Sep 5 09:49:47.009941 kernel: microcode: updated early: 0xf4 -> 0xfc, date = 2023-07-27 Sep 5 09:49:47.009955 kernel: Linux version 6.6.48-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 13.3.1_p20240614 p17) 13.3.1 20240614, GNU ld (Gentoo 2.42 p3) 2.42.0) #1 SMP PREEMPT_DYNAMIC Wed Sep 4 15:54:07 -00 2024 Sep 5 09:49:47.009961 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=ceda2dd706627da8006bcd6ae77ea155b2a7de6732e2c1c7ab4bed271400663d Sep 5 09:49:47.009967 kernel: BIOS-provided physical RAM map: Sep 5 09:49:47.009971 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Sep 5 09:49:47.009974 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Sep 5 09:49:47.009979 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Sep 5 09:49:47.009983 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Sep 5 09:49:47.009988 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Sep 5 09:49:47.009992 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000081b27fff] usable Sep 5 09:49:47.009996 kernel: BIOS-e820: [mem 0x0000000081b28000-0x0000000081b28fff] ACPI NVS Sep 5 09:49:47.010001 kernel: BIOS-e820: [mem 0x0000000081b29000-0x0000000081b29fff] reserved Sep 5 09:49:47.010005 kernel: BIOS-e820: [mem 0x0000000081b2a000-0x000000008afccfff] usable Sep 5 09:49:47.010009 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Sep 5 09:49:47.010014 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Sep 5 09:49:47.010019 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Sep 5 09:49:47.010025 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Sep 5 09:49:47.010030 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Sep 5 09:49:47.010034 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Sep 5 09:49:47.010039 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Sep 5 09:49:47.010044 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Sep 5 09:49:47.010048 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Sep 5 09:49:47.010053 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Sep 5 09:49:47.010058 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Sep 5 09:49:47.010062 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Sep 5 09:49:47.010067 kernel: NX (Execute Disable) protection: active Sep 5 09:49:47.010072 kernel: APIC: Static calls initialized Sep 5 09:49:47.010077 kernel: SMBIOS 3.2.1 present. Sep 5 09:49:47.010082 kernel: DMI: Supermicro SYS-5019C-MR-PH004/X11SCM-F, BIOS 1.9 09/16/2022 Sep 5 09:49:47.010087 kernel: tsc: Detected 3400.000 MHz processor Sep 5 09:49:47.010092 kernel: tsc: Detected 3399.906 MHz TSC Sep 5 09:49:47.010097 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Sep 5 09:49:47.010102 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Sep 5 09:49:47.010107 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Sep 5 09:49:47.010112 kernel: MTRR map: 4 entries (3 fixed + 1 variable; max 23), built from 10 variable MTRRs Sep 5 09:49:47.010117 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Sep 5 09:49:47.010121 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Sep 5 09:49:47.010126 kernel: Using GB pages for direct mapping Sep 5 09:49:47.010132 kernel: ACPI: Early table checksum verification disabled Sep 5 09:49:47.010137 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Sep 5 09:49:47.010144 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Sep 5 09:49:47.010149 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Sep 5 09:49:47.010154 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Sep 5 09:49:47.010159 kernel: ACPI: FACS 0x000000008C66CF80 000040 Sep 5 09:49:47.010165 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Sep 5 09:49:47.010170 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Sep 5 09:49:47.010176 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Sep 5 09:49:47.010181 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Sep 5 09:49:47.010186 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Sep 5 09:49:47.010191 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Sep 5 09:49:47.010196 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Sep 5 09:49:47.010202 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Sep 5 09:49:47.010207 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Sep 5 09:49:47.010212 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Sep 5 09:49:47.010217 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Sep 5 09:49:47.010222 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Sep 5 09:49:47.010227 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Sep 5 09:49:47.010232 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Sep 5 09:49:47.010237 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Sep 5 09:49:47.010242 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Sep 5 09:49:47.010248 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Sep 5 09:49:47.010253 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Sep 5 09:49:47.010258 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Sep 5 09:49:47.010264 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Sep 5 09:49:47.010269 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Sep 5 09:49:47.010274 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Sep 5 09:49:47.010279 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Sep 5 09:49:47.010286 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Sep 5 09:49:47.010293 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Sep 5 09:49:47.010298 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Sep 5 09:49:47.010303 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Sep 5 09:49:47.010308 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Sep 5 09:49:47.010313 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Sep 5 09:49:47.010318 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Sep 5 09:49:47.010323 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Sep 5 09:49:47.010328 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Sep 5 09:49:47.010333 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Sep 5 09:49:47.010340 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Sep 5 09:49:47.010345 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Sep 5 09:49:47.010350 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Sep 5 09:49:47.010355 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Sep 5 09:49:47.010360 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Sep 5 09:49:47.010365 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Sep 5 09:49:47.010370 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Sep 5 09:49:47.010375 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Sep 5 09:49:47.010380 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Sep 5 09:49:47.010386 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Sep 5 09:49:47.010391 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Sep 5 09:49:47.010396 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Sep 5 09:49:47.010401 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Sep 5 09:49:47.010406 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Sep 5 09:49:47.010411 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Sep 5 09:49:47.010416 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Sep 5 09:49:47.010421 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Sep 5 09:49:47.010426 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Sep 5 09:49:47.010431 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Sep 5 09:49:47.010437 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Sep 