GNU GRUB version 2.02 ����������������������������������������������������������������������������Ŀ�������������������������������������������������������������������������������������������������������� Use the ^ and v keys to select which entry is highlighted. Press enter to boot the selected OS, `e' to edit the commands before booting or `c' for a command-line.  *Flatcar default  Flatcar USR-A  Flatcar USR-B        [2025-11-01T00:40:47.618355]      The highlighted entry will be executed automatically in 1s.  The highlighted entry will be executed automatically in 0s.  Booting `Flatcar default' [ 0.000000] Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Oct 31 23:02:53 -00 2025 [ 0.000000] Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=c4c72a4f851a6da01cbc7150799371516ef8311ea786098908d8eb164df01ee2 [ 0.000000] BIOS-provided physical RAM map: [ 0.000000] BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable [ 0.000000] BIOS-e820: [mem 0x0000000000100000-0x00000000786cdfff] usable [ 0.000000] BIOS-e820: [mem 0x00000000786ce000-0x000000007894dfff] reserved [ 0.000000] BIOS-e820: [mem 0x000000007894e000-0x000000007895dfff] ACPI data [ 0.000000] BIOS-e820: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS [ 0.000000] BIOS-e820: [mem 0x00000000789de000-0x000000007c97bfff] usable [ 0.000000] BIOS-e820: [mem 0x000000007c97c000-0x000000007c9fffff] reserved [ 0.000000] NX (Execute Disable) protection: active [ 0.000000] extended physical RAM map: [ 0.000000] reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable [ 0.000000] reserve setup_data: [mem 0x0000000000100000-0x0000000076813017] usable [ 0.000000] reserve setup_data: [mem 0x0000000076813018-0x000000007681be57] usable [ 0.000000] reserve setup_data: [mem 0x000000007681be58-0x00000000786cdfff] usable [ 0.000000] reserve setup_data: [mem 0x00000000786ce000-0x000000007894dfff] reserved [ 0.000000] reserve setup_data: [mem 0x000000007894e000-0x000000007895dfff] ACPI data [ 0.000000] reserve setup_data: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS [ 0.000000] reserve setup_data: [mem 0x00000000789de000-0x000000007c97bfff] usable [ 0.000000] reserve setup_data: [mem 0x000000007c97c000-0x000000007c9fffff] reserved [ 0.000000] efi: EFI v2.70 by EDK II [ 0.000000] efi: SMBIOS=0x7886a000 ACPI=0x7895d000 ACPI 2.0=0x7895d014 MEMATTR=0x77003a98 [ 0.000000] SMBIOS 2.7 present. [ 0.000000] DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 [ 0.000000] Hypervisor detected: KVM [ 0.000000] kvm-clock: Using msrs 4b564d01 and 4b564d00 [ 0.000000] kvm-clock: cpu 0, msr 3e1a0001, primary cpu clock [ 0.000002] kvm-clock: using sched offset of 4098486238 cycles [ 0.000004] clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns [ 0.000008] tsc: Detected 2499.998 MHz processor [ 0.000108] last_pfn = 0x7c97c max_arch_pfn = 0x400000000 [ 0.000146] x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT [ 0.000281] Using GB pages for direct mapping [ 0.000558] Secure boot disabled [ 0.000563] ACPI: Early table checksum verification disabled [ 0.000663] ACPI: RSDP 0x000000007895D014 000024 (v02 AMAZON) [ 0.000668] ACPI: XSDT 0x000000007895C0E8 00006C (v01 AMAZON AMZNFACP 00000001 01000013) [ 0.000673] ACPI: FACP 0x0000000078955000 000114 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) [ 0.000679] ACPI: DSDT 0x0000000078956000 00115A (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) [ 0.000683] ACPI: FACS 0x00000000789D0000 000040 [ 0.000686] ACPI: WAET 0x000000007895B000 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) [ 0.000689] ACPI: SLIT 0x000000007895A000 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) [ 0.000692] ACPI: APIC 0x0000000078959000 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) [ 0.000696] ACPI: SRAT 0x0000000078958000 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) [ 0.000699] ACPI: HPET 0x0000000078954000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) [ 0.000702] ACPI: SSDT 0x0000000078953000 000759 (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) [ 0.000705] ACPI: SSDT 0x0000000078952000 00007F (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) [ 0.000708] ACPI: BGRT 0x0000000078951000 000038 (v01 AMAZON AMAZON 00000002 01000013) [ 0.000711] ACPI: Reserving FACP table memory at [mem 0x78955000-0x78955113] [ 0.000713] ACPI: Reserving DSDT table memory at [mem 0x78956000-0x78957159] [ 0.000714] ACPI: Reserving FACS table memory at [mem 0x789d0000-0x789d003f] [ 0.000715] ACPI: Reserving WAET table memory at [mem 0x7895b000-0x7895b027] [ 0.000716] ACPI: Reserving SLIT table memory at [mem 0x7895a000-0x7895a06b] [ 0.000718] ACPI: Reserving APIC table memory at [mem 0x78959000-0x78959075] [ 0.000719] ACPI: Reserving SRAT table memory at [mem 0x78958000-0x7895809f] [ 0.000720] ACPI: Reserving HPET table memory at [mem 0x78954000-0x78954037] [ 0.000721] ACPI: Reserving SSDT table memory at [mem 0x78953000-0x78953758] [ 0.000723] ACPI: Reserving SSDT table memory at [mem 0x78952000-0x7895207e] [ 0.000724] ACPI: Reserving BGRT table memory at [mem 0x78951000-0x78951037] [ 0.000773] SRAT: PXM 0 -> APIC 0x00 -> Node 0 [ 0.000775] SRAT: PXM 0 -> APIC 0x01 -> Node 0 [ 0.000777] ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] [ 0.000788] NODE_DATA(0) allocated [mem 0x7a8ef000-0x7a8f4fff] [ 0.000823] Zone ranges: [ 0.000824] DMA [mem 0x0000000000001000-0x0000000000ffffff] [ 0.000826] DMA32 [mem 0x0000000001000000-0x000000007c97bfff] [ 0.000828] Normal empty [ 0.000829] Movable zone start for each node [ 0.000831] Early memory node ranges [ 0.000831] node 0: [mem 0x0000000000001000-0x000000000009ffff] [ 0.000833] node 0: [mem 0x0000000000100000-0x00000000786cdfff] [ 0.000835] node 0: [mem 0x00000000789de000-0x000000007c97bfff] [ 0.000836] Initmem setup node 0 [mem 0x0000000000001000-0x000000007c97bfff] [ 0.000845] On node 0, zone DMA: 1 pages in unavailable ranges [ 0.000876] On node 0, zone DMA: 96 pages in unavailable ranges [ 0.004359] On node 0, zone DMA32: 784 pages in unavailable ranges [ 0.004578] On node 0, zone DMA32: 13956 pages in unavailable ranges [ 0.005012] ACPI: PM-Timer IO Port: 0xb008 [ 0.005021] ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) [ 0.005080] IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 [ 0.005084] ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) [ 0.005086] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) [ 0.005087] ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) [ 0.005089] ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) [ 0.005092] ACPI: Using ACPI (MADT) for SMP configuration information [ 0.005094] ACPI: HPET id: 0x8086a201 base: 0xfed00000 [ 0.005098] TSC deadline timer