00:10.664719 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 01:00:10.664729 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 01:00:10.664740 systemd[1]: Stopped systemd-journald.service. Jul 2 01:00:10.664751 systemd[1]: Starting systemd-journald.service... Jul 2 01:00:10.664761 systemd[1]: Starting systemd-modules-load.service... Jul 2 01:00:10.664772 kernel: fuse: init (API version 7.34) Jul 2 01:00:10.664789 systemd[1]: Starting systemd-network-generator.service... Jul 2 01:00:10.664808 systemd[1]: Starting systemd-remount-fs.service... Jul 2 01:00:10.664821 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 01:00:10.664831 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 01:00:10.664841 kernel: loop: module loaded Jul 2 01:00:10.664851 systemd[1]: Stopped verity-setup.service. Jul 2 01:00:10.664862 systemd[1]: Mounted dev-hugepages.mount. Jul 2 01:00:10.664873 systemd[1]: Mounted dev-mqueue.mount. Jul 2 01:00:10.664884 systemd[1]: Mounted media.mount. Jul 2 01:00:10.664895 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 01:00:10.664906 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 01:00:10.664918 systemd[1]: Mounted tmp.mount. Jul 2 01:00:10.664929 systemd[1]: Finished kmod-static-nodes.service. Jul 2 01:00:10.664940 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 01:00:10.664951 systemd[1]: Finished modprobe@configfs.service. Jul 2 01:00:10.664961 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 01:00:10.664973 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 01:00:10.664983 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 01:00:10.664994 systemd[1]: Finished modprobe@drm.service. Jul 2 01:00:10.665004 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 01:00:10.665020 systemd-journald[993]: Journal started Jul 2 01:00:10.665065 systemd-journald[993]: Runtime Journal (/run/log/journal/15eb17a32cb346c2ae077fa0c81e047c) is 6.0M, max 48.7M, 42.6M free. Jul 2 01:00:08.800000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 01:00:08.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 01:00:08.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 01:00:08.834000 audit: BPF prog-id=10 op=LOAD Jul 2 01:00:08.834000 audit: BPF prog-id=10 op=UNLOAD Jul 2 01:00:08.834000 audit: BPF prog-id=11 op=LOAD Jul 2 01:00:08.834000 audit: BPF prog-id=11 op=UNLOAD Jul 2 01:00:08.863000 audit[931]: AVC avc: denied { associate } for pid=931 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 01:00:08.863000 audit[931]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001038f4 a1=4000028e40 a2=4000027100 a3=32 items=0 ppid=914 pid=931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:08.863000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 01:00:08.864000 audit[931]: AVC avc: denied { associate } for pid=931 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 2 01:00:08.864000 audit[931]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001039d9 a2=1ed a3=0 items=2 ppid=914 pid=931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:08.864000 audit: CWD cwd="/" Jul 2 01:00:08.864000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:00:08.864000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 01:00:08.864000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 01:00:10.521000 audit: BPF prog-id=12 op=LOAD Jul 2 01:00:10.521000 audit: BPF prog-id=3 op=UNLOAD Jul 2 01:00:10.522000 audit: BPF prog-id=13 op=LOAD Jul 2 01:00:10.523000 audit: BPF prog-id=14 op=LOAD Jul 2 01:00:10.523000 audit: BPF prog-id=4 op=UNLOAD Jul 2 01:00:10.523000 audit: BPF prog-id=5 op=UNLOAD Jul 2 01:00:10.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.541000 audit: BPF prog-id=12 op=UNLOAD Jul 2 01:00:10.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.628000 audit: BPF prog-id=15 op=LOAD Jul 2 01:00:10.628000 audit: BPF prog-id=16 op=LOAD Jul 2 01:00:10.628000 audit: BPF prog-id=17 op=LOAD Jul 2 01:00:10.628000 audit: BPF prog-id=13 op=UNLOAD Jul 2 01:00:10.628000 audit: BPF prog-id=14 op=UNLOAD Jul 2 01:00:10.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.656000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 01:00:10.656000 audit[993]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffd0021ab0 a2=4000 a3=1 items=0 ppid=1 pid=993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:10.656000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 01:00:10.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.862112 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-07-02T01:00:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 01:00:10.520766 systemd[1]: Queued start job for default target multi-user.target. Jul 2 01:00:10.666341 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 01:00:10.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:08.862371 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-07-02T01:00:08Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 01:00:10.520790 systemd[1]: Unnecessary job was removed for dev-vda6.device. Jul 2 01:00:08.862391 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-07-02T01:00:08Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 01:00:10.524903 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 01:00:08.862420 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-07-02T01:00:08Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 2 01:00:08.862430 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-07-02T01:00:08Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 2 01:00:08.862457 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-07-02T01:00:08Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 2 01:00:08.862469 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-07-02T01:00:08Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 2 01:00:08.862656 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-07-02T01:00:08Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 2 01:00:08.862691 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-07-02T01:00:08Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 01:00:08.862702 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-07-02T01:00:08Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 01:00:08.863468 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-07-02T01:00:08Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 2 01:00:08.863501 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-07-02T01:00:08Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 2 01:00:08.863519 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-07-02T01:00:08Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.5: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.5 Jul 2 01:00:08.863533 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-07-02T01:00:08Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 2 01:00:08.863550 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-07-02T01:00:08Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.5: no such file or directory" path=/var/lib/torcx/store/3510.3.5 Jul 2 01:00:08.863564 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-07-02T01:00:08Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 2 01:00:10.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.277260 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-07-02T01:00:10Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 01:00:10.277513 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-07-02T01:00:10Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 01:00:10.667819 systemd[1]: Started systemd-journald.service. Jul 2 01:00:10.277612 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-07-02T01:00:10Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 01:00:10.277777 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-07-02T01:00:10Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 01:00:10.277862 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-07-02T01:00:10Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 2 01:00:10.277917 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2024-07-02T01:00:10Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 2 01:00:10.668172 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 01:00:10.668336 systemd[1]: Finished modprobe@fuse.service. Jul 2 01:00:10.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.669247 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 01:00:10.669393 systemd[1]: Finished modprobe@loop.service. Jul 2 01:00:10.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.670318 systemd[1]: Finished systemd-modules-load.service. Jul 2 01:00:10.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.671388 systemd[1]: Finished systemd-network-generator.service. Jul 2 01:00:10.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.672376 systemd[1]: Finished systemd-remount-fs.service. Jul 2 01:00:10.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.673523 systemd[1]: Reached target network-pre.target. Jul 2 01:00:10.675284 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 01:00:10.676981 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 01:00:10.679668 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 01:00:10.681119 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 01:00:10.683739 systemd[1]: Starting systemd-journal-flush.service... Jul 2 01:00:10.684556 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 01:00:10.685656 systemd[1]: Starting systemd-random-seed.service... Jul 2 01:00:10.686393 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 01:00:10.687459 systemd[1]: Starting systemd-sysctl.service... Jul 2 01:00:10.690374 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 01:00:10.691304 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 01:00:10.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.699277 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 01:00:10.701099 systemd[1]: Starting systemd-udev-settle.service... Jul 2 01:00:10.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.705543 systemd-journald[993]: Time spent on flushing to /var/log/journal/15eb17a32cb346c2ae077fa0c81e047c is 12.570ms for 963 entries. Jul 2 01:00:10.705543 systemd-journald[993]: System Journal (/var/log/journal/15eb17a32cb346c2ae077fa0c81e047c) is 8.0M, max 195.6M, 187.6M free. Jul 2 01:00:10.730890 systemd-journald[993]: Received client request to flush runtime journal. Jul 2 01:00:10.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.702726 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 01:00:10.731979 udevadm[1030]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Jul 2 01:00:10.704615 systemd[1]: Starting systemd-sysusers.service... Jul 2 01:00:10.707612 systemd[1]: Finished systemd-sysctl.service. Jul 2 01:00:10.709737 systemd[1]: Finished systemd-random-seed.service. Jul 2 01:00:10.710535 systemd[1]: Reached target first-boot-complete.target. Jul 2 01:00:10.719551 systemd[1]: Finished systemd-sysusers.service. Jul 2 01:00:10.721570 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 01:00:10.731794 systemd[1]: Finished systemd-journal-flush.service. Jul 2 01:00:10.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:10.740016 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 01:00:10.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:11.053058 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 01:00:11.