5 09:49:47.010442 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Sep 5 09:49:47.010447 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Sep 5 09:49:47.010452 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Sep 5 09:49:47.010457 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Sep 5 09:49:47.010462 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Sep 5 09:49:47.010467 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Sep 5 09:49:47.010472 kernel: No NUMA configuration found Sep 5 09:49:47.010478 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Sep 5 09:49:47.010483 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Sep 5 09:49:47.010489 kernel: Zone ranges: Sep 5 09:49:47.010494 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Sep 5 09:49:47.010499 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Sep 5 09:49:47.010504 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Sep 5 09:49:47.010509 kernel: Movable zone start for each node Sep 5 09:49:47.010514 kernel: Early memory node ranges Sep 5 09:49:47.010519 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Sep 5 09:49:47.010524 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Sep 5 09:49:47.010529 kernel: node 0: [mem 0x0000000040400000-0x0000000081b27fff] Sep 5 09:49:47.010535 kernel: node 0: [mem 0x0000000081b2a000-0x000000008afccfff] Sep 5 09:49:47.010540 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Sep 5 09:49:47.010545 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Sep 5 09:49:47.010554 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Sep 5 09:49:47.010560 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Sep 5 09:49:47.010565 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Sep 5 09:49:47.010571 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Sep 5 09:49:47.010577 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Sep 5 09:49:47.010582 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Sep 5 09:49:47.010588 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Sep 5 09:49:47.010593 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Sep 5 09:49:47.010599 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Sep 5 09:49:47.010604 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Sep 5 09:49:47.010610 kernel: ACPI: PM-Timer IO Port: 0x1808 Sep 5 09:49:47.010615 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Sep 5 09:49:47.010621 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Sep 5 09:49:47.010627 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Sep 5 09:49:47.010632 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Sep 5 09:49:47.010638 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Sep 5 09:49:47.010643 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Sep 5 09:49:47.010648 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Sep 5 09:49:47.010654 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Sep 5 09:49:47.010659 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Sep 5 09:49:47.010664 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Sep 5 09:49:47.010670 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Sep 5 09:49:47.010675 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Sep 5 09:49:47.010682 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Sep 5 09:49:47.010687 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Sep 5 09:49:47.010692 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Sep 5 09:49:47.010698 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Sep 5 09:49:47.010703 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Sep 5 09:49:47.010708 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Sep 5 09:49:47.010714 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Sep 5 09:49:47.010719 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Sep 5 09:49:47.010725 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Sep 5 09:49:47.010731 kernel: TSC deadline timer available Sep 5 09:49:47.010737 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Sep 5 09:49:47.010742 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Sep 5 09:49:47.010747 kernel: Booting paravirtualized kernel on bare hardware Sep 5 09:49:47.010753 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Sep 5 09:49:47.010758 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:16 nr_cpu_ids:16 nr_node_ids:1 Sep 5 09:49:47.010764 kernel: percpu: Embedded 58 pages/cpu s196904 r8192 d32472 u262144 Sep 5 09:49:47.010769 kernel: pcpu-alloc: s196904 r8192 d32472 u262144 alloc=1*2097152 Sep 5 09:49:47.010775 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Sep 5 09:49:47.010781 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=ceda2dd706627da8006bcd6ae77ea155b2a7de6732e2c1c7ab4bed271400663d Sep 5 09:49:47.010787 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 5 09:49:47.010792 kernel: random: crng init done Sep 5 09:49:47.010798 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Sep 5 09:49:47.010803 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Sep 5 09:49:47.010809 kernel: Fallback order for Node 0: 0 Sep 5 09:49:47.010814 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Sep 5 09:49:47.010819 kernel: Policy zone: Normal Sep 5 09:49:47.010826 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 5 09:49:47.010831 kernel: software IO TLB: area num 16. Sep 5 09:49:47.010837 kernel: Memory: 32720316K/33452980K available (12288K kernel code, 2304K rwdata, 22708K rodata, 42704K init, 2488K bss, 732404K reserved, 0K cma-reserved) Sep 5 09:49:47.010843 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Sep 5 09:49:47.010848 kernel: ftrace: allocating 37748 entries in 148 pages Sep 5 09:49:47.010854 kernel: ftrace: allocated 148 pages with 3 groups Sep 5 09:49:47.010859 kernel: Dynamic Preempt: voluntary Sep 5 09:49:47.010865 kernel: rcu: Preemptible hierarchical RCU implementation. Sep 5 09:49:47.010871 kernel: rcu: RCU event tracing is enabled. Sep 5 09:49:47.010877 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Sep 5 09:49:47.010883 kernel: Trampoline variant of Tasks RCU enabled. Sep 5 09:49:47.010888 kernel: Rude variant of Tasks RCU enabled. Sep 5 09:49:47.010894 kernel: Tracing variant of Tasks RCU enabled. Sep 5 09:49:47.010899 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 5 09:49:47.010904 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Sep 5 09:49:47.010910 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Sep 5 09:49:47.010915 kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Sep 5 09:49:47.010921 kernel: Console: colour dummy device 80x25 Sep 5 09:49:47.010927 kernel: printk: console [tty0] enabled Sep 5 09:49:47.010932 kernel: printk: console [ttyS1] enabled Sep 5 09:49:47.010938 kernel: ACPI: Core revision 20230628 Sep 5 09:49:47.010943 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Sep 5 09:49:47.010949 kernel: APIC: Switch to symmetric I/O mode setup Sep 5 09:49:47.010954 kernel: DMAR: Host address width 39 Sep 5 09:49:47.010959 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Sep 5 09:49:47.010965 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Sep 5 09:49:47.010970 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Sep 5 09:49:47.010977 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Sep 5 09:49:47.010982 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Sep 5 09:49:47.010988 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Sep 5 09:49:47.010993 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Sep 5 