available [ 0.005100] smpboot: Allowing 2 CPUs, 0 hotplug CPUs [ 0.005129] [mem 0x7ca00000-0xffffffff] available for PCI devices [ 0.005137] Booting paravirtualized kernel on KVM [ 0.005140] clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns [ 0.008997] setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 [ 0.009335] percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 [ 0.010056] kvm-guest: stealtime: cpu 0, msr 7a41c0c0 [ 0.010062] kvm-guest: PV spinlocks enabled [ 0.010065] PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) [ 0.010075] Built 1 zonelists, mobility grouping on. Total pages: 501318 [ 0.010077] Policy zone: DMA32 [ 0.010079] Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=c4c72a4f851a6da01cbc7150799371516ef8311ea786098908d8eb164df01ee2 [ 0.010249] Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. [ 0.010543] Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) [ 0.010694] Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) [ 0.010732] mem auto-init: stack:off, heap alloc:off, heap free:off [ 0.015049] Memory: 1876636K/2037804K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47496K init, 4084K bss, 160908K reserved, 0K cma-reserved) [ 0.015334] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 [ 0.015346] Kernel/User page tables isolation: enabled [ 0.015376] ftrace: allocating 34614 entries in 136 pages [ 0.033484] ftrace: allocated 136 pages with 2 groups [ 0.033602] rcu: Hierarchical RCU implementation. [ 0.033603] rcu: RCU event tracing is enabled. [ 0.033604] rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. [ 0.033606] Rude variant of Tasks RCU enabled. [ 0.033607] Tracing variant of Tasks RCU enabled. [ 0.033608] rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. [ 0.033610] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 [ 0.037796] NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 [ 0.038007] random: crng init done [ 0.038033] Console: colour dummy device 80x25 [ 0.038198] printk: console [tty0] enabled [ 0.166738] printk: console [ttyS0] enabled [ 0.167378] ACPI: Core revision 20210730 [ 0.168160] clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns [ 0.169491] APIC: Switch to symmetric I/O mode setup [ 0.170655] x2apic enabled [ 0.171474] Switched APIC routing to physical x2apic. [ 0.173954] clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns [ 0.175475] Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499998) [ 0.176470] Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 [ 0.176470] Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 [ 0.176470] Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization [ 0.176470] Spectre V2 : Mitigation: Retpolines [ 0.176470] Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT [ 0.176470] RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! [ 0.176470] RETBleed: Vulnerable [ 0.176470] Speculative Store Bypass: Vulnerable [ 0.176470] MDS: Vulnerable: Clear CPU buffers attempted, no microcode [ 0.176470] MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode [ 0.176470] GDS: Unknown: Dependent on hypervisor status [ 0.176470] active return thunk: its_return_thunk [ 0.176470] ITS: Mitigation: Aligned branch/return thunks [ 0.176470] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' [ 0.176470] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' [ 0.176470] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' [ 0.176470] x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' [ 0.176470] x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' [ 0.176470] x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' [ 0.176470] x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' [ 0.176470] x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' [ 0.176470] x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' [ 0.176470] x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 [ 0.176470] x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 [ 0.176470] x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 [ 0.176470] x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 [ 0.176470] x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 [ 0.176470] x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 [ 0.176470] x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 [ 0.176470] x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. [ 0.176470] Freeing SMP alternatives memory: 32K [ 0.176470] pid_max: default: 32768 minimum: 301 [ 0.176470] LSM: Security Framework initializing [ 0.176470] SELinux: Initializing. [ 0.176470] Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) [ 0.176470] Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) [ 0.176470] smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) [ 0.176624] Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. [ 0.177507] signal: max sigframe size: 3632 [ 0.178160] rcu: Hierarchical SRCU implementation. [ 0.178803] NMI watchdog: Perf NMI watchdog permanently disabled [ 0.179529] smp: Bringing up secondary CPUs ... [ 0.180307] x86: Booting SMP configuration: [ 0.180477] .... node #0, CPUs: #1 [ 0.138471] kvm-clock: cpu 1, msr 3e1a0041, secondary cpu clock [ 0.185191] kvm-guest: stealtime: cpu 1, msr 7a51c0c0 [ 0.187558] Transient Scheduler Attacks: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. [ 0.188479] Transient Scheduler Attacks: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. [ 0.189669] smp: Brought up 1 node, 2 CPUs [ 0.190474] smpboot: Max logical packages: 1 [ 0.191137] smpboot: Total of 2 processors activated (9999.99 BogoMIPS) [ 0.191804] devtmpfs: initialized [ 0.192033] x86/mm: Memory block size: 128MB [ 0.193532] ACPI: PM: Registering ACPI NVS region [mem 0x7895e000-0x789ddfff] (524288 bytes) [ 0.194515] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns [ 0.195476] futex hash table entries: 512 (order: 3, 32768 bytes, linear) [ 0.196554] pinctrl core: initialized pinctrl subsystem [ 0.197714] NET: Registered PF_NETLINK/PF_ROUTE protocol family [ 0.198590] audit: initializing netlink subsys (disabled) [ 0.199507] audit: type=2000 audit(1761957650.330:1): state=initialized audit_enabled=0 res=1 [ 0.199600] thermal_sys: Registered thermal governor 'step_wise' [ 0.200474] thermal_sys: Registered thermal governor 'user_space' [ 0.201399] cpuidle: using governor menu [ 0.202213] ACPI: bus type PCI registered [ 0.202474] acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 [ 0.203476] dca service started, version 1.12.1 [ 0.204212] PCI: Using configuration type 1 for base access [ 0.205233] kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. [ 0.205564] HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages [ 0.206477] HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages [ 0.320688] ACPI: Added _OSI(Module Device) [ 0.321480] ACPI: Added _OSI(Processor Device) [ 0.322145] ACPI: Added _OSI(Processor Aggregator Device) [ 0.322481] ACPI: Added _OSI(Linux-Dell-Video) [ 0.323169] ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) [ 0.323474] ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) [ 0.324923] ACPI: 3 ACPI AML tables successfully acquired and loaded [ 0.326014] ACPI: Interpreter enabled [ 0.326489] ACPI: PM: (supports S0 S5) [ 0.327094] ACPI: Using IOAPIC for interrupt routing [ 0.327499] PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug [ 0.328567] ACPI: Enabled 2 GPEs in block 00 to 0F [ 0.331219] ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) [ 0.331476] acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] [ 0.332479] acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. [ 0.333774] acpiphp: Slot [3] registered [ 0.334503] acpiphp: Slot [4] registered [ 0.335113] acpiphp: Slot [5] registered [ 0.335487] acpiphp: Slot [6] registered [ 0.336113] acpiphp: Slot [7] registered [ 0.336491] acpiphp: Slot [8] registered [ 0.337116] acpiphp: Slot [9] registered [ 0.337488] acpiphp: Slot [10] registered [ 0.338094] acpiphp: Slot [11] registered [ 0.338486] acpiphp: Slot [12] registered [ 0.339119] acpiphp: Slot [13] registered [ 0.339486] acpiphp: Slot [14] registered [ 0.340118] acpiphp: Slot [15] registered [ 0.340487] acpiphp: Slot [16] registered [ 0.341122] acpiphp: Slot [17] registered [ 0.341487] acpiphp: Slot [18] registered [ 0.342111] acpiphp: Slot [19] registered [ 0.342486] acpiphp: Slot [20] registered [ 0.343249] acpiphp: Slot [21] registered [ 0.343487] acpiphp: Slot [22] registered [ 0.344124] acpiphp: Slot [23] registered [ 0.344488] acpiphp: Slot [24] registered [ 0.345115] acpiphp: Slot [25] registered [ 0.345487] acpiphp: Slot [26] registered [ 0.346137] acpiphp: Slot [27] registered [ 0.346488] acpiphp: Slot [28] registered [ 0.347335] acpiphp: Slot [29] registered [ 0.347492] acpiphp: Slot [30] registered [ 0.348101] acpiphp: Slot [31] registered [ 0.348485] PCI host bridge to bus 0000:00 [ 0.349158] pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] [ 0.349473] pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] [ 0.350472] pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] [ 0.351473] pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] [ 0.352473] pci_bus 0000:00: root bus resource [mem 0x100000000-0x2000ffffffff window] [ 0.353473] pci_bus 0000:00: root bus resource [bus 00-ff] [ 0.354390] pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 [ 0.354980] pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 [ 0.356665] pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 [ 0.358275] pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI [ 0.358543] pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff [ 0.359394] pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff [ 0.359487] pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff [ 0.360373] pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff [ 0.360486] pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff [ 0.361330] pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff [ 0.361799] pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 [ 0.363083] pci 0000:00:03.0: reg 0x10: [mem 0x80000000-0x803fffff pref] [ 0.365478] pci 0000:00:03.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] [ 0.366532] pci 0000:00:03.0: BAR 0: assigned to efifb [ 0.367343] pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] [ 0.367828] pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 [ 0.369476] pci 0000:00:04.0: reg 0x10: [mem 0x80404000-0x80407fff] [ 0.374864] pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 [ 0.376416] pci 0000:00:05.0: reg 0x10: [mem 0x80400000-0x80403fff] [ 0.381396] ACPI: PCI: Interrupt link LNKA configured for IRQ 10 [ 0.381568] ACPI: PCI: Interrupt link LNKB configured for IRQ 10 [ 0.382563] ACPI: PCI: Interrupt link LNKC configured for IRQ 11 [ 0.383564] ACPI: PCI: Interrupt link LNKD configured for IRQ 11 [ 0.384521] ACPI: PCI: Interrupt link LNKS configured for IRQ 9 [ 0.385675] iommu: Default domain type: Translated [ 0.386477] iommu: DMA domain TLB invalidation policy: lazy mode [ 0.387497] pci 0000:00:03.0: vgaarb: setting as boot VGA device [ 0.388389] pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none [ 0.389479] pci 0000:00:03.0: vgaarb: bridge control possible [ 0.390324] vgaarb: loaded [ 0.390524] pps_core: LinuxPPS API ver. 1 registered [ 0.391313] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti [ 0.392478] PTP clock support registered [ 0.393112] Registered efivars operations [ 0.393642] PCI: Using ACPI for IRQ routing [ 0.394511] hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 [ 0.395424] hpet0: 8 comparators, 32-bit 62.500000 MHz counter [ 0.400508] clocksource: Switched to clocksource kvm-clock [ 0.408730] VFS: Disk quotas dquot_6.6.0 [ 0.409590] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) [ 0.411314] pnp: PnP ACPI init [ 0.412451] pnp: PnP ACPI: found 5 devices [ 0.419210] clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns [ 0.420570] NET: Registered PF_INET protocol family [ 0.421361] IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) [ 0.422958] tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) [ 0.424232] Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) [ 0.425389] TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) [ 0.426675] TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) [ 0.427793] TCP: Hash tables configured (established 16384 bind 16384) [ 0.428819] UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) [ 0.429799] UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) [ 0.431087] NET: Registered PF_UNIX/PF_LOCAL protocol family [ 0.431920] NET: Registered PF_XDP protocol family [ 0.432626] pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] [ 0.433735] pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] [ 0.434661] pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] [ 0.435678] pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] [ 0.436685] pci_bus 0000:00: resource 8 [mem 0x100000000-0x2000ffffffff window] [ 0.437809] pci 0000:00:00.0: Limiting direct PCI/PCI transfers [ 0.438691] pci 0000:00:01.0: Activating ISA DMA hang workarounds [ 0.439667] PCI: CLS 0 bytes, default 64 [ 0.442540] RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer [ 0.444327] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns [ 0.446466] clocksource: Switched to clocksource tsc [ 0.447855] Initialise system trusted keyrings [ 