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:11.053000 audit: BPF prog-id=18 op=LOAD Jul 2 01:00:11.053000 audit: BPF prog-id=19 op=LOAD Jul 2 01:00:11.053000 audit: BPF prog-id=7 op=UNLOAD Jul 2 01:00:11.053000 audit: BPF prog-id=8 op=UNLOAD Jul 2 01:00:11.055171 systemd[1]: Starting systemd-udevd.service... Jul 2 01:00:11.073952 systemd-udevd[1036]: Using default interface naming scheme 'v252'. Jul 2 01:00:11.085139 systemd[1]: Started systemd-udevd.service. Jul 2 01:00:11.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:11.085000 audit: BPF prog-id=20 op=LOAD Jul 2 01:00:11.087259 systemd[1]: Starting systemd-networkd.service... Jul 2 01:00:11.091000 audit: BPF prog-id=21 op=LOAD Jul 2 01:00:11.092000 audit: BPF prog-id=22 op=LOAD Jul 2 01:00:11.092000 audit: BPF prog-id=23 op=LOAD Jul 2 01:00:11.093521 systemd[1]: Starting systemd-userdbd.service... Jul 2 01:00:11.120587 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Jul 2 01:00:11.124629 systemd[1]: Started systemd-userdbd.service. Jul 2 01:00:11.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:11.143985 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 01:00:11.182145 systemd[1]: Finished systemd-udev-settle.service. Jul 2 01:00:11.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:11.183989 systemd[1]: Starting lvm2-activation-early.service... Jul 2 01:00:11.184369 systemd-networkd[1043]: lo: Link UP Jul 2 01:00:11.184381 systemd-networkd[1043]: lo: Gained carrier Jul 2 01:00:11.184936 systemd-networkd[1043]: Enumeration completed Jul 2 01:00:11.185036 systemd[1]: Started systemd-networkd.service. Jul 2 01:00:11.185038 systemd-networkd[1043]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 01:00:11.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:11.187485 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 01:00:11.188908 systemd-networkd[1043]: eth0: Link UP Jul 2 01:00:11.188916 systemd-networkd[1043]: eth0: Gained carrier Jul 2 01:00:11.201323 lvm[1069]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 01:00:11.203934 systemd-networkd[1043]: eth0: DHCPv4 address 10.0.0.124/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 2 01:00:11.225688 systemd[1]: Finished lvm2-activation-early.service. Jul 2 01:00:11.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:11.226498 systemd[1]: Reached target cryptsetup.target. Jul 2 01:00:11.228142 systemd[1]: Starting lvm2-activation.service... Jul 2 01:00:11.231683 lvm[1071]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 01:00:11.258576 systemd[1]: Finished lvm2-activation.service. Jul 2 01:00:11.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:11.259335 systemd[1]: Reached target local-fs-pre.target. Jul 2 01:00:11.259978 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 01:00:11.260008 systemd[1]: Reached target local-fs.target. Jul 2 01:00:11.260562 systemd[1]: Reached target machines.target. Jul 2 01:00:11.262227 systemd[1]: Starting ldconfig.service... Jul 2 01:00:11.263226 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 01:00:11.263280 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:00:11.264512 systemd[1]: Starting systemd-boot-update.service... Jul 2 01:00:11.266502 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 01:00:11.268686 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 01:00:11.270239 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Jul 2 01:00:11.270278 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Jul 2 01:00:11.271291 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 01:00:11.273449 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1073 (bootctl) Jul 2 01:00:11.274931 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 01:00:11.281111 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 01:00:11.282048 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 01:00:11.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:11.283019 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 01:00:11.284353 systemd-tmpfiles[1076]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 01:00:11.289544 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 01:00:11.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:11.308345 systemd-fsck[1081]: fsck.fat 4.2 (2021-01-31) Jul 2 01:00:11.308345 systemd-fsck[1081]: /dev/vda1: 236 files, 117047/258078 clusters Jul 2 01:00:11.310506 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 01:00:11.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:11.392039 ldconfig[1072]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 01:00:11.395005 systemd[1]: Finished ldconfig.service. Jul 2 01:00:11.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:11.646436 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 01:00:11.647872 systemd[1]: Mounting boot.mount... Jul 2 01:00:11.654287 systemd[1]: Mounted boot.mount. Jul 2 01:00:11.661404 systemd[1]: Finished systemd-boot-update.service. Jul 2 01:00:11.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:11.713531 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 01:00:11.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:11.715592 systemd[1]: Starting audit-rules.service... Jul 2 01:00:11.717224 systemd[1]: Starting clean-ca-certificates.service... Jul 2 01:00:11.719050 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 01:00:11.719000 audit: BPF prog-id=24 op=LOAD Jul 2 01:00:11.721552 systemd[1]: Starting systemd-resolved.service... Jul 2 01:00:11.722000 audit: BPF prog-id=25 op=LOAD Jul 2 01:00:11.723565 systemd[1]: Starting systemd-timesyncd.service... Jul 2 01:00:11.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:11.725936 systemd[1]: Starting systemd-update-utmp.service... Jul 2 01:00:11.727028 systemd[1]: Finished clean-ca-certificates.service. Jul 2 01:00:11.728068 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 01:00:11.731000 audit[1096]: SYSTEM_BOOT pid=1096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 01:00:11.734566 systemd[1]: Finished systemd-update-utmp.service. Jul 2 01:00:11.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:11.742056 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 01:00:11.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:11.743914 systemd[1]: Starting systemd-update-done.service... Jul 2 01:00:11.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:11.750422 systemd[1]: Finished systemd-update-done.service. Jul 2 01:00:11.752737 augenrules[1106]: No rules Jul 2 01:00:11.751000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 01:00:11.751000 audit[1106]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffc4ff3c0 a2=420 a3=0 items=0 ppid=1085 pid=1106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:11.751000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 01:00:11.753750 systemd[1]: Finished audit-rules.service. Jul 2 01:00:11.771170 systemd[1]: Started systemd-timesyncd.service. Jul 2 01:00:11.771440 systemd-resolved[1089]: Positive Trust Anchors: Jul 2 01:00:11.771450 systemd-resolved[1089]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 01:00:11.771477 systemd-resolved[1089]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 01:00:11.771855 systemd-timesyncd[1090]: Contacted time server 10.0.0.1:123 (10.0.0.1). Jul 2 01:00:11.771899 systemd-timesyncd[1090]: Initial clock synchronization to Tue 2024-07-02 01:00:12.027899 UTC. Jul 2 01:00:11.772165 systemd[1]: Reached target time-set.target. Jul 2 01:00:11.781232 systemd-resolved[1089]: Defaulting to hostname 'linux'. Jul 2 01:00:11.782485 systemd[1]: Started systemd-resolved.service. Jul 2 01:00:11.783143 systemd[1]: Reached target network.target. Jul 2 01:00:11.783687 systemd[1]: Reached target nss-lookup.target. Jul 2 01:00:11.784311 systemd[1]: Reached target sysinit.target. Jul 2 01:00:11.784937 systemd[1]: Started motdgen.path. Jul 2 01:00:11.785455 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 01:00:11.786376 systemd[1]: Started logrotate.timer. Jul 2 01:00:11.787020 systemd[1]: Started mdadm.timer. Jul 2 01:00:11.787550 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 01:00:11.788174 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 01:00:11.788204 systemd[1]: Reached target paths.target. Jul 2 01:00:11.788727 systemd[1]: Reached target timers.target. Jul 2 01:00:11.789686 systemd[1]: Listening on dbus.socket. Jul 2 01:00:11.791186 systemd[1]: Starting docker.socket... Jul 2 01:00:11.793997 systemd[1]: Listening on sshd.socket. Jul 2 01:00:11.794729 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:00:11.795155 systemd[1]: Listening on docker.socket. Jul 2 01:00:11.795927 systemd[1]: Reached target sockets.target. Jul 2 01:00:11.796587 systemd[1]: Reached target basic.target. Jul 2 01:00:11.797294 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 01:00:11.797316 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 01:00:11.798416 systemd[1]: Starting containerd.service... Jul 2 01:00:11.800151 systemd[1]: Starting dbus.service... Jul 2 01:00:11.801562 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 01:00:11.803211 systemd[1]: Starting extend-filesystems.service... Jul 2 01:00:11.803896 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 01:00:11.805173 systemd[1]: Starting motdgen.service... Jul 2 01:00:11.806830 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 01:00:11.810167 systemd[1]: Starting sshd-keygen.service... Jul 2 01:00:11.812618 systemd[1]: Starting systemd-logind.service... Jul 2 01:00:11.815316 jq[1116]: false Jul 2 01:00:11.813250 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 01:00:11.813316 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 01:00:11.813725 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 01:00:11.814462 systemd[1]: Starting update-engine.service... Jul 2 01:00:11.817683 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 01:00:11.820138 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 01:00:11.821085 jq[1128]: true Jul 2 01:00:11.820299 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 01:00:11.820570 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 01:00:11.820710 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 01:00:11.829402 jq[1132]: true Jul 2 01:00:11.833193 extend-filesystems[1117]: Found vda Jul 2 01:00:11.833193 extend-filesystems[1117]: Found vda1 Jul 2 01:00:11.833193 extend-filesystems[1117]: Found vda2 Jul 2 01:00:11.833193 extend-filesystems[1117]: Found vda3 Jul 2 01:00:11.833193 extend-filesystems[1117]: Found usr Jul 2 01:00:11.833193 extend-filesystems[1117]: Found vda4 Jul 2 01:00:11.833193 extend-filesystems[1117]: Found vda6 Jul 2 01:00:11.833193 extend-filesystems[1117]: Found vda7 Jul 2 01:00:11.833193 extend-filesystems[1117]: Found vda9 Jul 2 01:00:11.833193 extend-filesystems[1117]: Checking size of /dev/vda9 Jul 2 01:00:11.850716 extend-filesystems[1117]: Old size kept for /dev/vda9 Jul 2 01:00:11.844540 systemd[1]: Started dbus.service. Jul 2 01:00:11.844423 dbus-daemon[1115]: [system] SELinux support is enabled Jul 2 01:00:11.847155 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 01:00:11.847315 systemd[1]: Finished extend-filesystems.service. Jul 2 01:00:11.848230 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 01:00:11.848364 systemd[1]: Finished motdgen.service. Jul 2 01:00:11.849100 