09:49:47.010998 kernel: x2apic enabled Sep 5 09:49:47.011004 kernel: APIC: Switched APIC routing to: cluster x2apic Sep 5 09:49:47.011009 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Sep 5 09:49:47.011015 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Sep 5 09:49:47.011020 kernel: CPU0: Thermal monitoring enabled (TM1) Sep 5 09:49:47.011027 kernel: process: using mwait in idle threads Sep 5 09:49:47.011032 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Sep 5 09:49:47.011037 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Sep 5 09:49:47.011043 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Sep 5 09:49:47.011048 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Sep 5 09:49:47.011054 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Sep 5 09:49:47.011059 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Sep 5 09:49:47.011064 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Sep 5 09:49:47.011070 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Sep 5 09:49:47.011075 kernel: RETBleed: Mitigation: Enhanced IBRS Sep 5 09:49:47.011080 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Sep 5 09:49:47.011087 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Sep 5 09:49:47.011092 kernel: TAA: Mitigation: TSX disabled Sep 5 09:49:47.011097 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Sep 5 09:49:47.011103 kernel: SRBDS: Mitigation: Microcode Sep 5 09:49:47.011108 kernel: GDS: Mitigation: Microcode Sep 5 09:49:47.011113 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Sep 5 09:49:47.011119 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Sep 5 09:49:47.011124 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Sep 5 09:49:47.011130 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Sep 5 09:49:47.011135 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Sep 5 09:49:47.011140 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Sep 5 09:49:47.011147 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Sep 5 09:49:47.011152 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Sep 5 09:49:47.011157 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Sep 5 09:49:47.011163 kernel: Freeing SMP alternatives memory: 32K Sep 5 09:49:47.011168 kernel: pid_max: default: 32768 minimum: 301 Sep 5 09:49:47.011173 kernel: LSM: initializing lsm=lockdown,capability,landlock,selinux,integrity Sep 5 09:49:47.011179 kernel: landlock: Up and running. Sep 5 09:49:47.011184 kernel: SELinux: Initializing. Sep 5 09:49:47.011190 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 5 09:49:47.011195 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 5 09:49:47.011200 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Sep 5 09:49:47.011207 kernel: RCU Tasks: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1. Sep 5 09:49:47.011212 kernel: RCU Tasks Rude: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1. Sep 5 09:49:47.011218 kernel: RCU Tasks Trace: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1. Sep 5 09:49:47.011223 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Sep 5 09:49:47.011229 kernel: ... version: 4 Sep 5 09:49:47.011234 kernel: ... bit width: 48 Sep 5 09:49:47.011240 kernel: ... generic registers: 4 Sep 5 09:49:47.011245 kernel: ... value mask: 0000ffffffffffff Sep 5 09:49:47.011250 kernel: ... max period: 00007fffffffffff Sep 5 09:49:47.011257 kernel: ... fixed-purpose events: 3 Sep 5 09:49:47.011262 kernel: ... event mask: 000000070000000f Sep 5 09:49:47.011268 kernel: signal: max sigframe size: 2032 Sep 5 09:49:47.011273 kernel: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Sep 5 09:49:47.011279 kernel: rcu: Hierarchical SRCU implementation. Sep 5 09:49:47.011286 kernel: rcu: Max phase no-delay instances is 400. Sep 5 09:49:47.011291 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Sep 5 09:49:47.011297 kernel: smp: Bringing up secondary CPUs ... Sep 5 09:49:47.011302 kernel: smpboot: x86: Booting SMP configuration: Sep 5 09:49:47.011308 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 #9 #10 #11 #12 #13 #14 #15 Sep 5 09:49:47.011314 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Sep 5 09:49:47.011320 kernel: smp: Brought up 1 node, 16 CPUs Sep 5 09:49:47.011325 kernel: smpboot: Max logical packages: 1 Sep 5 09:49:47.011331 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Sep 5 09:49:47.011336 kernel: devtmpfs: initialized Sep 5 09:49:47.011342 kernel: x86/mm: Memory block size: 128MB Sep 5 09:49:47.011347 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x81b28000-0x81b28fff] (4096 bytes) Sep 5 09:49:47.011352 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Sep 5 09:49:47.011359 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 5 09:49:47.011365 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Sep 5 09:49:47.011370 kernel: pinctrl core: initialized pinctrl subsystem Sep 5 09:49:47.011375 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 5 09:49:47.011381 kernel: audit: initializing netlink subsys (disabled) Sep 5 09:49:47.011386 kernel: audit: type=2000 audit(1725529781.039:1): state=initialized audit_enabled=0 res=1 Sep 5 09:49:47.011391 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 5 09:49:47.011397 kernel: thermal_sys: Registered thermal governor 'user_space' Sep 5 09:49:47.011402 kernel: cpuidle: using governor menu Sep 5 09:49:47.011408 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 5 09:49:47.011414 kernel: dca service started, version 1.12.1 Sep 5 09:49:47.011419 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Sep 5 09:49:47.011425 kernel: PCI: Using configuration type 1 for base access Sep 5 09:49:47.011430 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Sep 5 09:49:47.011435 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Sep 5 09:49:47.011441 kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Sep 5 09:49:47.011446 kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Sep 5 09:49:47.011452 kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Sep 5 09:49:47.011458 kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Sep 5 09:49:47.011464 kernel: ACPI: Added _OSI(Module Device) Sep 5 09:49:47.011469 kernel: ACPI: Added _OSI(Processor Device) Sep 5 09:49:47.011474 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Sep 5 09:49:47.011480 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 5 09:49:47.011485 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Sep 5 09:49:47.011491 kernel: ACPI: Dynamic OEM Table Load: Sep 5 09:49:47.011496 kernel: ACPI: SSDT 0xFFFF9C0301EC8800 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Sep 5 09:49:47.011501 kernel: ACPI: Dynamic OEM Table Load: Sep 5 09:49:47.011508 kernel: ACPI: SSDT 0xFFFF9C0301EC4800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Sep 5 09:49:47.011513 kernel: ACPI: Dynamic OEM Table Load: Sep 5 09:49:47.011519 kernel: ACPI: SSDT 0xFFFF9C0301537400 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Sep 5 09:49:47.011524 kernel: ACPI: Dynamic OEM Table Load: Sep 5 09:49:47.011529 kernel: ACPI: SSDT 0xFFFF9C0301EC2000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Sep 5 09:49:47.011535 kernel: ACPI: Dynamic OEM Table Load: Sep 5 09:49:47.011540 kernel: ACPI: SSDT 0xFFFF9C0301ED4000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Sep 5 09:49:47.011545 kernel: ACPI: Dynamic OEM Table Load: Sep 5 09:49:47.011551 kernel: ACPI: SSDT 0xFFFF9C0301ECDC00 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Sep 5 09:49:47.011556 kernel: ACPI: _OSC evaluated