0.448859] workingset: timestamp_bits=39 max_order=19 bucket_order=0 [ 0.452445] Key type asymmetric registered [ 0.453329] Asymmetric key parser 'x509' registered [ 0.454385] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) [ 0.456524] io scheduler mq-deadline registered [ 0.457656] io scheduler kyber registered [ 0.458572] io scheduler bfq registered [ 0.460320] ioatdma: Intel(R) QuickData Technology Driver 5.00 [ 0.461632] Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled [ 0.463214] 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A [ 0.465596] i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 [ 0.467494] i8042: Warning: Keylock active [ 0.469941] serio: i8042 KBD port at 0x60,0x64 irq 1 [ 0.471021] serio: i8042 AUX port at 0x60,0x64 irq 12 [ 0.472225] rtc_cmos 00:00: RTC can wake from S4 [ 0.474336] rtc_cmos 00:00: registered as rtc0 [ 0.475443] rtc_cmos 00:00: setting system clock to 2025-11-01T00:40:50 UTC (1761957650) [ 0.477387] rtc_cmos 00:00: alarms up to one day, 114 bytes nvram [ 0.478726] intel_pstate: CPU model not supported [ 0.479766] efifb: probing for efifb [ 0.480606] efifb: framebuffer at 0x80000000, using 1876k, total 1875k [ 0.482026] efifb: mode is 800x600x32, linelength=3200, pages=1 [ 0.483250] efifb: scrolling: redraw [ 0.484001] efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 [ 0.486636] Console: switching to colour frame buffer device 100x37 [ 0.489407] fb0: EFI VGA frame buffer device [ 0.492580] pstore: Registered efi as persistent store backend [ 0.494028] NET: Registered PF_INET6 protocol family [ 0.495519] Segment Routing with IPv6 [ 0.496309] In-situ OAM (IOAM) with IPv6 [ 0.497174] NET: Registered PF_PACKET protocol family [ 0.498304] Key type dns_resolver registered [ 0.499622] IPI shorthand broadcast: enabled [ 0.500626] sched_clock: Marking stable (363117225, 137471156)->(590958722, -90370341) [ 0.502465] registered taskstats version 1 [ 0.503347] Loading compiled-in X.509 certificates [ 0.717671] Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: f2055682e6899ad8548fd369019e7b47939b46a0' [ 0.720461] Key type .fscrypt registered [ 0.721495] Key type fscrypt-provisioning registered [ 0.722752] pstore: Using crash dump compression: deflate [ 0.724265] ima: No TPM chip found, activating TPM-bypass! [ 0.725518] ima: Allocated hash algorithm: sha1 [ 0.726817] ima: No architecture policies found [ 0.728063] clk: Disabling unused clocks [ 0.739022] Freeing unused kernel image (initmem) memory: 47496K [ 0.740589] Write protecting the kernel read-only data: 28672k [ 0.742495] Freeing unused kernel image (text/rodata gap) memory: 2040K [ 0.744074] Freeing unused kernel image (rodata/data gap) memory: 604K [ 0.745458] Run /init as init process [ 0.759188] systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) [ 0.765720] systemd[1]: Detected virtualization amazon. [ 0.767005] systemd[1]: Detected architecture x86-64. [ 0.768218] systemd[1]: Running in initrd. [ 0.770842] systemd[1]: No hostname configured, using default hostname. [ 0.772577] systemd[1]: Hostname set to . [ 0.773872] systemd[1]: Initializing machine ID from VM UUID. [ 0.907927] systemd[1]: Queued start job for default target initrd.target. [ 0.910025] systemd[1]: Started systemd-ask-password-console.path. [ 0.912222] systemd[1]: Reached target cryptsetup.target. [ 0.914098] systemd[1]: Reached target paths.target. [ 0.915893] systemd[1]: Reached target slices.target. [ 0.917673] systemd[1]: Reached target swap.target. [ 0.919348] systemd[1]: Reached target timers.target. [ 0.921069] systemd[1]: Listening on iscsid.socket. [ 0.922791] systemd[1]: Listening on iscsiuio.socket. [ 0.924748] systemd[1]: Listening on systemd-journald-audit.socket. [ 0.926845] systemd[1]: Listening on systemd-journald-dev-log.socket. [ 0.928919] systemd[1]: Listening on systemd-journald.socket. [ 0.930976] systemd[1]: Listening on systemd-networkd.socket. [ 0.932963] systemd[1]: Listening on systemd-udevd-control.socket. [ 0.934995] systemd[1]: Listening on systemd-udevd-kernel.socket. [ 0.936893] systemd[1]: Reached target sockets.target. [ 0.939798] systemd[1]: Starting kmod-static-nodes.service... [ 0.942328] systemd[1]: Finished network-cleanup.service. [ 0.945023] systemd[1]: Starting systemd-fsck-usr.service... [ 0.948733] systemd[1]: Starting systemd-journald.service... [ 0.952907] systemd[1]: Starting systemd-modules-load.service... [ 0.957584] systemd[1]: Starting systemd-resolved.service... [ 0.973431] systemd[1]: Starting systemd-vconsole-setup.service... [ 0.977141] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 [ 0.978250] systemd[1]: Finished kmod-static-nodes.service. [ 0.988224] systemd[1]: Finished systemd-fsck-usr.service. [ 0.995650] audit: type=1130 audit(1761957651.020:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 1.002790] systemd[1]: Finished systemd-vconsole-setup.service. [ 1.009563] audit: type=1130 audit(1761957651.034:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 1.020506] systemd[1]: Starting dracut-cmdline-ask.service... [ 1.028590] systemd[1]: Starting systemd-tmpfiles-setup-dev.service... [ 1.034653] systemd[1]: Started systemd-journald.service. [ 1.037904] audit: type=1130 audit(1761957651.062:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 1.056912] audit: type=1130 audit(1761957651.080:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 1.078503] audit: type=1130 audit(1761957651.102:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 1.087641] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. [ 1.098009] audit: type=1130 audit(1761957651.122:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 1.107806] Bridge firewalling registered [ 1.142023] SCSI subsystem initialized [ 1.159235] device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. [ 1.163860] device-mapper: uevent: version 1.0.3 [ 1.166057] device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com [ 1.176803] audit: type=1130 audit(1761957651.200:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 1.195762] audit: type=1130 audit(1761957651.220:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 1.226430] Loading iSCSI transport class v2.0-870. [ 1.246142] iscsi: registered transport (tcp) [ 1.273801] iscsi: registered transport (qla4xxx) [ 1.275127] QLogic iSCSI HBA Driver [ 1.311512] audit: type=1130 audit(1761957651.334:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 1.367475] raid6: avx512x4 gen() 16983 MB/s [ 1.385478] raid6: avx512x4 xor() 7231 MB/s [ 1.403475] raid6: avx512x2 gen() 17408 MB/s [ 1.421475] raid6: avx512x2 xor() 21635 MB/s [ 1.439476] raid6: avx512x1 gen() 17107 MB/s [ 1.457475] raid6: avx512x1 xor() 21916 MB/s [ 