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 01:00:11.849117 systemd[1]: Reached target system-config.target. Jul 2 01:00:11.849853 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 01:00:11.849875 systemd[1]: Reached target user-config.target. Jul 2 01:00:11.872101 systemd-logind[1125]: Watching system buttons on /dev/input/event0 (Power Button) Jul 2 01:00:11.872330 systemd-logind[1125]: New seat seat0. Jul 2 01:00:11.884830 systemd[1]: Started systemd-logind.service. Jul 2 01:00:11.892541 bash[1161]: Updated "/home/core/.ssh/authorized_keys" Jul 2 01:00:11.895500 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 01:00:11.918816 update_engine[1127]: I0702 01:00:11.918531 1127 main.cc:92] Flatcar Update Engine starting Jul 2 01:00:11.921022 systemd[1]: Started update-engine.service. Jul 2 01:00:11.921129 update_engine[1127]: I0702 01:00:11.921020 1127 update_check_scheduler.cc:74] Next update check in 11m3s Jul 2 01:00:11.923542 systemd[1]: Started locksmithd.service. Jul 2 01:00:11.933387 env[1138]: time="2024-07-02T01:00:11.933285320Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 2 01:00:11.951616 env[1138]: time="2024-07-02T01:00:11.951563120Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 01:00:11.951783 env[1138]: time="2024-07-02T01:00:11.951756160Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 01:00:11.953461 env[1138]: time="2024-07-02T01:00:11.953424040Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 01:00:11.953575 env[1138]: time="2024-07-02T01:00:11.953558400Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 01:00:11.953829 env[1138]: time="2024-07-02T01:00:11.953787120Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 01:00:11.953861 env[1138]: time="2024-07-02T01:00:11.953843560Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 01:00:11.953910 env[1138]: time="2024-07-02T01:00:11.953859080Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 01:00:11.953910 env[1138]: time="2024-07-02T01:00:11.953869960Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 01:00:11.954019 env[1138]: time="2024-07-02T01:00:11.953999760Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 01:00:11.954493 env[1138]: time="2024-07-02T01:00:11.954470320Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 01:00:11.954624 env[1138]: time="2024-07-02T01:00:11.954602400Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 01:00:11.954624 env[1138]: time="2024-07-02T01:00:11.954621800Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 01:00:11.954698 env[1138]: time="2024-07-02T01:00:11.954680240Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 01:00:11.954698 env[1138]: time="2024-07-02T01:00:11.954696040Z" level=info msg="metadata content store policy set" policy=shared Jul 2 01:00:11.969701 locksmithd[1164]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 01:00:12.001104 env[1138]: time="2024-07-02T01:00:12.001053094Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 01:00:12.001192 env[1138]: time="2024-07-02T01:00:12.001114148Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 01:00:12.001192 env[1138]: time="2024-07-02T01:00:12.001138173Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 01:00:12.001235 env[1138]: time="2024-07-02T01:00:12.001193366Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 01:00:12.001235 env[1138]: time="2024-07-02T01:00:12.001217391Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 01:00:12.001235 env[1138]: time="2024-07-02T01:00:12.001233078Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 01:00:12.001314 env[1138]: time="2024-07-02T01:00:12.001249796Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 01:00:12.001629 env[1138]: time="2024-07-02T01:00:12.001605306Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 01:00:12.001657 env[1138]: time="2024-07-02T01:00:12.001629703Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 01:00:12.001657 env[1138]: time="2024-07-02T01:00:12.001648981Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 01:00:12.001697 env[1138]: time="2024-07-02T01:00:12.001661943Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 01:00:12.001697 env[1138]: time="2024-07-02T01:00:12.001676309Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 01:00:12.001884 env[1138]: time="2024-07-02T01:00:12.001862072Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 01:00:12.001972 env[1138]: time="2024-07-02T01:00:12.001955366Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 01:00:12.002203 env[1138]: time="2024-07-02T01:00:12.002185341Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 01:00:12.002232 env[1138]: time="2024-07-02T01:00:12.002216384Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 01:00:12.002258 env[1138]: time="2024-07-02T01:00:12.002232442Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 01:00:12.002361 env[1138]: time="2024-07-02T01:00:12.002346625Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 01:00:12.002391 env[1138]: time="2024-07-02T01:00:12.002362765Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 01:00:12.002391 env[1138]: time="2024-07-02T01:00:12.002376264Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 01:00:12.002391 env[1138]: time="2024-07-02T01:00:12.002387740Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 01:00:12.002461 env[1138]: time="2024-07-02T01:00:12.002400579Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 01:00:12.002461 env[1138]: time="2024-07-02T01:00:12.002413252Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 01:00:12.002461 env[1138]: time="2024-07-02T01:00:12.002424480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 01:00:12.002461 env[1138]: time="2024-07-02T01:00:12.002437360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 01:00:12.002461 env[1138]: time="2024-07-02T01:00:12.002450693Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 01:00:12.002602 env[1138]: time="2024-07-02T01:00:12.002584897Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 01:00:12.002625 env[1138]: time="2024-07-02T01:00:12.002604753Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 01:00:12.002625 env[1138]: time="2024-07-02T01:00:12.002617839Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 01:00:12.002663 env[1138]: time="2024-07-02T01:00:12.002629563Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 01:00:12.002663 env[1138]: time="2024-07-02T01:00:12.002645827Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 01:00:12.002663 env[1138]: time="2024-07-02T01:00:12.002657138Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 01:00:12.002721 env[1138]: time="2024-07-02T01:00:12.002675178Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 01:00:12.002721 env[1138]: time="2024-07-02T01:00:12.002710432Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 01:00:12.002981 env[1138]: time="2024-07-02T01:00:12.002924802Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 01:00:12.005584 env[1138]: time="2024-07-02T01:00:12.002989035Z" level=info msg="Connect containerd service" Jul 2 01:00:12.005584 env[1138]: time="2024-07-02T01:00:12.003021729Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 01:00:12.005584 env[1138]: time="2024-07-02T01:00:12.003684491Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 01:00:12.005584 env[1138]: time="2024-07-02T01:00:12.003967305Z" level=info msg="Start subscribing containerd event" Jul 2 01:00:12.005584 env[1138]: time="2024-07-02T01:00:12.004025965Z" level=info msg="Start recovering state" Jul 2 01:00:12.005584 env[1138]: time="2024-07-02T01:00:12.004092675Z" level=info msg="Start event monitor" Jul 2 01:00:12.005584 env[1138]: time="2024-07-02T01:00:12.004165783Z" level=info msg="Start snapshots syncer" Jul 2 01:00:12.005584 env[1138]: time="2024-07-02T01:00:12.004177548Z" level=info msg="Start cni network conf syncer for default" Jul 2 01:00:12.005584 env[1138]: time="2024-07-02T01:00:12.004185350Z" level=info msg="Start streaming server" Jul 2 01:00:12.005584 env[1138]: time="2024-07-02T01:00:12.004257632Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 01:00:12.005584 env[1138]: time="2024-07-02T01:00:12.004302711Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 01:00:12.005584 env[1138]: time="2024-07-02T01:00:12.004351629Z" level=info msg="containerd successfully booted in 0.073048s" Jul 2 01:00:12.004443 systemd[1]: Started containerd.service. Jul 2 01:00:13.152393 systemd-networkd[1043]: eth0: Gained IPv6LL Jul 2 01:00:13.154136 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 01:00:13.155146 systemd[1]: Reached target network-online.target. Jul 2 01:00:13.157105 systemd[1]: Starting coreos-metadata.service... Jul 2 01:00:13.163423 systemd[1]: coreos-metadata.service: Deactivated successfully. Jul 2 01:00:13.163564 systemd[1]: Finished coreos-metadata.service. Jul 2 01:00:13.165527 systemd[1]: Starting etcd-member.service... Jul 2 01:00:13.222110 systemd[1]: Starting docker.service... Jul 2 01:00:13.317763 env[1186]: time="2024-07-02T01:00:13.317710121Z" level=info msg="Starting up" Jul 2 01:00:13.319692 env[1186]: time="2024-07-02T01:00:13.319666516Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 01:00:13.319692 env[1186]: time="2024-07-02T01:00:13.319689174Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 01:00:13.319811 env[1186]: time="2024-07-02T01:00:13.319717424Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 01:00:13.319811 env[1186]: time="2024-07-02T01:00:13.319727786Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 01:00:13.322036 env[1186]: time="2024-07-02T01:00:13.322011173Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 01:00:13.322036 env[1186]: time="2024-07-02T01:00:13.322034529Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 01:00:13.322114 env[1186]: time="2024-07-02T01:00:13.322047976Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 01:00:13.322114 env[1186]: time="2024-07-02T01:00:13.322059489Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 01:00:13.344070 env[1186]: time="2024-07-02T01:00:13.344035088Z" level=info msg="Loading containers: start." Jul 2 01:00:13.391075 sshd_keygen[1131]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 01:00:13.409202 systemd[1]: Finished sshd-keygen.service. Jul 2 01:00:13.411299 systemd[1]: Starting issuegen.service... Jul 2 01:00:13.415961 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 01:00:13.416106 systemd[1]: Finished issuegen.service. Jul 2 01:00:13.418128 systemd[1]: Starting systemd-user-sessions.service... Jul 2 01:00:13.426190 systemd[1]: Finished systemd-user-sessions.service. Jul 2 01:00:13.428130 systemd[1]: Started getty@tty1.service. Jul 2 01:00:13.430111 systemd[1]: Started serial-getty@ttyAMA0.service. Jul 2 01:00:13.431122 systemd[1]: Reached target getty.target. Jul 2 01:00:13.452843 kernel: Initializing XFRM netlink socket Jul 2 01:00:13.483900 env[1186]: time="2024-07-02T01:00:13.483806123Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 2 01:00:13.544818 systemd-networkd[1043]: docker0: Link UP Jul 2 01:00:13.552342 env[1186]: time="2024-07-02T01:00:13.552304067Z" level=info msg="Loading containers: done." Jul 2 01:00:13.571375 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3875828447-merged.mount: Deactivated successfully. Jul 2 01:00:13.575778 env[1186]: time="2024-07-02T01:00:13.575736569Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 