successfully for all CPUs Sep 5 09:49:47.011563 kernel: ACPI: Interpreter enabled Sep 5 09:49:47.011568 kernel: ACPI: PM: (supports S0 S5) Sep 5 09:49:47.011573 kernel: ACPI: Using IOAPIC for interrupt routing Sep 5 09:49:47.011579 kernel: HEST: Enabling Firmware First mode for corrected errors. Sep 5 09:49:47.011584 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Sep 5 09:49:47.011589 kernel: HEST: Table parsing has been initialized. Sep 5 09:49:47.011595 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Sep 5 09:49:47.011600 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Sep 5 09:49:47.011606 kernel: PCI: Using E820 reservations for host bridge windows Sep 5 09:49:47.011612 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Sep 5 09:49:47.011618 kernel: ACPI: \_SB_.PCI0.XDCI.USBC: New power resource Sep 5 09:49:47.011623 kernel: ACPI: \_SB_.PCI0.SAT0.VOL0.V0PR: New power resource Sep 5 09:49:47.011629 kernel: ACPI: \_SB_.PCI0.SAT0.VOL1.V1PR: New power resource Sep 5 09:49:47.011634 kernel: ACPI: \_SB_.PCI0.SAT0.VOL2.V2PR: New power resource Sep 5 09:49:47.011639 kernel: ACPI: \_SB_.PCI0.CNVW.WRST: New power resource Sep 5 09:49:47.011645 kernel: ACPI: \_TZ_.FN00: New power resource Sep 5 09:49:47.011650 kernel: ACPI: \_TZ_.FN01: New power resource Sep 5 09:49:47.011656 kernel: ACPI: \_TZ_.FN02: New power resource Sep 5 09:49:47.011662 kernel: ACPI: \_TZ_.FN03: New power resource Sep 5 09:49:47.011668 kernel: ACPI: \_TZ_.FN04: New power resource Sep 5 09:49:47.011673 kernel: ACPI: \PIN_: New power resource Sep 5 09:49:47.011679 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Sep 5 09:49:47.011752 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Sep 5 09:49:47.011808 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Sep 5 09:49:47.011856 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Sep 5 09:49:47.011865 kernel: PCI host bridge to bus 0000:00 Sep 5 09:49:47.011917 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Sep 5 09:49:47.011961 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Sep 5 09:49:47.012005 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Sep 5 09:49:47.012046 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Sep 5 09:49:47.012089 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Sep 5 09:49:47.012131 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Sep 5 09:49:47.012192 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Sep 5 09:49:47.012245 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Sep 5 09:49:47.012300 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Sep 5 09:49:47.012356 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Sep 5 09:49:47.012405 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Sep 5 09:49:47.012457 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Sep 5 09:49:47.012508 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Sep 5 09:49:47.012561 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Sep 5 09:49:47.012609 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Sep 5 09:49:47.012657 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Sep 5 09:49:47.012709 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Sep 5 09:49:47.012758 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Sep 5 09:49:47.012807 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Sep 5 09:49:47.012859 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Sep 5 09:49:47.012906 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Sep 5 09:49:47.012959 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Sep 5 09:49:47.013007 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Sep 5 09:49:47.013059 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Sep 5 09:49:47.013108 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Sep 5 09:49:47.013158 kernel: pci 0000:00:16.0: PME# supported from D3hot Sep 5 09:49:47.013220 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Sep 5 09:49:47.013270 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Sep 5 09:49:47.013321 kernel: pci 0000:00:16.1: PME# supported from D3hot Sep 5 09:49:47.013373 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Sep 5 09:49:47.013422 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Sep 5 09:49:47.013472 kernel: pci 0000:00:16.4: PME# supported from D3hot Sep 5 09:49:47.013525 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Sep 5 09:49:47.013573 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Sep 5 09:49:47.013621 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Sep 5 09:49:47.013668 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Sep 5 09:49:47.013715 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Sep 5 09:49:47.013762 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Sep 5 09:49:47.013813 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Sep 5 09:49:47.013860 kernel: pci 0000:00:17.0: PME# supported from D3hot Sep 5 09:49:47.013913 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Sep 5 09:49:47.013961 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Sep 5 09:49:47.014016 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Sep 5 09:49:47.014066 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Sep 5 09:49:47.014119 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Sep 5 09:49:47.014168 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Sep 5 09:49:47.014226 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Sep 5 09:49:47.014308 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Sep 5 09:49:47.014376 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Sep 5 09:49:47.014425 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Sep 5 09:49:47.014475 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Sep 5 09:49:47.014523 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Sep 5 09:49:47.014574 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Sep 5 09:49:47.014626 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Sep 5 09:49:47.014675 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Sep 5 09:49:47.014724 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Sep 5 09:49:47.014775 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Sep 5 09:49:47.014823 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Sep 5 09:49:47.014881 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Sep 5 09:49:47.014931 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Sep 5 09:49:47.014983 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Sep 5 09:49:47.015030 kernel: pci 0000:01:00.0: PME# supported from D3cold Sep 5 09:49:47.015079 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Sep 5 09:49:47.015128 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Sep 5 09:49:47.015182 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Sep 5 09:49:47.015231 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Sep 5 09:49:47.015280 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Sep 5 09:49:47.015366 kernel: pci 0000:01:00.1: PME# supported from D3cold Sep 5 09:49:47.015415 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Sep 5 09:49:47.015463 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Sep 5 09:49:47.015512 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Sep 5 09:49:47.015560 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Sep 5 09:49:47.015607 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Sep 5 09:49:47.015655 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Sep 5 09:49:47.015707 kernel: pci 0000:03:00.0: working around ROM BAR