1.475476] raid6: avx2x4 gen() 17604 MB/s [ 1.493476] raid6: avx2x4 xor() 7209 MB/s [ 1.511475] raid6: avx2x2 gen() 17625 MB/s [ 1.529476] raid6: avx2x2 xor() 18030 MB/s [ 1.547476] raid6: avx2x1 gen() 13609 MB/s [ 1.565476] raid6: avx2x1 xor() 15753 MB/s [ 1.583478] raid6: sse2x4 gen() 9493 MB/s [ 1.601476] raid6: sse2x4 xor() 5867 MB/s [ 1.619478] raid6: sse2x2 gen() 10519 MB/s [ 1.637475] raid6: sse2x2 xor() 6109 MB/s [ 1.655482] raid6: sse2x1 gen() 8604 MB/s [ 1.673476] raid6: sse2x1 xor() 4611 MB/s [ 1.674588] raid6: using algorithm avx2x2 gen() 17625 MB/s [ 1.675772] raid6: .... xor() 18030 MB/s, rmw enabled [ 1.676923] raid6: using avx512x2 recovery algorithm [ 1.689852] xor: automatically using best checksumming function avx [ 1.793492] Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no [ 1.986546] cryptd: max_cpu_qlen set to 1000 [ 2.005236] ena 0000:00:05.0: ENA device version: 0.10 [ 2.006862] ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 [ 2.009411] nvme nvme0: pci function 0000:00:04.0 [ 2.011505] ACPI: \_SB_.LNKD: Enabled at IRQ 11 [ 2.022835] nvme nvme0: 2/0/0 default/read/poll queues [ 2.023653] ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. [ 2.028096] GPT:Primary header thinks Alt. header is not at the end of the disk. [ 2.030335] GPT:9289727 != 33554431 [ 2.031825] GPT:Alternate GPT header not at the end of the disk. [ 2.033825] GPT:9289727 != 33554431 [ 2.033828] GPT: Use GNU Parted to correct GPT errors. [ 2.033840] nvme0n1: p1 p2 p3 p4 p6 p7 p9 [ 2.037327] ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80400000, mac addr 06:eb:5e:a7:b5:3b [ 2.045779] AVX2 version of gcm_enc/dec engaged. [ 2.045829] AES CTR mode by8 optimization enabled [ 2.104251] BTRFS: device label OEM devid 1 transid 9 /dev/nvme0n1p6 scanned by (udev-worker) (439) [ 2.202542] nvme0n1: p1 p2 p3 p4 p6 p7 p9 [ 2.208363] nvme0n1: p1 p2 p3 p4 p6 p7 p9 [ 2.215110] nvme0n1: p1 p2 p3 p4 p6 p7 p9 [ 3.216715] nvme0n1: p1 p2 p3 p4 p6 p7 p9 [ 3.391084] device-mapper: verity: sha256 using implementation "sha256-avx2" [ 3.614513] EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. [ 3.647874] BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm [ 3.649741] BTRFS info (device nvme0n1p6): using free space tree [ 3.651374] BTRFS info (device nvme0n1p6): has skinny extents [ 3.663223] BTRFS info (device nvme0n1p6): enabling ssd optimizations [ 4.542455] EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. [ 4.601878] BTRFS: device label OEM devid 1 transid 11 /dev/nvme0n1p6 scanned by mount (1168) [ 4.605436] BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm [ 4.612611] BTRFS info (device nvme0n1p6): using free space tree [ 4.614727] BTRFS info (device nvme0n1p6): has skinny extents [ 4.631965] BTRFS info (device nvme0n1p6): enabling ssd optimizations [ 4.892822] BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by mount (1243) [ 4.895364] BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm [ 4.897262] BTRFS info (device nvme0n1p6): using free space tree [ 4.899037] BTRFS info (device nvme0n1p6): has skinny extents [ 4.907926] BTRFS info (device nvme0n1p6): enabling ssd optimizations [ 5.763628] kauditd_printk_skb: 25 callbacks suppressed [ 5.763632] audit: type=1130 audit(1761957655.788:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 5.785318] audit: type=1130 audit(1761957655.809:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 5.785345] audit: type=1131 audit(1761957655.809:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 5.802691] audit: type=1130 audit(1761957655.827:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 5.835993] audit: type=1130 audit(1761957655.860:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 5.835998] audit: type=1131 audit(1761957655.860:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 5.866787] audit: type=1130 audit(1761957655.891:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 5.891170] audit: type=1131 audit(1761957655.915:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 5.910733] audit: type=1131 audit(1761957655.935:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 5.917859] audit: type=1131 audit(1761957655.942:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 6.104693] systemd-journald[185]: Received SIGTERM from PID 1 (systemd). [ 6.603355] SELinux: Class mctp_socket not defined in policy. [ 6.604746] SELinux: Class anon_inode not defined in policy. [ 6.606072] SELinux: the above unknown classes and permissions will be allowed [ 6.609395] SELinux: policy capability network_peer_controls=1 [ 6.610788] SELinux: policy capability open_perms=1 [ 6.611970] SELinux: policy capability extended_socket_class=1 [ 6.613262] SELinux: policy capability always_check_network=0 [ 6.614534] SELinux: policy capability cgroup_seclabel=1 [ 6.615749] SELinux: policy capability nnp_nosuid_transition=1 [ 6.617021] SELinux: policy capability genfs_seclabel_symlinks=0 [ 6.618315] SELinux: policy capability ioctl_skip_cloexec=0 [ 6.642840] systemd[1]: Successfully loaded SELinux policy in 82.881ms. [ 6.716416] systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.642ms. [ 6.721993] systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) [ 6.728999] systemd[1]: Detected virtualization amazon. [ 6.730309] systemd[1]: Detected architecture x86-64. [ 6.731784] systemd[1]: Detected first boot. [ 6.740201] systemd[1]: Initializing machine ID from VM UUID. [ 6.970545] SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). [ 10.636769] systemd[1]: Populated /etc with preset unit settings. [ 10.857374] systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. [ 10.872295] systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. [ 11.009073] systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. [ 11.158287] kauditd_printk_skb: 49 callbacks suppressed [ 11.158291] audit: type=1334 audit(1761957661.182:88): prog-id=12 op=LOAD [ 11.166899] audit: type=1334 audit(1761957661.182:89): prog-id=3 op=UNLOAD [ 11.172429] audit: type=1334 audit(1761957661.185:90): prog-id=13 op=LOAD [ 11.179812] audit: type=1334 audit(1761957661.191:91): prog-id=14 op=LOAD [ 11.187926] audit: type=1334 audit(1761957661.191:92): prog-id=4 op=UNLOAD [ 11.194572] audit: type=1334 audit(1761957661.191:93): prog-id=5 op=UNLOAD [ 11.203225] audit: type=1334 audit(1761957661.196:94): prog-id=15 op=LOAD [ 11.209107] audit: type=1334 audit(1761957661.196:95): prog-id=12 op=UNLOAD [ 11.209638] systemd[1]: initrd-switch-root.service: Deactivated successfully. [ 11.216081] audit: type=1334 audit(1761957661.204:96): prog-id=16 op=LOAD [ 11.222013] systemd[1]: Stopped initrd-switch-root.service. [ 11.224333] audit: type=1334 