2 01:00:13.575944 env[1186]: time="2024-07-02T01:00:13.575933207Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Jul 2 01:00:13.576053 env[1186]: time="2024-07-02T01:00:13.576024002Z" level=info msg="Daemon has completed initialization" Jul 2 01:00:13.589007 systemd[1]: Started docker.service. Jul 2 01:00:13.596426 env[1186]: time="2024-07-02T01:00:13.596383519Z" level=info msg="API listen on /run/docker.sock" Jul 2 01:00:13.597788 etcd-wrapper[1179]: Error response from daemon: No such container: etcd-member Jul 2 01:00:13.615697 etcd-wrapper[1310]: Error: No such container: etcd-member Jul 2 01:00:13.655143 etcd-wrapper[1329]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Jul 2 01:00:14.504171 etcd-wrapper[1329]: v3.5.0: Pulling from coreos/etcd Jul 2 01:00:14.679932 etcd-wrapper[1329]: 6022c6b01d76: Pulling fs layer Jul 2 01:00:14.679932 etcd-wrapper[1329]: 1d97b1ec77fc: Pulling fs layer Jul 2 01:00:14.679932 etcd-wrapper[1329]: 99ef4b690837: Pulling fs layer Jul 2 01:00:14.679932 etcd-wrapper[1329]: 435b7bf0967c: Pulling fs layer Jul 2 01:00:14.679932 etcd-wrapper[1329]: 17e4a5f7c1b5: Pulling fs layer Jul 2 01:00:14.679932 etcd-wrapper[1329]: 5b0292999756: Pulling fs layer Jul 2 01:00:14.679932 etcd-wrapper[1329]: 435b7bf0967c: Waiting Jul 2 01:00:14.680406 etcd-wrapper[1329]: 17e4a5f7c1b5: Waiting Jul 2 01:00:14.680406 etcd-wrapper[1329]: 5b0292999756: Waiting Jul 2 01:00:14.913346 etcd-wrapper[1329]: 99ef4b690837: Verifying Checksum Jul 2 01:00:14.913346 etcd-wrapper[1329]: 99ef4b690837: Download complete Jul 2 01:00:14.967753 etcd-wrapper[1329]: 1d97b1ec77fc: Verifying Checksum Jul 2 01:00:14.967753 etcd-wrapper[1329]: 1d97b1ec77fc: Download complete Jul 2 01:00:15.025384 etcd-wrapper[1329]: 6022c6b01d76: Download complete Jul 2 01:00:15.130172 etcd-wrapper[1329]: 435b7bf0967c: Verifying Checksum Jul 2 01:00:15.130172 etcd-wrapper[1329]: 435b7bf0967c: Download complete Jul 2 01:00:15.156525 etcd-wrapper[1329]: 17e4a5f7c1b5: Verifying Checksum Jul 2 01:00:15.156525 etcd-wrapper[1329]: 17e4a5f7c1b5: Download complete Jul 2 01:00:15.210077 etcd-wrapper[1329]: 5b0292999756: Verifying Checksum Jul 2 01:00:15.210077 etcd-wrapper[1329]: 5b0292999756: Download complete Jul 2 01:00:15.822742 etcd-wrapper[1329]: 6022c6b01d76: Pull complete Jul 2 01:00:16.066446 systemd[1]: var-lib-docker-overlay2-6beeb69e56fd2c1de081f47eb590e94c69968b87b3b82e1c2aa4deb7829b3a99-merged.mount: Deactivated successfully. Jul 2 01:00:16.199437 etcd-wrapper[1329]: 1d97b1ec77fc: Pull complete Jul 2 01:00:16.397893 systemd[1]: var-lib-docker-overlay2-752743c788d0550f7035e05dc206e88311ceeb6ed4bb51bbcc9f8606b9f110fd-merged.mount: Deactivated successfully. Jul 2 01:00:16.426462 etcd-wrapper[1329]: 99ef4b690837: Pull complete Jul 2 01:00:16.633312 etcd-wrapper[1329]: 435b7bf0967c: Pull complete Jul 2 01:00:16.680521 etcd-wrapper[1329]: 17e4a5f7c1b5: Pull complete Jul 2 01:00:16.727190 etcd-wrapper[1329]: 5b0292999756: Pull complete Jul 2 01:00:16.733185 etcd-wrapper[1329]: Digest: sha256:28759af54acd6924b2191dc1a1d096e2fa2e219717a21b9d8edf89717db3631b Jul 2 01:00:16.735600 etcd-wrapper[1329]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.0 Jul 2 01:00:16.816124 env[1138]: time="2024-07-02T01:00:16.816058516Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:00:16.816487 env[1138]: time="2024-07-02T01:00:16.816134231Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:00:16.816487 env[1138]: time="2024-07-02T01:00:16.816160393Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:00:16.816487 env[1138]: time="2024-07-02T01:00:16.816423357Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/53a2a8f7854e8766c7549216a7773f2cd00fb8caef520b74c97ce418fad7a9e5 pid=1418 runtime=io.containerd.runc.v2 Jul 2 01:00:16.826214 systemd[1]: Started docker-53a2a8f7854e8766c7549216a7773f2cd00fb8caef520b74c97ce418fad7a9e5.scope. Jul 2 01:00:16.828903 systemd[1]: var-lib-docker-overlay2-15284352fa28b74a4ce7e56fab215f15e5edd1969649c3f2cb75bac13b895a9a-merged.mount: Deactivated successfully. Jul 2 01:00:16.881268 systemd-resolved[1089]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 2 01:00:16.922668 etcd-wrapper[1329]: {"level":"info","ts":1719882016.9223537,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Jul 2 01:00:16.922668 etcd-wrapper[1329]: {"level":"info","ts":1719882016.9224224,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"15eb17a32cb346c2ae077fa0c81e047c"} Jul 2 01:00:16.923028 etcd-wrapper[1329]: {"level":"warn","ts":1719882016.9226665,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Jul 2 01:00:16.923028 etcd-wrapper[1329]: {"level":"warn","ts":1719882016.9226902,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Jul 2 01:00:16.923028 etcd-wrapper[1329]: {"level":"warn","ts":1719882016.9226959,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Jul 2 01:00:16.923028 etcd-wrapper[1329]: {"level":"warn","ts":1719882016.9227006,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Jul 2 01:00:16.923028 etcd-wrapper[1329]: {"level":"warn","ts":1719882016.922706,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_UNSUPPORTED_ARCH=arm64"} Jul 2 01:00:16.923156 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:16.922Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-peer-urls=http://0.0.0.0:2380","--listen-client-urls=http://0.0.0.0:4001,http://0.0.0.0:2379","--initial-advertise-peer-urls=http://10.0.0.124:2380","--advertise-client-urls=http://10.0.0.124:2379","--discovery=http://10.0.0.1:43417/v2/keys/discovery/482590452077883092","--enable-v2=true"]} Jul 2 01:00:16.923353 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:16.923Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://0.0.0.0:2380"]} Jul 2 01:00:16.923694 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:16.923Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379","http://0.0.0.0:4001"]} Jul 2 01:00:16.924012 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:16.923Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"arm64","max-cpu-set":4,"max-cpu-available":4,"member-initialized":false,"name":"15eb17a32cb346c2ae077fa0c81e047c","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://10.0.0.124:2380"],"listen-peer-urls":["http://0.0.0.0:2380"],"advertise-client-urls":["http://10.0.0.124:2379"],"listen-client-urls":["http://0.0.0.0:2379","http://0.0.0.0:4001"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"15eb17a32cb346c2ae077fa0c81e047c=http://10.0.0.124:2380","initial-cluster-state":"new","initial-cluster-token":"http://10.0.0.1:43417/v2/keys/discovery/482590452077883092","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"http://10.0.0.1:43417/v2/keys/discovery/482590452077883092","discovery-proxy":"","downgrade-check-interval":"5s"} Jul 2 01:00:16.925859 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:16.925Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"1.352679ms"} Jul 2 01:00:16.928421 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:16.928Z","caller":"v2discovery/discovery.go:336","msg":"found self from discovery server","discovery-url":"http://10.0.0.1:43417","self":"291afac5a88924cd"} Jul 2 01:00:16.928421 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:16.928Z","caller":"v2discovery/discovery.go:378","msg":"found all needed peers from discovery server","discovery-url":"http://10.0.0.1:43417","found-peers":1} Jul 2 01:00:16.930980 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:16.930Z","caller":"etcdserver/raft.go:448","msg":"starting local member","local-member-id":"291afac5a88924cd","cluster-id":"4d90b2bbbb4f6200"} Jul 2 01:00:16.931122 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:16.930Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"291afac5a88924cd switched to configuration voters=()"} Jul 2 01:00:16.931122 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:16.930Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"291afac5a88924cd became follower at term 0"} Jul 2 01:00:16.931122 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:16.930Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 291afac5a88924cd [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Jul 2 01:00:16.931122 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:16.930Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"291afac5a88924cd became follower at term 1"} Jul 2 01:00:16.931122 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:16.931Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"291afac5a88924cd switched to configuration voters=(2961955431792583885)"} Jul 2 01:00:16.932669 etcd-wrapper[1329]: {"level":"warn","ts":"2024-07-02T01:00:16.932Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Jul 2 01:00:16.933722 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:16.933Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Jul 2 01:00:16.934343 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:16.934Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Jul 2 01:00:16.934965 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:16.934Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"291afac5a88924cd","local-server-version":"3.5.0","cluster-version":"to_be_decided"} Jul 2 01:00:16.935879 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:16.935Z","caller":"etcdserver/server.go:728","msg":"started as single-node; fast-forwarding election ticks","local-member-id":"291afac5a88924cd","forward-ticks":9,"forward-duration":"900ms","election-ticks":10,"election-timeout":"1s"} Jul 2 01:00:16.936393 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:16.936Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"291afac5a88924cd switched to configuration voters=(2961955431792583885)"} Jul 2 01:00:16.936393 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:16.936Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"4d90b2bbbb4f6200","local-member-id":"291afac5a88924cd","added-peer-id":"291afac5a88924cd","added-peer-peer-urls":["http://10.0.0.124:2380"]} Jul 2 01:00:16.937366 etcd-wrapper[1329]: {"level":"warn","ts":"2024-07-02T01:00:16.937Z","caller":"embed/etcd.go:700","msg":"Flag `enable-v2` is deprecated and will get removed in etcd 3.6."