overlap defect Sep 5 09:49:47.015809 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Sep 5 09:49:47.015859 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Sep 5 09:49:47.015907 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Sep 5 09:49:47.015957 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Sep 5 09:49:47.016005 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Sep 5 09:49:47.016054 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Sep 5 09:49:47.016101 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Sep 5 09:49:47.016152 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Sep 5 09:49:47.016204 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect Sep 5 09:49:47.016254 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Sep 5 09:49:47.016323 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Sep 5 09:49:47.016388 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Sep 5 09:49:47.016437 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Sep 5 09:49:47.016485 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Sep 5 09:49:47.016604 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Sep 5 09:49:47.016675 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Sep 5 09:49:47.016722 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Sep 5 09:49:47.016770 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Sep 5 09:49:47.016823 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Sep 5 09:49:47.016872 kernel: pci 0000:06:00.0: enabling Extended Tags Sep 5 09:49:47.016922 kernel: pci 0000:06:00.0: supports D1 D2 Sep 5 09:49:47.016971 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Sep 5 09:49:47.017021 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Sep 5 09:49:47.017070 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Sep 5 09:49:47.017116 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Sep 5 09:49:47.017168 kernel: pci_bus 0000:07: extended config space not accessible Sep 5 09:49:47.017225 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Sep 5 09:49:47.017278 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Sep 5 09:49:47.017375 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Sep 5 09:49:47.017429 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Sep 5 09:49:47.017481 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Sep 5 09:49:47.017530 kernel: pci 0000:07:00.0: supports D1 D2 Sep 5 09:49:47.017582 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Sep 5 09:49:47.017631 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Sep 5 09:49:47.017681 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Sep 5 09:49:47.017730 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Sep 5 09:49:47.017738 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Sep 5 09:49:47.017746 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Sep 5 09:49:47.017753 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Sep 5 09:49:47.017758 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Sep 5 09:49:47.017764 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Sep 5 09:49:47.017770 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Sep 5 09:49:47.017775 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Sep 5 09:49:47.017781 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Sep 5 09:49:47.017787 kernel: iommu: Default domain type: Translated Sep 5 09:49:47.017792 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Sep 5 09:49:47.017799 kernel: PCI: Using ACPI for IRQ routing Sep 5 09:49:47.017805 kernel: PCI: pci_cache_line_size set to 64 bytes Sep 5 09:49:47.017810 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Sep 5 09:49:47.017816 kernel: e820: reserve RAM buffer [mem 0x81b28000-0x83ffffff] Sep 5 09:49:47.017822 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Sep 5 09:49:47.017827 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Sep 5 09:49:47.017833 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Sep 5 09:49:47.017838 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Sep 5 09:49:47.017889 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Sep 5 09:49:47.017940 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Sep 5 09:49:47.017990 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Sep 5 09:49:47.017999 kernel: vgaarb: loaded Sep 5 09:49:47.018005 kernel: clocksource: Switched to clocksource tsc-early Sep 5 09:49:47.018011 kernel: VFS: Disk quotas dquot_6.6.0 Sep 5 09:49:47.018016 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 5 09:49:47.018022 kernel: pnp: PnP ACPI init Sep 5 09:49:47.018070 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Sep 5 09:49:47.018120 kernel: pnp 00:02: [dma 0 disabled] Sep 5 09:49:47.018169 kernel: pnp 00:03: [dma 0 disabled] Sep 5 09:49:47.018214 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Sep 5 09:49:47.018259 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Sep 5 09:49:47.018333 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Sep 5 09:49:47.018404 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Sep 5 09:49:47.018451 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Sep 5 09:49:47.018494 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Sep 5 09:49:47.018538 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Sep 5 09:49:47.018581 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Sep 5 09:49:47.018624 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Sep 5 09:49:47.018667 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Sep 5 09:49:47.018710 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Sep 5 09:49:47.018759 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Sep 5 09:49:47.018804 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Sep 5 09:49:47.018850 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Sep 5 09:49:47.018895 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Sep 5 09:49:47.018938 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Sep 5 09:49:47.018982 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Sep 5 09:49:47.019026 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Sep 5 09:49:47.019074 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Sep 5 09:49:47.019083 kernel: pnp: PnP ACPI: found 10 devices Sep 5 09:49:47.019089 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Sep 5 09:49:47.019095 kernel: NET: Registered PF_INET protocol family Sep 5 09:49:47.019101 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 5 09:49:47.019107 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Sep 5 09:49:47.019113 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 5 09:49:47.019118 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 5 09:49:47.019126 kernel: TCP bind hash table entries: 65536 (order: 9, 2097152 bytes, linear) Sep 5 09:49:47.019131 kernel: TCP: Hash tables configured (established 262144 bind 65536) Sep 5 09:49:47.019137 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Sep 5 09:49:47.019143 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Sep 5 09:49:47.019148 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 5 09:49:47.019154 kernel: NET: Registered PF_XDP protocol family Sep 5 09:49:47.019202 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Sep 5 09:49:47.019252 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Sep 5 09:49:47.019326 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Sep 5 09:49:47.019397 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Sep 5 09:49:47.019448 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Sep 