audit(1761957661.212:97): prog-id=17 op=LOAD [ 11.253930] systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. [ 11.260128] systemd[1]: Created slice system-addon\x2dconfig.slice. [ 11.270927] systemd[1]: Created slice system-addon\x2drun.slice. [ 11.276148] systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. [ 11.284851] systemd[1]: Created slice system-getty.slice. [ 11.291711] systemd[1]: Created slice system-modprobe.slice. [ 11.296744] systemd[1]: Created slice system-serial\x2dgetty.slice. [ 11.305315] systemd[1]: Created slice system-system\x2dcloudinit.slice. [ 11.314046] systemd[1]: Created slice system-systemd\x2dfsck.slice. [ 11.321217] systemd[1]: Created slice user.slice. [ 11.326700] systemd[1]: Started systemd-ask-password-console.path. [ 11.336052] systemd[1]: Started systemd-ask-password-wall.path. [ 11.345581] systemd[1]: Set up automount boot.automount. [ 11.357184] systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. [ 11.363082] systemd[1]: Stopped target initrd-switch-root.target. [ 11.372815] systemd[1]: Stopped target initrd-fs.target. [ 11.378225] systemd[1]: Stopped target initrd-root-fs.target. [ 11.386881] systemd[1]: Reached target integritysetup.target. [ 11.399091] systemd[1]: Reached target remote-cryptsetup.target. [ 11.405589] systemd[1]: Reached target remote-fs.target. [ 11.409634] systemd[1]: Reached target slices.target. [ 11.422523] systemd[1]: Reached target swap.target. [ 11.434043] systemd[1]: Reached target torcx.target. [ 11.444979] systemd[1]: Reached target veritysetup.target. [ 11.459792] systemd[1]: Listening on systemd-coredump.socket. [ 11.475713] systemd[1]: Listening on systemd-initctl.socket. [ 11.487075] systemd[1]: Listening on systemd-networkd.socket. [ 11.492345] systemd[1]: Listening on systemd-udevd-control.socket. [ 11.498640] systemd[1]: Listening on systemd-udevd-kernel.socket. [ 11.504582] systemd[1]: Listening on systemd-userdbd.socket. [ 11.523063] systemd[1]: Mounting dev-hugepages.mount... [ 11.535852] systemd[1]: Mounting dev-mqueue.mount... [ 11.552524] systemd[1]: Mounting media.mount... [ 11.563604] systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). [ 11.589713] systemd[1]: Mounting sys-kernel-debug.mount... [ 11.611331] systemd[1]: Mounting sys-kernel-tracing.mount... [ 11.629688] systemd[1]: Mounting tmp.mount... [ 11.650726] systemd[1]: Starting flatcar-tmpfiles.service... [ 11.656980] systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. [ 11.671038] systemd[1]: Starting kmod-static-nodes.service... [ 11.679272] systemd[1]: Starting modprobe@configfs.service... [ 11.691174] systemd[1]: Starting modprobe@dm_mod.service... [ 11.701156] systemd[1]: Starting modprobe@drm.service... [ 11.715201] systemd[1]: Starting modprobe@efi_pstore.service... [ 11.727636] systemd[1]: Starting modprobe@fuse.service... [ 11.737199] systemd[1]: Starting modprobe@loop.service... [ 11.748308] systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). [ 11.763644] systemd[1]: systemd-fsck-root.service: Deactivated successfully. [ 11.772207] systemd[1]: Stopped systemd-fsck-root.service. [ 11.779613] systemd[1]: systemd-fsck-usr.service: Deactivated successfully. [ 11.786190] systemd[1]: Stopped systemd-fsck-usr.service. [ 11.795424] systemd[1]: Stopped systemd-journald.service. [ 11.809832] systemd[1]: Starting systemd-journald.service... [ 11.830998] loop: module loaded [ 11.835987] systemd[1]: Starting systemd-modules-load.service... [ 11.847710] systemd[1]: Starting systemd-network-generator.service... [ 11.869306] systemd[1]: Starting systemd-remount-fs.service... [ 11.885884] systemd[1]: Starting systemd-udev-trigger.service... [ 11.898698] systemd[1]: verity-setup.service: Deactivated successfully. [ 11.903785] systemd[1]: Stopped verity-setup.service. [ 11.912220] systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). [ 11.942221] systemd[1]: Mounted dev-hugepages.mount. [ 11.954854] systemd[1]: Mounted dev-mqueue.mount. [ 11.959895] systemd[1]: Mounted media.mount. [ 11.967773] fuse: init (API version 7.34) [ 11.968099] systemd[1]: Mounted sys-kernel-debug.mount. [ 11.983216] systemd[1]: Mounted sys-kernel-tracing.mount. [ 11.991093] systemd[1]: Mounted tmp.mount. [ 11.995991] systemd[1]: Finished kmod-static-nodes.service. [ 12.008870] systemd[1]: modprobe@configfs.service: Deactivated successfully. [ 12.029828] systemd[1]: Finished modprobe@configfs.service. [ 12.033558] systemd[1]: Started systemd-journald.service. [ 12.175745] systemd-journald[1416]: Received client request to flush runtime journal. [ 13.626406] input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 [ 13.636531] ACPI: button: Power Button [PWRF] [ 13.639617] input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 [ 13.649009] ACPI: button: Sleep Button [SLPF] [ 13.665854] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 13.714142] piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr [ 13.747429] input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 [ 13.766159] mousedev: PS/2 mouse device common for all mice [ 14.080966] loop0: detected capacity change from 0 to 229808 [ 14.204268] squashfs: version 4.0 (2009/01/31) Phillip Lougher [ 14.247460] loop1: detected capacity change from 0 to 229808 [ 15.665499] EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 3587067 blocks [ 15.794568] EXT4-fs (nvme0n1p9): resized filesystem to 3587067 2025/11/01 00:41:06Z: Amazon SSM Agent v2.3.1319.0 is running 2025/11/01 00:41:06Z: OsProductName: Flatcar Container Linux by Kinvolk 2025/11/01 00:41:06Z: OsVersion: 3510.3.8 This is ip-172-31-31-166 (Linux x86_64 5.15.192-flatcar) 00:41:09 SSH host key: SHA256:DMbZBKvfRtGgl9CYNWyrm2yGWEUp0cCR9k1+39eRgzk (ED25519) SSH host key: SHA256:9raaBTggEObGj0cLvB1HH3+EQ363786zbYjCI430PXg (RSA) SSH host key: SHA256:7cmKNyBgurcWVb/FPPgDFVdPxusdhXbYwcT6suRtNvU (ECDSA) eth0: 172.31.31.166 fe80::4eb:5eff:fea7:b53b ip-172-31-31-166 login: [ 27.205796] kauditd_printk_skb: 230 callbacks suppressed [ 27.205800] audit: type=1305 audit(1761957677.486:211): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 [ 27.209083] audit: type=1300 audit(1761957677.486:211): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff7a3c0e50 a2=420 a3=0 items=0 ppid=1 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) [ 27.213900] audit: type=1327 audit(1761957677.486:211): proctitle=2F7362696E2F617564697463746C002D44 [ 27.216400] audit: type=1131 audit(1761957677.496:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 27.246851] audit: type=1130 audit(1761957677.526:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 27.250905] audit: type=1106 audit(1761957677.527:214): pid=1972 