} Jul 2 01:00:16.937434 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:16.937Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"291afac5a88924cd","initial-advertise-peer-urls":["http://10.0.0.124:2380"],"listen-peer-urls":["http://0.0.0.0:2380"],"advertise-client-urls":["http://10.0.0.124:2379"],"listen-client-urls":["http://0.0.0.0:2379","http://0.0.0.0:4001"],"listen-metrics-urls":[]} Jul 2 01:00:16.937434 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:16.937Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"[::]:2380"} Jul 2 01:00:16.937579 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:16.937Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"[::]:2380"} Jul 2 01:00:17.632111 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:17.631Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"291afac5a88924cd is starting a new election at term 1"} Jul 2 01:00:17.632111 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:17.631Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"291afac5a88924cd became pre-candidate at term 1"} Jul 2 01:00:17.632111 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:17.631Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"291afac5a88924cd received MsgPreVoteResp from 291afac5a88924cd at term 1"} Jul 2 01:00:17.632111 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:17.631Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"291afac5a88924cd became candidate at term 2"} Jul 2 01:00:17.632111 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:17.631Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"291afac5a88924cd received MsgVoteResp from 291afac5a88924cd at term 2"} Jul 2 01:00:17.632111 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:17.631Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"291afac5a88924cd became leader at term 2"} Jul 2 01:00:17.632111 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:17.631Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 291afac5a88924cd elected leader 291afac5a88924cd at term 2"} Jul 2 01:00:17.632556 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:17.632Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"291afac5a88924cd","local-member-attributes":"{Name:15eb17a32cb346c2ae077fa0c81e047c ClientURLs:[http://10.0.0.124:2379]}","request-path":"/0/members/291afac5a88924cd/attributes","cluster-id":"4d90b2bbbb4f6200","publish-timeout":"7s"} Jul 2 01:00:17.632556 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:17.632Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Jul 2 01:00:17.632556 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:17.632Z","caller":"etcdserver/server.go:2476","msg":"setting up initial cluster version using v2 API","cluster-version":"3.5"} Jul 2 01:00:17.632556 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:17.632Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Jul 2 01:00:17.632874 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:17.632Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Jul 2 01:00:17.632874 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:17.632Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Jul 2 01:00:17.632921 systemd[1]: Started etcd-member.service. Jul 2 01:00:17.634063 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:17.633Z","caller":"membership/cluster.go:531","msg":"set initial cluster version","cluster-id":"4d90b2bbbb4f6200","local-member-id":"291afac5a88924cd","cluster-version":"3.5"} Jul 2 01:00:17.634063 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:17.633Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:4001"} Jul 2 01:00:17.634063 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:17.633Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} Jul 2 01:00:17.634063 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:17.633Z","caller":"etcdserver/server.go:2500","msg":"cluster version is updated","cluster-version":"3.5"} Jul 2 01:00:17.633903 systemd[1]: Reached target multi-user.target. Jul 2 01:00:17.634652 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:17.634Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Jul 2 01:00:17.635920 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 01:00:17.642642 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 01:00:17.642877 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 01:00:17.643702 systemd[1]: Startup finished in 577ms (kernel) + 3.198s (initrd) + 8.876s (userspace) = 12.651s. Jul 2 01:00:18.588066 systemd[1]: Created slice system-sshd.slice. Jul 2 01:00:18.589197 systemd[1]: Started sshd@0-10.0.0.124:22-10.0.0.1:56608.service. Jul 2 01:00:18.632411 sshd[1463]: Accepted publickey for core from 10.0.0.1 port 56608 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 01:00:18.634658 sshd[1463]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:00:18.643536 systemd[1]: Created slice user-500.slice. Jul 2 01:00:18.644566 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 01:00:18.647549 systemd-logind[1125]: New session 1 of user core. Jul 2 01:00:18.652715 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 01:00:18.654139 systemd[1]: Starting user@500.service... Jul 2 01:00:18.656860 (systemd)[1466]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:00:18.718526 systemd[1466]: Queued start job for default target default.target. Jul 2 01:00:18.719003 systemd[1466]: Reached target paths.target. Jul 2 01:00:18.719023 systemd[1466]: Reached target sockets.target. Jul 2 01:00:18.719035 systemd[1466]: Reached target timers.target. Jul 2 01:00:18.719045 systemd[1466]: Reached target basic.target. Jul 2 01:00:18.719082 systemd[1466]: Reached target default.target. Jul 2 01:00:18.719105 systemd[1466]: Startup finished in 56ms. Jul 2 01:00:18.719316 systemd[1]: Started user@500.service. Jul 2 01:00:18.720624 systemd[1]: Started session-1.scope. Jul 2 01:00:18.773640 systemd[1]: Started sshd@1-10.0.0.124:22-10.0.0.1:56616.service. Jul 2 01:00:18.818379 sshd[1475]: Accepted publickey for core from 10.0.0.1 port 56616 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 01:00:18.819898 sshd[1475]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:00:18.823549 systemd-logind[1125]: New session 2 of user core. Jul 2 01:00:18.824373 systemd[1]: Started session-2.scope. Jul 2 01:00:18.882871 sshd[1475]: pam_unix(sshd:session): session closed for user core Jul 2 01:00:18.885979 systemd[1]: sshd@1-10.0.0.124:22-10.0.0.1:56616.service: Deactivated successfully. Jul 2 01:00:18.886594 systemd[1]: session-2.scope: Deactivated successfully. Jul 2 01:00:18.887090 systemd-logind[1125]: Session 2 logged out. Waiting for processes to exit. Jul 2 01:00:18.888102 systemd[1]: Started sshd@2-10.0.0.124:22-10.0.0.1:56624.service. Jul 2 01:00:18.888726 systemd-logind[1125]: Removed session 2. Jul 2 01:00:18.923969 sshd[1481]: Accepted publickey for core from 10.0.0.1 port 56624 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 01:00:18.925545 sshd[1481]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:00:18.929005 systemd-logind[1125]: New session 3 of user core. Jul 2 01:00:18.929786 systemd[1]: Started session-3.scope. Jul 2 01:00:18.980512 sshd[1481]: pam_unix(sshd:session): session closed for user core Jul 2 01:00:18.984706 systemd[1]: Started sshd@3-10.0.0.124:22-10.0.0.1:56636.service. Jul 2 01:00:18.985342 systemd[1]: sshd@2-10.0.0.124:22-10.0.0.1:56624.service: Deactivated successfully. Jul 2 01:00:18.986489 systemd[1]: session-3.scope: Deactivated successfully. Jul 2 01:00:18.987880 systemd-logind[1125]: Session 3 logged out. Waiting for processes to exit. Jul 2 01:00:18.990483 systemd-logind[1125]: Removed session 3. Jul 2 01:00:19.021368 sshd[1486]: Accepted publickey for core from 10.0.0.1 port 56636 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 01:00:19.022756 sshd[1486]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:00:19.026803 systemd-logind[1125]: New session 4 of user core. Jul 2 01:00:19.027947 systemd[1]: Started session-4.scope. Jul 2 01:00:19.083840 sshd[1486]: pam_unix(sshd:session): session closed for user core Jul 2 01:00:19.087934 systemd[1]: sshd@3-10.0.0.124:22-10.0.0.1:56636.service: Deactivated successfully. Jul 2 01:00:19.088610 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 01:00:19.089441 systemd-logind[1125]: Session 4 logged out. Waiting for processes to exit. Jul 2 01:00:19.090367 systemd[1]: Started sshd@4-10.0.0.124:22-10.0.0.1:56642.service. Jul 2 01:00:19.091179 systemd-logind[1125]: Removed session 4. Jul 2 01:00:19.128443 sshd[1493]: Accepted publickey for core from 10.0.0.1 port 56642 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 01:00:19.129676 sshd[1493]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:00:19.133776 systemd-logind[1125]: New session 5 of user core. Jul 2 01:00:19.134440 systemd[1]: Started session-5.scope. Jul 2 01:00:19.215768 sudo[1496]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 01:00:19.215999 sudo[1496]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:00:19.229065 dbus-daemon[1115]: avc: received setenforce notice (enforcing=1) Jul 2 01:00:19.229936 sudo[1496]: pam_unix(sudo:session): session closed for user root Jul 2 01:00:19.232210 sshd[1493]: pam_unix(sshd:session): session closed for user core Jul 2 01:00:19.234857 systemd[1]: sshd@4-10.0.0.124:22-10.0.0.1:56642.service: Deactivated successfully. Jul 2 01:00:19.235536 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 01:00:19.236082 systemd-logind[1125]: Session 5 logged out. Waiting for processes to exit. Jul 2 01:00:19.237172 systemd[1]: Started sshd@5-10.0.0.124:22-10.0.0.1:56654.service. Jul 2 01:00:19.237774 systemd-logind[1125]: Removed session 5. Jul 2 01:00:19.275756 sshd[1500]: Accepted publickey for core from 10.0.0.1 port 56654 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 01:00:19.277310 sshd[1500]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:00:19.281304 systemd[1]: Started session-6.scope. Jul 2 01:00:19.281404 systemd-logind[1125]: New session 6 of user core. Jul 2 01:00:19.337423 sudo[1504]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 01:00:19.337626 sudo[1504]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:00:19.343295 sudo[1504]: pam_unix(sudo:session): session closed for user root Jul 2 01:00:19.347550 sudo[1503]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 01:00:19.347752 sudo[1503]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:00:19.356998 systemd[1]: Stopping audit-rules.service... Jul 2 01:00:19.357880 auditctl[1507]: No rules Jul 2 01:00:19.356000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 01:00:19.359099 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 01:00:19.359287 systemd[1]: Stopped audit-rules.service. Jul 2 01:00:19.360456 kernel: kauditd_printk_skb: 70 callbacks suppressed Jul 2 01:00:19.360506 kernel: audit: type=1305 audit(1719882019.356:158): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 01:00:19.360524 kernel: audit: type=1300 audit(1719882019.356:158): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe0552130 a2=420 a3=0 items=0 ppid=1 pid=1507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:19.356000 audit[1507]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe0552130 a2=420 a3=0 items=0 ppid=1 pid=1507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:19.360679 systemd[1]: Starting audit-rules.service... Jul 2 01:00:19.356000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 01:00:19.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.366181 kernel: audit: type=1327 audit(1719882019.356:158): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 01:00:19.366235 kernel: audit: type=1131 audit(1719882019.358:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.379374 augenrules[1524]: No rules Jul 2 01:00:19.380046 systemd[1]: Finished audit-rules.service. Jul 2 01:00:19.