5 09:49:47.019497 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Sep 5 09:49:47.019547 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Sep 5 09:49:47.019595 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Sep 5 09:49:47.019646 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Sep 5 09:49:47.019694 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Sep 5 09:49:47.019745 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Sep 5 09:49:47.019792 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Sep 5 09:49:47.019841 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Sep 5 09:49:47.019888 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Sep 5 09:49:47.019936 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Sep 5 09:49:47.019987 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Sep 5 09:49:47.020036 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Sep 5 09:49:47.020084 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Sep 5 09:49:47.020133 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Sep 5 09:49:47.020182 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Sep 5 09:49:47.020230 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Sep 5 09:49:47.020279 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Sep 5 09:49:47.020375 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Sep 5 09:49:47.020423 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Sep 5 09:49:47.020470 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Sep 5 09:49:47.020515 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Sep 5 09:49:47.020557 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Sep 5 09:49:47.020601 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Sep 5 09:49:47.020643 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Sep 5 09:49:47.020686 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Sep 5 09:49:47.020734 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Sep 5 09:49:47.020781 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Sep 5 09:49:47.020829 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Sep 5 09:49:47.020874 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Sep 5 09:49:47.020924 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Sep 5 09:49:47.020968 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Sep 5 09:49:47.021017 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Sep 5 09:49:47.021064 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Sep 5 09:49:47.021111 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Sep 5 09:49:47.021157 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Sep 5 09:49:47.021165 kernel: PCI: CLS 64 bytes, default 64 Sep 5 09:49:47.021171 kernel: DMAR: No ATSR found Sep 5 09:49:47.021177 kernel: DMAR: No SATC found Sep 5 09:49:47.021183 kernel: DMAR: dmar0: Using Queued invalidation Sep 5 09:49:47.021231 kernel: pci 0000:00:00.0: Adding to iommu group 0 Sep 5 09:49:47.021280 kernel: pci 0000:00:01.0: Adding to iommu group 1 Sep 5 09:49:47.021373 kernel: pci 0000:00:08.0: Adding to iommu group 2 Sep 5 09:49:47.021421 kernel: pci 0000:00:12.0: Adding to iommu group 3 Sep 5 09:49:47.021469 kernel: pci 0000:00:14.0: Adding to iommu group 4 Sep 5 09:49:47.021517 kernel: pci 0000:00:14.2: Adding to iommu group 4 Sep 5 09:49:47.021565 kernel: pci 0000:00:15.0: Adding to iommu group 5 Sep 5 09:49:47.021613 kernel: pci 0000:00:15.1: Adding to iommu group 5 Sep 5 09:49:47.021662 kernel: pci 0000:00:16.0: Adding to iommu group 6 Sep 5 09:49:47.021710 kernel: pci 0000:00:16.1: Adding to iommu group 6 Sep 5 09:49:47.021760 kernel: pci 0000:00:16.4: Adding to iommu group 6 Sep 5 09:49:47.021808 kernel: pci 0000:00:17.0: Adding to iommu group 7 Sep 5 09:49:47.021856 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Sep 5 09:49:47.021904 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Sep 5 09:49:47.021951 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Sep 5 09:49:47.021999 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Sep 5 09:49:47.022048 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Sep 5 09:49:47.022096 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Sep 5 09:49:47.022145 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Sep 5 09:49:47.022194 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Sep 5 09:49:47.022241 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Sep 5 09:49:47.022294 kernel: pci 0000:01:00.0: Adding to iommu group 1 Sep 5 09:49:47.022387 kernel: pci 0000:01:00.1: Adding to iommu group 1 Sep 5 09:49:47.022437 kernel: pci 0000:03:00.0: Adding to iommu group 15 Sep 5 09:49:47.022487 kernel: pci 0000:04:00.0: Adding to iommu group 16 Sep 5 09:49:47.022537 kernel: pci 0000:06:00.0: Adding to iommu group 17 Sep 5 09:49:47.022592 kernel: pci 0000:07:00.0: Adding to iommu group 17 Sep 5 09:49:47.022600 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Sep 5 09:49:47.022606 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Sep 5 09:49:47.022612 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Sep 5 09:49:47.022618 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Sep 5 09:49:47.022624 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Sep 5 09:49:47.022630 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Sep 5 09:49:47.022635 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Sep 5 09:49:47.022684 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Sep 5 09:49:47.022695 kernel: Initialise system trusted keyrings Sep 5 09:49:47.022701 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Sep 5 09:49:47.022707 kernel: Key type asymmetric registered Sep 5 09:49:47.022712 kernel: Asymmetric key parser 'x509' registered Sep 5 09:49:47.022718 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 251) Sep 5 09:49:47.022723 kernel: io scheduler mq-deadline registered Sep 5 09:49:47.022729 kernel: io scheduler kyber registered Sep 5 09:49:47.022735 kernel: io scheduler bfq registered Sep 5 09:49:47.022785 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Sep 5 09:49:47.022833 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Sep 5 09:49:47.022883 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Sep 5 09:49:47.022932 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Sep 5 09:49:47.022981 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Sep 5 09:49:47.023029 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Sep 5 09:49:47.023081 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Sep 5 09:49:47.023091 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Sep 5 09:49:47.023097 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Sep 5 09:49:47.023103 kernel: pstore: Using crash dump compression: deflate Sep 5 09:49:47.023109 kernel: pstore: Registered erst as persistent store backend Sep 5 09:49:47.023115 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Sep 5 09:49:47.023120 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 5 09:49:47.023126 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Sep 5 09:49:47.023132 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Sep 5 09:49:47.023138 kernel: hpet_acpi_add: no address or irqs in _CRS Sep 5 09:49:47.023186 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Sep 5 09:49:47.023195 kernel: i8042: PNP: No PS/2 controller found. Sep 5 09:49:47.023238 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Sep 5 09:49:47.023283 kernel: rtc_cmos rtc_cmos: registered as rtc0 Sep 5 09:49:47.023375 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-09-05T09:49:45 