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 27.254836] audit: type=1104 audit(1761957677.528:215): pid=1972 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 27.272782] audit: type=1106 audit(1761957677.553:216): pid=1969 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 27.279759] audit: type=1104 audit(1761957677.553:217): pid=1969 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 27.283619] audit: type=1131 audit(1761957677.553:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.31.166:22-147.75.109.163:55830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 33.395739] kauditd_printk_skb: 276 callbacks suppressed [ 33.395742] audit: type=1400 audit(1761957683.717:460): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 33.406682] audit: type=1400 audit(1761957683.717:461): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 33.416273] audit: type=1400 audit(1761957683.717:462): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 33.431580] audit: audit_backlog=65 > audit_backlog_limit=64 [ 33.433562] audit: type=1400 audit(1761957683.717:463): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 33.433965] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 33.440757] audit: type=1400 audit(1761957683.717:464): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 33.442843] audit: backlog limit exceeded [ 33.450018] audit: audit_backlog=65 > audit_backlog_limit=64 [ 33.452482] audit: type=1400 audit(1761957683.717:465): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 40.119413] kauditd_printk_skb: 368 callbacks suppressed [ 40.119416] audit: type=1325 audit(1761957690.459:556): table=filter:65 family=2 entries=14 op=nft_register_rule pid=2546 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 40.128836] audit: type=1300 audit(1761957690.459:556): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fffaa41d650 a2=0 a3=7fffaa41d63c items=0 ppid=2295 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 40.140174] audit: type=1327 audit(1761957690.459:556): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 40.158990] audit: type=1325 audit(1761957690.498:557): table=nat:66 family=2 entries=56 op=nft_register_chain pid=2546 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 40.165826] audit: type=1300 audit(1761957690.498:557): arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fffaa41d650 a2=0 a3=7fffaa41d63c items=0 ppid=2295 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 40.177830] audit: type=1327 audit(1761957690.498:557): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 40.991386] audit: type=1400 audit(1761957691.332:558): avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 40.998240] audit: type=1300 audit(1761957691.332:558): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f355957f928 items=0 ppid=2204 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 41.007877] audit: type=1327 audit(1761957691.332:558): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239663237343331643865303962303764333261303661653136383165 [ 41.015015] audit: type=1400 audit(1761957691.332:559): avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 45.677197] kauditd_printk_skb: 40 callbacks suppressed [ 45.677199] audit: type=1131 audit(1761957696.023:565): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 45.703316] audit: type=1334 audit(1761957696.050:566): prog-id=54 op=UNLOAD [ 45.706596] audit: type=1334 audit(1761957696.050:567): prog-id=53 op=UNLOAD [ 45.710118] audit: type=1334 audit(1761957696.050:568): prog-id=52 op=UNLOAD [ 49.160864] audit: type=1400 audit(1761957699.510:569): avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 49.167472] audit: type=1300 audit(1761957699.510:569): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f79d611ede8 items=0 ppid=2204 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 49.177782] audit: type=1327 audit(1761957699.510:569): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238343337343165666231656662363063306234356637613862333363 [ 49.185234] audit: type=1400 audit(1761957699.510:570): avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 49.191862] audit: type=1400 audit(1761957699.510:570): avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 49.198878] audit: type=1400 audit(1761957699.510:570): avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 49.349887] wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. [ 49.351831] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. [ 50.816260] kauditd_printk_skb: 37 callbacks suppressed [ 50.816264] audit: type=1400 audit(1761957701.167:575): avc: denied { write } for pid=2851 comm="tee" name="fd" dev="proc" ino=19337 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 [ 50.845739] audit: type=1400 audit(1761957701.185:576): avc: denied { write } for pid=2860 comm="tee" name="fd" dev="proc" ino=20189 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 [ 50.855713] audit: type=1300 audit(1761957701.185:576): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff08f0a7de a2=241 a3=1b6 items=1 ppid=2829 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) [ 50.867623] audit: type=1307 audit(1761957701.185:576): cwd="/etc/service/enabled/felix/log" [ 50.872745] audit: type=1302 audit(1761957701.185:576): item=0 name="/dev/fd/63" inode=20179 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 [ 50.883450] audit: type=1327 audit(1761957701.185:576): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 [ 50.894574] audit: type=1400 audit(1761957701.185:577): avc: denied { write } for pid=2855 comm="tee" name="fd" dev="proc" ino=20193 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 [ 50.902658] audit: type=1300 audit(1761957701.185:577): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd63cb27e0 a2=241 a3=1b6 items=1 ppid=2830 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) [ 50.913965] audit: type=1307 audit(1761957701.185:577): cwd="/etc/service/enabled/cni/log" [ 50.917004] audit: type=1302 audit(1761957701.185:577): item=0 name="/dev/fd/63" inode=20171 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 This is ip-172-31-31-166 (Linux x86_64 5.15.192-flatcar) 00:41:42 SSH host key: SHA256:DMbZBKvfRtGgl9CYNWyrm2yGWEUp0cCR9k1+39eRgzk (ED25519) SSH host key: SHA256:9raaBTggEObGj0cLvB1HH3+EQ363786zbYjCI430PXg (RSA) SSH host key: SHA256:7cmKNyBgurcWVb/FPPgDFVdPxusdhXbYwcT6suRtNvU (ECDSA) eth0: 172.31.31.166 fe80::4eb:5eff:fea7:b53b ip-172-31-31-166 login: This is ip-172-31-31-166 (Linux x86_64 5.15.192-flatcar) 00:41:44 SSH host key: SHA256:DMbZBKvfRtGgl9CYNWyrm2yGWEUp0cCR9k1+39eRgzk (ED25519) SSH host key: SHA256:9raaBTggEObGj0cLvB1HH3+EQ363786zbYjCI430PXg (RSA) SSH host key: SHA256:7cmKNyBgurcWVb/FPPgDFVdPxusdhXbYwcT6suRtNvU (ECDSA) eth0: 172.31.31.166 fe80::4eb:5eff:fea7:b53b ip-172-31-31-166 login: [ 58.265040] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 58.267272] IPv6: ADDRCONF(NETDEV_CHANGE): cali2d0622f4fc6: link becomes ready [ 58.380602] kauditd_printk_skb: 547 callbacks suppressed [ 58.380605] audit: type=1400 audit(1761957708.734:684): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 58.388789] audit: type=1400 audit(1761957708.734:685): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 58.394557] audit: type=1400 audit(1761957708.734:686): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 58.400797] audit: type=1400 audit(1761957708.734:687): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 58.406633] audit: type=1400 audit(1761957708.734:688): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 58.412481] audit: type=1400 audit(1761957708.734:689): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 58.418337] audit: type=1400 audit(1761957708.734:690): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 58.423973] audit: type=1400 audit(1761957708.734:691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 58.431363] audit: type=1400 audit(1761957708.734:692): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 58.439021] audit: type=1400 audit(1761957708.735:693): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 60.031750] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 60.034156] IPv6: ADDRCONF(NETDEV_CHANGE): cali703d275a96a: link becomes ready This is ip-172-31-31-166 (Linux x86_64 5.15.192-flatcar) 00:41:51 SSH host key: SHA256:DMbZBKvfRtGgl9CYNWyrm2yGWEUp0cCR9k1+39eRgzk (ED25519) SSH host key: SHA256:9raaBTggEObGj0cLvB1HH3+EQ363786zbYjCI430PXg (RSA) SSH host key: SHA256:7cmKNyBgurcWVb/FPPgDFVdPxusdhXbYwcT6suRtNvU (ECDSA) eth0: 172.31.31.166 fe80::4eb:5eff:fea7:b53b ip-172-31-31-166 login: This is ip-172-31-31-166 (Linux x86_64 5.15.192-flatcar) 00:41:53 SSH host key: SHA256:DMbZBKvfRtGgl9CYNWyrm2yGWEUp0cCR9k1+39eRgzk (ED25519) SSH host key: SHA256:9raaBTggEObGj0cLvB1HH3+EQ363786zbYjCI430PXg (RSA) SSH host key: SHA256:7cmKNyBgurcWVb/FPPgDFVdPxusdhXbYwcT6suRtNvU (ECDSA) eth0: 172.31.31.166 fe80::4eb:5eff:fea7:b53b ip-172-31-31-166 login: [ 64.751200] kauditd_printk_skb: 110 callbacks suppressed [ 64.751203] audit: type=1400 audit(1761957715.108:722): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 64.755935] audit: type=1400 audit(1761957715.108:723): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 64.759597] audit: type=1400 audit(1761957715.108:724): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 64.764629] audit: type=1400 audit(1761957715.108:725): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 64.768689] audit: type=1400 audit(1761957715.108:726): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 64.772523] audit: type=1400 audit(1761957715.108:727): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 64.776002] audit: type=1400 audit(1761957715.108:728): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 64.779863] audit: type=1400 audit(1761957715.108:729): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 64.783595] audit: type=1400 audit(1761957715.108:730): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 64.786857] audit: type=1400 audit(1761957715.113:731): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 69.887652] kauditd_printk_skb: 47 callbacks suppressed [ 69.887656] audit: type=1325 audit(1761957720.244:740): table=filter:73 family=2 entries=26 op=nft_register_rule pid=3448 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 69.895757] audit: type=1300 audit(1761957720.244:740): arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffe9c4eb150 a2=0 a3=7ffe9c4eb13c items=0 ppid=2295 pid=3448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 69.912603] audit: type=1327 audit(1761957720.244:740): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 69.919146] audit: type=1325 audit(1761957720.273:741): table=nat:74 family=2 entries=20 op=nft_register_rule pid=3448 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 69.924276] audit: type=1300 audit(1761957720.273:741): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe9c4eb150 a2=0 a3=0 items=0 ppid=2295 pid=3448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 69.943135] audit: type=1327 audit(1761957720.273:741): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 69.970842] audit: type=1325 audit(1761957720.329:742): table=filter:75 family=2 entries=38 op=nft_register_rule pid=3450 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 69.976617] audit: type=1300 audit(1761957720.329:742): arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffca8ec52d0 a2=0 a3=7ffca8ec52bc items=0 ppid=2295 pid=3450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 69.989979] audit: type=1327 audit(1761957720.329:742): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 69.995996] audit: type=1325 audit(1761957720.337:743): table=nat:76 family=2 entries=20 op=nft_register_rule pid=3450 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 70.486084] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 70.488574] IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready This is ip-172-31-31-166 (Linux x86_64 5.15.192-flatcar) 00:42:03 SSH host key: SHA256:DMbZBKvfRtGgl9CYNWyrm2yGWEUp0cCR9k1+39eRgzk (ED25519) SSH host key: SHA256:9raaBTggEObGj0cLvB1HH3+EQ363786zbYjCI430PXg (RSA) SSH host key: SHA256:7cmKNyBgurcWVb/FPPgDFVdPxusdhXbYwcT6suRtNvU (ECDSA) eth0: 172.31.31.166 fe80::4eb:5eff:fea7:b53b ip-172-31-31-166 login: [ 78.197139] kauditd_printk_skb: 62 callbacks suppressed [ 78.197142] audit: type=1400 audit(1761957728.557:763): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.202018] audit: type=1400 audit(1761957728.557:764): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.206426] audit: type=1400 audit(1761957728.557:765): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.210998] audit: type=1400 audit(1761957728.557:766): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.216785] audit: type=1400 audit(1761957728.557:767): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.221913] audit: type=1400 audit(1761957728.557:768): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.227349] audit: type=1400 audit(1761957728.557:769): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.232755] audit: type=1400 audit(1761957728.557:770): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.238290] audit: type=1400 audit(1761957728.557:771): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.244136] audit: type=1400 audit(1761957728.558:772): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0