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.381531 sudo[1503]: pam_unix(sudo:session): session closed for user root Jul 2 01:00:19.380000 audit[1503]: USER_END pid=1503 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.384423 kernel: audit: type=1130 audit(1719882019.379:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.384480 kernel: audit: type=1106 audit(1719882019.380:161): pid=1503 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.380000 audit[1503]: CRED_DISP pid=1503 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.385427 sshd[1500]: pam_unix(sshd:session): session closed for user core Jul 2 01:00:19.387146 kernel: audit: type=1104 audit(1719882019.380:162): pid=1503 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.387000 audit[1500]: USER_END pid=1500 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:19.388408 systemd[1]: Started sshd@6-10.0.0.124:22-10.0.0.1:56660.service. Jul 2 01:00:19.387000 audit[1500]: CRED_DISP pid=1500 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:19.389432 systemd[1]: sshd@5-10.0.0.124:22-10.0.0.1:56654.service: Deactivated successfully. Jul 2 01:00:19.390205 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 01:00:19.390713 systemd-logind[1125]: Session 6 logged out. Waiting for processes to exit. Jul 2 01:00:19.391579 systemd-logind[1125]: Removed session 6. Jul 2 01:00:19.392740 kernel: audit: type=1106 audit(1719882019.387:163): pid=1500 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:19.392802 kernel: audit: type=1104 audit(1719882019.387:164): pid=1500 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:19.392832 kernel: audit: type=1130 audit(1719882019.387:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.124:22-10.0.0.1:56660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.124:22-10.0.0.1:56660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.124:22-10.0.0.1:56654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.423000 audit[1529]: USER_ACCT pid=1529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:19.424205 sshd[1529]: Accepted publickey for core from 10.0.0.1 port 56660 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 01:00:19.424000 audit[1529]: CRED_ACQ pid=1529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:19.424000 audit[1529]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffee0bdb0 a2=3 a3=1 items=0 ppid=1 pid=1529 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:19.424000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:00:19.425205 sshd[1529]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:00:19.428354 systemd-logind[1125]: New session 7 of user core. Jul 2 01:00:19.429245 systemd[1]: Started session-7.scope. Jul 2 01:00:19.432000 audit[1529]: USER_START pid=1529 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:19.433000 audit[1532]: CRED_ACQ pid=1532 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:19.534536 sshd[1529]: pam_unix(sshd:session): session closed for user core Jul 2 01:00:19.534000 audit[1529]: USER_END pid=1529 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:19.534000 audit[1529]: CRED_DISP pid=1529 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:19.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.124:22-10.0.0.1:56660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.537229 systemd[1]: sshd@6-10.0.0.124:22-10.0.0.1:56660.service: Deactivated successfully. Jul 2 01:00:19.537795 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 01:00:19.538353 systemd-logind[1125]: Session 7 logged out. Waiting for processes to exit. Jul 2 01:00:19.539397 systemd[1]: Started sshd@7-10.0.0.124:22-10.0.0.1:56668.service. Jul 2 01:00:19.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.124:22-10.0.0.1:56668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.540101 systemd-logind[1125]: Removed session 7. Jul 2 01:00:19.573000 audit[1543]: USER_ACCT pid=1543 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:19.574951 sshd[1543]: Accepted publickey for core from 10.0.0.1 port 56668 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 01:00:19.574000 audit[1543]: CRED_ACQ pid=1543 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:19.574000 audit[1543]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd22c12a0 a2=3 a3=1 items=0 ppid=1 pid=1543 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:19.574000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 01:00:19.575928 sshd[1543]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 01:00:19.579082 systemd-logind[1125]: New session 8 of user core. Jul 2 01:00:19.579849 systemd[1]: Started session-8.scope. Jul 2 01:00:19.583000 audit[1543]: USER_START pid=1543 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:19.584000 audit[1545]: CRED_ACQ pid=1545 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:19.662000 audit[1563]: USER_ACCT pid=1563 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.663631 sudo[1563]: core : PWD=/home/core ; USER=root ; ENV=ETCDCTL_API=2 ; COMMAND=/usr/bin/etcdctl backup --data-dir=/var/lib/etcd --backup-dir /tmp/tmp.rXXDxycyMh Jul 2 01:00:19.663849 sudo[1563]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:00:19.662000 audit[1563]: CRED_REFR pid=1563 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.664000 audit[1563]: USER_START pid=1563 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.698054 sudo[1563]: pam_unix(sudo:session): session closed for user root Jul 2 01:00:19.697000 audit[1563]: USER_END pid=1563 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.697000 audit[1563]: CRED_DISP pid=1563 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.725000 audit[1587]: USER_ACCT pid=1587 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.727133 sudo[1587]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl stop etcd-member Jul 2 01:00:19.727340 sudo[1587]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:00:19.725000 audit[1587]: CRED_REFR pid=1587 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.727000 audit[1587]: USER_START pid=1587 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.735172 systemd[1]: Stopping etcd-member.service... Jul 2 01:00:19.761530 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:19.761Z","caller":"osutil/interrupt_unix.go:64","msg":"received signal; shutting down","signal":"terminated"} Jul 2 01:00:19.761530 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:19.761Z","caller":"embed/etcd.go:367","msg":"closing etcd server","name":"15eb17a32cb346c2ae077fa0c81e047c","data-dir":"/var/lib/etcd","advertise-peer-urls":["http://10.0.0.124:2380"],"advertise-client-urls":["http://10.0.0.124:2379"]} Jul 2 01:00:19.761947 etcd-wrapper[1329]: WARNING: 2024/07/02 01:00:19 [core] grpc: addrConn.createTransport failed to connect to {0.0.0.0:2379 0.0.0.0:2379 0 }. Err: connection error: desc = "transport: Error while dialing dial tcp 0.0.0.0:2379: connect: connection refused". Reconnecting... Jul 2 01:00:19.763276 etcd-wrapper[1329]: WARNING: 2024/07/02 01:00:19 [core] grpc: addrConn.createTransport failed to connect to {0.0.0.0:4001 0.0.0.0:4001 0 }. Err: connection error: desc = "transport: Error while dialing dial tcp 0.0.0.0:4001: connect: connection refused". Reconnecting... Jul 2 01:00:19.764374 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:19.764Z","caller":"etcdserver/server.go:1438","msg":"skipped leadership transfer for single voting member cluster","local-member-id":"291afac5a88924cd","current-leader-member-id":"291afac5a88924cd"} Jul 2 01:00:19.765503 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:19.765Z","caller":"embed/etcd.go:562","msg":"stopping serving peer traffic","address":"[::]:2380"} Jul 2 01:00:19.766704 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:19.766Z","caller":"embed/etcd.go:567","msg":"stopped serving peer traffic","address":"[::]:2380"} Jul 2 01:00:19.766704 etcd-wrapper[1329]: {"level":"info","ts":"2024-07-02T01:00:19.766Z","caller":"embed/etcd.go:369","msg":"closed etcd server","name":"15eb17a32cb346c2ae077fa0c81e047c","data-dir":"/var/lib/etcd","advertise-peer-urls":["http://10.0.0.124:2380"],"advertise-client-urls":["http://10.0.0.124:2379"]} Jul 2 01:00:19.768187 systemd[1]: docker-53a2a8f7854e8766c7549216a7773f2cd00fb8caef520b74c97ce418fad7a9e5.scope: Deactivated successfully. Jul 2 01:00:19.767000 audit: BPF prog-id=30 op=UNLOAD Jul 2 01:00:19.771000 audit: BPF prog-id=33 op=UNLOAD Jul 2 01:00:19.779096 env[1186]: time="2024-07-02T01:00:19.779048255Z" level=info msg="ignoring event" container=53a2a8f7854e8766c7549216a7773f2cd00fb8caef520b74c97ce418fad7a9e5 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Jul 2 01:00:19.779563 env[1138]: time="2024-07-02T01:00:19.779510353Z" level=info msg="shim disconnected" id=53a2a8f7854e8766c7549216a7773f2cd00fb8caef520b74c97ce418fad7a9e5 Jul 2 01:00:19.779757 env[1138]: time="2024-07-02T01:00:19.779559807Z" level=warning msg="cleaning up after shim disconnected" id=53a2a8f7854e8766c7549216a7773f2cd00fb8caef520b74c97ce418fad7a9e5 namespace=moby Jul 2 01:00:19.779757 env[1138]: time="2024-07-02T01:00:19.779576413Z" level=info msg="cleaning up dead shim" Jul 2 01:00:19.786333 env[1138]: time="2024-07-02T01:00:19.786289126Z" level=warning msg="cleanup warnings time=\"2024-07-02T01:00:19Z\" level=info msg=\"starting signal loop\" namespace=moby pid=1609 runtime=io.containerd.runc.v2\n" Jul 2 01:00:19.791441 systemd[1]: var-lib-docker-overlay2-2e0494bed9468c2fb26291e8e4ebe9880d61de139edf336657e2112cfeb7da53-merged.mount: Deactivated successfully. Jul 2 01:00:19.806258 docker[1589]: etcd-member Jul 2 01:00:19.830680 docker[1624]: etcd-member Jul 2 01:00:19.832296 systemd[1]: etcd-member.service: Deactivated successfully. Jul 2 01:00:19.832491 systemd[1]: Stopped etcd-member.service. Jul 2 01:00:19.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=etcd-member comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.832000 audit[1587]: USER_END pid=1587 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.832000 audit[1587]: CRED_DISP pid=1587 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.833682 sudo[1587]: pam_unix(sudo:session): session closed for user root Jul 2 01:00:19.837000 audit[1632]: USER_ACCT pid=1632 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.838310 sudo[1632]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /var/lib/etcd Jul 2 01:00:19.837000 audit[1632]: CRED_REFR pid=1632 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.838509 sudo[1632]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:00:19.839000 audit[1632]: USER_START pid=1632 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.840978 sudo[1632]: pam_unix(sudo:session): session closed for user root Jul 2 01:00:19.840000 audit[1632]: USER_END pid=1632 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.840000 audit[1632]: CRED_DISP pid=1632 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.844000 audit[1634]: USER_ACCT pid=1634 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.845298 sudo[1634]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/mv /tmp/tmp.rXXDxycyMh /var/lib/etcd/ Jul 2 01:00:19.844000 audit[1634]: CRED_REFR pid=1634 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.845500 sudo[1634]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:00:19.846000 audit[1634]: USER_START pid=1634 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.898964 sudo[1634]: pam_unix(sudo:session): session closed for user root Jul 2 01:00:19.898000 audit[1634]: USER_END pid=1634 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.898000 audit[1634]: CRED_DISP pid=1634 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.902000 audit[1636]: USER_ACCT pid=1636 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.903767 sudo[1636]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/chown -R etcd:etcd /var/lib/etcd Jul 2 01:00:19.903000 audit[1636]: CRED_REFR pid=1636 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.904003 sudo[1636]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:00:19.904000 audit[1636]: USER_START pid=1636 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.906951 sudo[1636]: pam_unix(sudo:session): session closed for user root Jul 2 01:00:19.906000 audit[1636]: USER_END pid=1636 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.906000 audit[1636]: CRED_DISP pid=1636 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.910000 audit[1638]: USER_ACCT pid=1638 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.911241 sudo[1638]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/mkdir -p /run/systemd/system/etcd-member.service.d/ Jul 2 01:00:19.910000 audit[1638]: CRED_REFR pid=1638 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.911441 sudo[1638]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:00:19.911000 audit[1638]: USER_START pid=1638 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.912000 audit[1638]: USER_END pid=1638 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.913000 audit[1638]: CRED_DISP pid=1638 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.913759 sudo[1638]: pam_unix(sudo:session): session closed for user root Jul 2 01:00:19.917000 audit[1640]: USER_ACCT pid=1640 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.918760 sudo[1640]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/tee /run/systemd/system/etcd-member.service.d/10-force-new.conf Jul 2 01:00:19.918000 audit[1640]: CRED_REFR pid=1640 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.918974 sudo[1640]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:00:19.919000 audit[1640]: USER_START pid=1640 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.921764 sudo[1640]: pam_unix(sudo:session): session closed for user root Jul 2 01:00:19.920000 audit[1640]: USER_END pid=1640 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.921000 audit[1640]: CRED_DISP pid=1640 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.924000 audit[1642]: USER_ACCT pid=1642 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.925981 sudo[1642]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl daemon-reload Jul 2 01:00:19.925000 audit[1642]: CRED_REFR pid=1642 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.926495 sudo[1642]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:00:19.927000 audit[1642]: USER_START pid=1642 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:19.933369 systemd[1]: Reloading. Jul 2 01:00:19.976651 /usr/lib/systemd/system-generators/torcx-generator[1664]: time="2024-07-02T01:00:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 01:00:19.977001 /usr/lib/systemd/system-generators/torcx-generator[1664]: time="2024-07-02T01:00:19Z" level=info msg="torcx already run" Jul 2 01:00:20.030360 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 01:00:20.030377 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 01:00:20.048411 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 01:00:20.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.094000 audit: BPF prog-id=35 op=LOAD Jul 2 01:00:20.094000 audit: BPF prog-id=29 op=UNLOAD Jul 2 01:00:20.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.095000 audit: BPF prog-id=36 op=LOAD Jul 2 01:00:20.095000 audit: BPF prog-id=21 op=UNLOAD Jul 2 01:00:20.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.095000 audit: BPF prog-id=37 op=LOAD Jul 2 01:00:20.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.096000 audit: BPF prog-id=38 op=LOAD Jul 2 01:00:20.096000 audit: BPF prog-id=22 op=UNLOAD Jul 2 01:00:20.096000 audit: BPF prog-id=23 op=UNLOAD Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit: BPF prog-id=39 op=LOAD Jul 2 01:00:20.097000 audit: BPF prog-id=15 op=UNLOAD Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit: BPF prog-id=40 op=LOAD Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit: BPF prog-id=41 op=LOAD Jul 2 01:00:20.097000 audit: BPF prog-id=16 op=UNLOAD Jul 2 01:00:20.097000 audit: BPF prog-id=17 op=UNLOAD Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.098000 audit: BPF prog-id=42 op=LOAD Jul 2 01:00:20.098000 audit: BPF prog-id=20 op=UNLOAD Jul 2 01:00:20.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.098000 audit: BPF prog-id=43 op=LOAD Jul 2 01:00:20.098000 audit: BPF prog-id=25 op=UNLOAD Jul 2 01:00:20.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.099000 audit: BPF prog-id=44 op=LOAD Jul 2 01:00:20.099000 audit: BPF prog-id=24 op=UNLOAD Jul 2 01:00:20.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.101000 audit: BPF prog-id=45 op=LOAD Jul 2 01:00:20.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.101000 audit: BPF prog-id=46 op=LOAD Jul 2 01:00:20.101000 audit: BPF prog-id=18 op=UNLOAD Jul 2 01:00:20.101000 audit: BPF prog-id=19 op=UNLOAD Jul 2 01:00:20.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.102000 audit: BPF prog-id=47 op=LOAD Jul 2 01:00:20.102000 audit: BPF prog-id=26 op=UNLOAD Jul 2 01:00:20.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.103000 audit: BPF prog-id=48 op=LOAD Jul 2 01:00:20.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.103000 audit: BPF prog-id=49 op=LOAD Jul 2 01:00:20.103000 audit: BPF prog-id=27 op=UNLOAD Jul 2 01:00:20.103000 audit: BPF prog-id=28 op=UNLOAD Jul 2 01:00:20.106000 audit[1642]: USER_END pid=1642 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:20.107000 audit[1642]: CRED_DISP pid=1642 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:20.107665 sudo[1642]: pam_unix(sudo:session): session closed for user root Jul 2 01:00:20.111000 audit[1701]: USER_ACCT pid=1701 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:20.112541 sudo[1701]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl start etcd-member Jul 2 01:00:20.111000 audit[1701]: CRED_REFR pid=1701 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:20.112757 sudo[1701]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 01:00:20.113000 audit[1701]: USER_START pid=1701 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:20.121250 systemd[1]: Starting coreos-metadata.service... Jul 2 01:00:20.127712 systemd[1]: coreos-metadata.service: Deactivated successfully. Jul 2 01:00:20.127923 systemd[1]: Finished coreos-metadata.service. Jul 2 01:00:20.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:20.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:20.129890 systemd[1]: Starting etcd-member.service... Jul 2 01:00:20.151335 etcd-wrapper[1710]: Error response from daemon: No such container: etcd-member Jul 2 01:00:20.169240 etcd-wrapper[1718]: Error: No such container: etcd-member Jul 2 01:00:20.196420 systemd[1]: var-lib-docker-overlay2-8cd07fc38302fe8ec8c2d5f20c2a23420d5265763292c5a34e7dface2b09fab6\x2dinit-merged.mount: Deactivated successfully. Jul 2 01:00:20.314456 env[1138]: time="2024-07-02T01:00:20.314125796Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 01:00:20.314456 env[1138]: time="2024-07-02T01:00:20.314166358Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 01:00:20.314456 env[1138]: time="2024-07-02T01:00:20.314176589Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 01:00:20.314456 env[1138]: time="2024-07-02T01:00:20.314289093Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/89da79650cb813c60d4ffe27b4984806fb0edbf19786eee5abf41b4185fb9103 pid=1755 runtime=io.containerd.runc.v2 Jul 2 01:00:20.324318 systemd[1]: Started docker-89da79650cb813c60d4ffe27b4984806fb0edbf19786eee5abf41b4185fb9103.scope. Jul 2 01:00:20.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.345000 audit: BPF prog-id=50 op=LOAD Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1755 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:20.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F38396461373936353063623831336336306434666665323762 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1755 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:20.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F38396461373936353063623831336336306434666665323762 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit: BPF prog-id=51 op=LOAD Jul 2 01:00:20.346000 audit[1763]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1755 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:20.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F38396461373936353063623831336336306434666665323762 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit: BPF prog-id=52 op=LOAD Jul 2 01:00:20.346000 audit[1763]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1755 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:20.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F38396461373936353063623831336336306434666665323762 Jul 2 01:00:20.346000 audit: BPF prog-id=52 op=UNLOAD Jul 2 01:00:20.346000 audit: BPF prog-id=51 op=UNLOAD Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 01:00:20.346000 audit: BPF prog-id=53 op=LOAD Jul 2 01:00:20.346000 audit[1763]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1755 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 01:00:20.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F38396461373936353063623831336336306434666665323762 Jul 2 01:00:20.347601 systemd-resolved[1089]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 2 01:00:20.373645 etcd-wrapper[1738]: {"level":"info","ts":1719882020.3734066,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Jul 2 01:00:20.373966 etcd-wrapper[1738]: {"level":"info","ts":1719882020.373466,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_FORCE_NEW_CLUSTER","variable-value":"true"} Jul 2 01:00:20.373966 etcd-wrapper[1738]: {"level":"info","ts":1719882020.3734891,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"15eb17a32cb346c2ae077fa0c81e047c"} Jul 2 01:00:20.373966 etcd-wrapper[1738]: {"level":"warn","ts":1719882020.3735135,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Jul 2 01:00:20.373966 etcd-wrapper[1738]: {"level":"warn","ts":1719882020.37352,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Jul 2 01:00:20.373966 etcd-wrapper[1738]: {"level":"warn","ts":1719882020.3735247,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Jul 2 01:00:20.373966 etcd-wrapper[1738]: {"level":"warn","ts":1719882020.3735285,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Jul 2 01:00:20.373966 etcd-wrapper[1738]: {"level":"warn","ts":1719882020.3735337,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_UNSUPPORTED_ARCH=arm64"} Jul 2 01:00:20.374273 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.373Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-peer-urls=http://0.0.0.0:2380","--listen-client-urls=http://0.0.0.0:4001,http://0.0.0.0:2379","--initial-advertise-peer-urls=http://10.0.0.124:2380","--advertise-client-urls=http://10.0.0.124:2379","--discovery=http://10.0.0.1:43417/v2/keys/discovery/482590452077883092","--enable-v2=true"]} Jul 2 01:00:20.374331 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.374Z","caller":"etcdmain/etcd.go:115","msg":"server has been already initialized","data-dir":"/var/lib/etcd","dir-type":"member"} Jul 2 01:00:20.374455 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.374Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://0.0.0.0:2380"]} Jul 2 01:00:20.374762 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.374Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379","http://0.0.0.0:4001"]} Jul 2 01:00:20.374963 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.374Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"arm64","max-cpu-set":4,"max-cpu-available":4,"member-initialized":true,"name":"15eb17a32cb346c2ae077fa0c81e047c","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":true,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://10.0.0.124:2380"],"listen-peer-urls":["http://0.0.0.0:2380"],"advertise-client-urls":["http://10.0.0.124:2379"],"listen-client-urls":["http://0.0.0.0:2379","http://0.0.0.0:4001"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"","initial-cluster-state":"new","initial-cluster-token":"","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"http://10.0.0.1:43417/v2/keys/discovery/482590452077883092","discovery-proxy":"","downgrade-check-interval":"5s"} Jul 2 01:00:20.375435 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.375Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"137.981µs"} Jul 2 01:00:20.375616 etcd-wrapper[1738]: {"level":"warn","ts":"2024-07-02T01:00:20.375Z","caller":"etcdserver/server.go:480","msg":"discovery token is ignored since cluster already initialized; valid logs are found","wal-dir":"/var/lib/etcd/member/wal"} Jul 2 01:00:20.375797 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.375Z","caller":"etcdserver/server.go:526","msg":"No snapshot found. Recovering WAL from scratch!"} Jul 2 01:00:20.384456 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.384Z","caller":"etcdserver/raft.go:556","msg":"forcing restart member","cluster-id":"4d90b2bbbb4f6200","local-member-id":"291afac5a88924cd","commit-index":7} Jul 2 01:00:20.384456 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.384Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"291afac5a88924cd switched to configuration voters=()"} Jul 2 01:00:20.384580 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.384Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"291afac5a88924cd became follower at term 2"} Jul 2 01:00:20.384580 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.384Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 291afac5a88924cd [peers: [], term: 2, commit: 7, applied: 0, lastindex: 7, lastterm: 2]"} Jul 2 01:00:20.384748 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.384Z","caller":"membership/cluster.go:276","msg":"recovered/added member from store","cluster-id":"4d90b2bbbb4f6200","local-member-id":"291afac5a88924cd","recovered-remote-peer-id":"9070f4f35b01","recovered-remote-peer-urls":["http://use-flag--force-new-cluster:2080"]} Jul 2 01:00:20.385557 etcd-wrapper[1738]: {"level":"warn","ts":"2024-07-02T01:00:20.385Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Jul 2 01:00:20.386718 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.386Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Jul 2 01:00:20.387574 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.387Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Jul 2 01:00:20.388150 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.388Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"9070f4f35b01"} Jul 2 01:00:20.388269 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.388Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"291afac5a88924cd","remote-peer-id":"9070f4f35b01"} Jul 2 01:00:20.388926 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.388Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"291afac5a88924cd","remote-peer-id":"9070f4f35b01"} Jul 2 01:00:20.389307 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.389Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"291afac5a88924cd","remote-peer-id":"9070f4f35b01"} Jul 2 01:00:20.389897 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.389Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"9070f4f35b01"} Jul 2 01:00:20.389995 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.389Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"291afac5a88924cd","remote-peer-id":"9070f4f35b01"} Jul 2 01:00:20.390091 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.389Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"291afac5a88924cd","remote-peer-id":"9070f4f35b01","remote-peer-urls":["http://use-flag--force-new-cluster:2080"]} Jul 2 01:00:20.390249 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.390Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"291afac5a88924cd","local-server-version":"3.5.0","cluster-version":"to_be_decided"} Jul 2 01:00:20.390922 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.389Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"291afac5a88924cd","remote-peer-id":"9070f4f35b01"} Jul 2 01:00:20.390922 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.390Z","caller":"etcdserver/server.go:728","msg":"started as single-node; fast-forwarding election ticks","local-member-id":"291afac5a88924cd","forward-ticks":9,"forward-duration":"900ms","election-ticks":10,"election-timeout":"1s"} Jul 2 01:00:20.390922 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.390Z","caller":"membership/cluster.go:531","msg":"set initial cluster version","cluster-id":"4d90b2bbbb4f6200","local-member-id":"291afac5a88924cd","cluster-version":"3.5"} Jul 2 01:00:20.390922 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.390Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} Jul 2 01:00:20.390922 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.390Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"291afac5a88924cd switched to configuration voters=(2961955431792583885)"} Jul 2 01:00:20.390922 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.390Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"4d90b2bbbb4f6200","local-member-id":"291afac5a88924cd","added-peer-id":"291afac5a88924cd","added-peer-peer-urls":["http://localhost:2380"]} Jul 2 01:00:20.392211 etcd-wrapper[1738]: {"level":"warn","ts":"2024-07-02T01:00:20.392Z","caller":"embed/etcd.go:700","msg":"Flag `enable-v2` is deprecated and will get removed in etcd 3.6."} Jul 2 01:00:20.392327 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.392Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"291afac5a88924cd","initial-advertise-peer-urls":["http://10.0.0.124:2380"],"listen-peer-urls":["http://0.0.0.0:2380"],"advertise-client-urls":["http://10.0.0.124:2379"],"listen-client-urls":["http://0.0.0.0:2379","http://0.0.0.0:4001"],"listen-metrics-urls":[]} Jul 2 01:00:20.392327 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.392Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"[::]:2380"} Jul 2 01:00:20.392406 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.392Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"[::]:2380"} Jul 2 01:00:20.685832 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.685Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"291afac5a88924cd is starting a new election at term 2"} Jul 2 01:00:20.685832 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.685Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"291afac5a88924cd became pre-candidate at term 2"} Jul 2 01:00:20.685832 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.685Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"291afac5a88924cd received MsgPreVoteResp from 291afac5a88924cd at term 2"} Jul 2 01:00:20.685832 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.685Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"291afac5a88924cd became candidate at term 3"} Jul 2 01:00:20.685832 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.685Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"291afac5a88924cd received MsgVoteResp from 291afac5a88924cd at term 3"} Jul 2 01:00:20.685832 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.685Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"291afac5a88924cd became leader at term 3"} Jul 2 01:00:20.685832 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.685Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 291afac5a88924cd elected leader 291afac5a88924cd at term 3"} Jul 2 01:00:20.686172 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.686Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"291afac5a88924cd","local-member-attributes":"{Name:15eb17a32cb346c2ae077fa0c81e047c ClientURLs:[http://10.0.0.124:2379]}","request-path":"/0/members/291afac5a88924cd/attributes","cluster-id":"4d90b2bbbb4f6200","publish-timeout":"7s"} Jul 2 01:00:20.686659 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.686Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Jul 2 01:00:20.687048 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.686Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Jul 2 01:00:20.687164 systemd[1]: Started etcd-member.service. Jul 2 01:00:20.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=etcd-member comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:20.686000 audit[1701]: USER_END pid=1701 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:20.686000 audit[1701]: CRED_DISP pid=1701 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 01:00:20.688053 sudo[1701]: pam_unix(sudo:session): session closed for user root Jul 2 01:00:20.688988 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.686Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Jul 2 01:00:20.688988 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.686Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Jul 2 01:00:20.689621 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.689Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Jul 2 01:00:20.689865 etcd-wrapper[1738]: {"level":"info","ts":"2024-07-02T01:00:20.689Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:4001"} Jul 2 01:00:20.702084 sshd[1543]: pam_unix(sshd:session): session closed for user core Jul 2 01:00:20.702000 audit[1543]: USER_END pid=1543 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:20.702000 audit[1543]: CRED_DISP pid=1543 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 01:00:20.704829 systemd[1]: sshd@7-10.0.0.124:22-10.0.0.1:56668.service: Deactivated successfully. Jul 2 01:00:20.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.124:22-10.0.0.1:56668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 01:00:20.705484 systemd[1]: session-8.scope: Deactivated successfully. Jul 2 01:00:20.705977 systemd-logind[1125]: Session 8 logged out. Waiting for processes to exit. Jul 2 01:00:20.706747 systemd-logind[1125]: Removed session 8. Jul 2 01:00:20.746118 etcd-wrapper[1738]: {"level":"warn","ts":"2024-07-02T01:00:20.745Z","caller":"etcdserver/cluster_util.go:288","msg":"failed to reach the peer URL","address":"http://use-flag--force-new-cluster:2080/version","remote-member-id":"9070f4f35b01","error":"Get \"http://use-flag--force-new-cluster:2080/version\": dial tcp: lookup use-flag--force-new-cluster on 1.1.1.1:53: no such host"} Jul 2 01:00:20.746118 etcd-wrapper[1738]: {"level":"warn","ts":"2024-07-02T01:00:20.745Z","caller":"etcdserver/cluster_util.go:155","msg":"failed to get version","remote-member-id":"9070f4f35b01","error":"Get \"http://use-flag--force-new-cluster:2080/version\": dial tcp: lookup use-flag--force-new-cluster on 1.1.1.1:53: no such host"}