UTC (1725529785) Sep 5 09:49:47.023420 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Sep 5 09:49:47.023428 kernel: intel_pstate: Intel P-state driver initializing Sep 5 09:49:47.023434 kernel: intel_pstate: Disabling energy efficiency optimization Sep 5 09:49:47.023442 kernel: intel_pstate: HWP enabled Sep 5 09:49:47.023447 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Sep 5 09:49:47.023453 kernel: vesafb: scrolling: redraw Sep 5 09:49:47.023459 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Sep 5 09:49:47.023465 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x00000000303248d6, using 768k, total 768k Sep 5 09:49:47.023470 kernel: Console: switching to colour frame buffer device 128x48 Sep 5 09:49:47.023476 kernel: fb0: VESA VGA frame buffer device Sep 5 09:49:47.023482 kernel: NET: Registered PF_INET6 protocol family Sep 5 09:49:47.023487 kernel: Segment Routing with IPv6 Sep 5 09:49:47.023494 kernel: In-situ OAM (IOAM) with IPv6 Sep 5 09:49:47.023500 kernel: NET: Registered PF_PACKET protocol family Sep 5 09:49:47.023505 kernel: Key type dns_resolver registered Sep 5 09:49:47.023511 kernel: microcode: Microcode Update Driver: v2.2. Sep 5 09:49:47.023517 kernel: IPI shorthand broadcast: enabled Sep 5 09:49:47.023522 kernel: sched_clock: Marking stable (2478000688, 1380821990)->(4397613211, -538790533) Sep 5 09:49:47.023528 kernel: registered taskstats version 1 Sep 5 09:49:47.023534 kernel: Loading compiled-in X.509 certificates Sep 5 09:49:47.023540 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 6.6.48-flatcar: 8669771ab5e11f458b79e6634fe685dacc266b18' Sep 5 09:49:47.023546 kernel: Key type .fscrypt registered Sep 5 09:49:47.023552 kernel: Key type fscrypt-provisioning registered Sep 5 09:49:47.023557 kernel: ima: Allocated hash algorithm: sha1 Sep 5 09:49:47.023563 kernel: ima: No architecture policies found Sep 5 09:49:47.023569 kernel: clk: Disabling unused clocks Sep 5 09:49:47.023575 kernel: Freeing unused kernel image (initmem) memory: 42704K Sep 5 09:49:47.023580 kernel: Write protecting the kernel read-only data: 36864k Sep 5 09:49:47.023586 kernel: Freeing unused kernel image (rodata/data gap) memory: 1868K Sep 5 09:49:47.023592 kernel: Run /init as init process Sep 5 09:49:47.023599 kernel: with arguments: Sep 5 09:49:47.023604 kernel: /init Sep 5 09:49:47.023610 kernel: with environment: Sep 5 09:49:47.023615 kernel: HOME=/ Sep 5 09:49:47.023621 kernel: TERM=linux Sep 5 09:49:47.023626 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 5 09:49:47.023633 systemd[1]: systemd 255 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP -SYSVINIT default-hierarchy=unified) Sep 5 09:49:47.023641 systemd[1]: Detected architecture x86-64. Sep 5 09:49:47.023648 systemd[1]: Running in initrd. Sep 5 09:49:47.023654 systemd[1]: No hostname configured, using default hostname. Sep 5 09:49:47.023660 systemd[1]: Hostname set to <localhost>. Sep 5 09:49:47.023666 systemd[1]: Initializing machine ID from random generator. Sep 5 09:49:47.023672 systemd[1]: Queued start job for default target initrd.target. Sep 5 09:49:47.023678 systemd[1]: Started clevis-luks-askpass.path - Forward Password Requests to Clevis Directory Watch. Sep 5 09:49:47.023684 systemd[1]: Started systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch. Sep 5 09:49:47.023691 systemd[1]: Expecting device dev-disk-by\x2dlabel-OEM.device - /dev/disk/by-label/OEM... Sep 5 09:49:47.023697 systemd[1]: Expecting device dev-disk-by\x2dlabel-ROOT.device - /dev/disk/by-label/ROOT... Sep 5 09:49:47.023703 systemd[1]: Expecting device dev-disk-by\x2dpartlabel-ROOT.device - /dev/disk/by-partlabel/ROOT... Sep 5 09:49:47.023709 systemd[1]: Expecting device dev-disk-by\x2dpartlabel-USR\x2dA.device - /dev/disk/by-partlabel/USR-A... Sep 5 09:49:47.023716 systemd[1]: Expecting device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device - /dev/disk/by-partuuid/7130c94a-213a-4e5a-8e26-6cce9662f132... Sep 5 09:49:47.023722 kernel: tsc: Refined TSC clocksource calibration: 3407.998 MHz Sep 5 09:49:47.023728 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd208cfc, max_idle_ns: 440795283699 ns Sep 5 09:49:47.023734 kernel: clocksource: Switched to clocksource tsc Sep 5 09:49:47.023740 systemd[1]: Expecting device dev-mapper-usr.device - /dev/mapper/usr... Sep 5 09:49:47.023746 systemd[1]: Reached target cryptsetup-pre.target - Local Encrypted Volumes (Pre). Sep 5 09:49:47.023753 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes. Sep 5 09:49:47.023759 systemd[1]: Reached target ignition-diskful-subsequent.target - Ignition Subsequent Boot Disk Setup. Sep 5 09:49:47.023765 systemd[1]: Reached target paths.target - Path Units. Sep 5 09:49:47.023771 systemd[1]: Reached target slices.target - Slice Units. Sep 5 09:49:47.023777 systemd[1]: Reached target swap.target - Swaps. Sep 5 09:49:47.023782 systemd[1]: Reached target timers.target - Timer Units. Sep 5 09:49:47.023789 systemd[1]: Listening on iscsid.socket - Open-iSCSI iscsid Socket. Sep 5 09:49:47.023795 systemd[1]: Listening on iscsiuio.socket - Open-iSCSI iscsiuio Socket. Sep 5 09:49:47.023802 systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log). Sep 5 09:49:47.023808 systemd[1]: Listening on systemd-journald.socket - Journal Socket. Sep 5 09:49:47.023813 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. Sep 5 09:49:47.023820 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. Sep 5 09:49:47.023826 systemd[1]: Reached target sockets.target - Socket Units. Sep 5 09:49:47.023832 systemd[1]: Starting ignition-setup-pre.service - Ignition env setup... Sep 5 09:49:47.023839 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... Sep 5 09:49:47.023845 systemd[1]: Starting systemd-fsck-usr.service... Sep 5 09:49:47.023851 systemd[1]: Starting systemd-journald.service - Journal Service... Sep 5 09:49:47.023867 systemd-journald[258]: Collecting audit messages is disabled. Sep 5 09:49:47.023882 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... Sep 5 09:49:47.023889 systemd-journald[258]: Journal started Sep 5 09:49:47.023903 systemd-journald[258]: Runtime Journal (/run/log/journal/850e23a8e87840daaee177e78fa8c26b) is 8.0M, max 639.9M, 631.9M free. Sep 5 09:49:47.030368 systemd-modules-load[259]: Inserted module 'overlay' Sep 5 09:49:47.059290 systemd[1]: Starting systemd-vconsole-setup.service - Virtual Console Setup... Sep 5 09:49:47.102307 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 5 09:49:47.122291 systemd[1]: Started systemd-journald.service - Journal Service. Sep 5 09:49:47.122323 kernel: Bridge firewalling registered Sep 5 09:49:47.122355 systemd[1]: Finished ignition-setup-pre.service - Ignition env setup. Sep 5 09:49:47.139919 systemd-modules-load[259]: Inserted module 'br_netfilter' Sep 5 09:49:47.158738 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. Sep 5 09:49:47.178572 systemd[1]: Finished systemd-fsck-usr.service. Sep 5 09:49:47.198703 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules. Sep 5 09:49:47.215809 systemd[1]: Finished systemd-vconsole-setup.service - Virtual Console Setup. Sep 5 09:49:47.252538 systemd[1]: Starting dracut-cmdline-ask.service - dracut ask for additional cmdline parameters... Sep 5 09:49:47.263891 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables... Sep 5 09:49:47.277231 systemd[1]: Starting systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in /dev gracefully... Sep 5 09:49:47.277920 systemd[1]: Starting systemd-tmpfiles-setup.service - Create System Files and Directories... Sep 5 09:49:47.282435 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables. Sep 5 09:49:47.284342 systemd[1]: Finished systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in /dev gracefully. Sep 5 09:49:47.285347 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... Sep 5 09:49:47.287096 systemd[1]: Finished systemd-tmpfiles-setup.service - Create System Files and Directories. Sep 5 09:49:47.290704 systemd[1]: Finished dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Sep 5 09:49:47.302739 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Sep 5 09:49:47.340525 systemd[1]: Starting dracut-cmdline.service - dracut cmdline hook... Sep 5 09:49:47.361412 dracut-cmdline[296]: dracut-dracut-053 Sep 5 09:49:47.361412 dracut-cmdline[296]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=ceda2dd706627da8006bcd6ae77ea155b2a7de6732e2c1c7ab4bed271400663d Sep 5 09:49:47.481316 kernel: SCSI subsystem initialized Sep 5 09:49:47.504329 kernel: Loading iSCSI transport class v2.0-870. Sep 5 09:49:47.527345 kernel: iscsi: registered transport (tcp) Sep 5 09:49:47.559379 kernel: iscsi: registered transport (qla4xxx) Sep 5 09:49:47.559398 kernel: QLogic iSCSI HBA Driver Sep 5 09:49:47.592721 systemd[1]: Finished dracut-cmdline.service - dracut cmdline hook. Sep 5 09:49:47.602652 systemd[1]: Starting dracut-pre-udev.service - dracut pre-udev hook... Sep 5 09:49:47.698874 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 5 09:49:47.698908 kernel: device-mapper: uevent: version 1.0.3 Sep 5 09:49:47.718672 kernel: device-mapper: ioctl: 4.48.0-ioctl (2023-03-01) initialised: dm-devel@redhat.com Sep 5 09:49:47.777356 kernel: raid6: avx2x4 gen() 53389 MB/s Sep 5 09:49:47.809289 kernel: raid6: avx2x2 gen() 52480 MB/s Sep 5 09:49:47.846245 kernel: raid6: avx2x1 gen() 44078 MB/s Sep 5 09:49:47.846264 kernel: raid6: using algorithm avx2x4 gen() 53389 MB/s Sep 5 09:49:47.893958 kernel: raid6: .... xor() 21632 MB/s, rmw enabled Sep 5 09:49:47.893976 kernel: raid6: using avx2x2 recovery algorithm Sep 5 09:49:47.935339 kernel: xor: automatically using best checksumming function avx Sep 5 09:49:48.053294 kernel: Btrfs loaded, zoned=no, fsverity=no Sep 5 09:49:48.058671 systemd[1]: Finished dracut-pre-udev.service - dracut pre-udev hook. Sep 5 09:49:48.092627 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... Sep 5 09:49:48.099717 systemd-udevd[485]: Using default interface naming scheme 'v255'. Sep 5 09:49:48.103442 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Sep 5 09:49:48.139555 systemd[1]: Starting dracut-pre-trigger.service - dracut pre-trigger hook... Sep 5 09:49:48.166509 systemd[1]: Finished dracut-pre-trigger.service - dracut pre-trigger hook. Sep 5 09:49:48.190555 dracut-pre-trigger[498]: rd.md=0: removing MD RAID activation Sep 5 09:49:48.192676 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... Sep 5 09:49:48.254599 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Sep 5 09:49:48.312300 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 5 09:49:48.312325 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it> Sep 5 09:49:48.312343 kernel: cryptd: max_cpu_qlen set to 1000 Sep 5 09:49:48.279809 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 5 09:49:48.395480 kernel: libata version 3.00 loaded. Sep 5 09:49:48.395502 kernel: PTP clock support registered Sep 5 09:49:48.395510 kernel: ACPI: bus type USB registered Sep 5 09:49:48.395517 kernel: usbcore: registered new interface driver usbfs Sep 5 09:49:48.395525 kernel: usbcore: registered new interface driver hub Sep 5 09:49:48.395532 kernel: usbcore: registered new device driver usb Sep 5 09:49:48.395544 kernel: AVX2 version of gcm_enc/dec engaged. Sep 5 09:49:48.279844 systemd[1]: Stopped dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Sep 5 09:49:48.427348 kernel: AES CTR mode by8 optimization enabled Sep 5 09:49:48.414313 systemd[1]: Stopping dracut-cmdline-ask.service - dracut ask for additional cmdline parameters... Sep 5 09:49:48.868277 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Sep 5 09:49:48.868430 kernel: ahci 0000:00:17.0: version 3.0 Sep 5 09:49:48.868507 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Sep 5 09:49:48.868586 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Sep 5 09:49:48.868656 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Sep 5 09:49:48.868754 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Sep 5 09:49:48.868865 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Sep 5 09:49:48.868979 kernel: scsi host0: ahci Sep 5 09:49:48.869093 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Sep 5 09:49:48.869168 kernel: scsi host1: ahci Sep 5 09:49:48.869230 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Sep 5 09:49:48.869294 kernel: scsi host2: ahci Sep 5 09:49:48.869356 kernel: hub 1-0:1.0: USB hub found Sep 5 09:49:48.869499 kernel: scsi host3: ahci Sep 5 09:49:48.869557 kernel: hub 1-0:1.0: 16 ports detected Sep 5 09:49:48.869623 kernel: scsi host4: ahci Sep 5 09:49:48.869687 kernel: hub 2-0:1.0: USB hub found Sep 5 09:49:48.869756 kernel: scsi host5: ahci Sep 5 09:49:48.869815 kernel: hub 2-0:1.0: 10 ports detected Sep 5 09:49:48.869880 kernel: scsi host6: ahci Sep 5 09:49:48.869964 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 127 Sep 5 09:49:48.869974 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 127 Sep 5 09:49:48.869983 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 127 Sep 5 09:49:48.869991 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 127 Sep 5 09:49:48.869998 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 127 Sep 5 09:49:48.870005 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 127 Sep 5 09:49:48.870012 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 127 Sep 5 09:49:48.870019 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Sep 5 09:49:48.870034 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Sep 5 09:49:48.870042 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Sep 5 09:49:48.443383 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 5 09:49:48.955226 kernel: mlx5_core 0000:01:00.0: firmware version: 14.28.2006 Sep 5 09:49:48.955319 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Sep 5 09:49:48.955387 kernel: pps pps0: new PPS source ptp0 Sep 5 09:49:48.955451 kernel: igb 0000:03:00.0: added PHC on eth0 Sep 5 09:49:48.955520 kernel: hub 1-14:1.0: USB hub found Sep 5 09:49:48.955596 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Sep 5 09:49:48.955662 kernel: hub 1-14:1.0: 4 ports detected Sep 5 09:49:48.955730 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:70:d8:a8 Sep 5 09:49:48.955793 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Sep 5 09:49:48.443433 systemd[1]: Stopped systemd-vconsole-setup.service - Virtual Console Setup. Sep 5 09:49:49.292267 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Sep 5 09:49:49.292402 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Sep 5 09:49:49.292414 kernel: pps pps1: new PPS source ptp1 Sep 5 09:49:49.292482 kernel: ata4: SATA link down (SStatus 0 SControl 300) Sep 5 09:49:49.292490 kernel: igb 0000:04:00.0: added PHC on eth1 Sep 5 09:49:49.292558 kernel: ata6: SATA link down (SStatus 0 SControl 300) Sep 5 09:49:49.292566 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Sep 5 09:49:49.292627 kernel: ata7: SATA link down (SStatus 0 SControl 300) Sep 5 09:49:49.292635 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:70:d8:a9 Sep 5 09:49:49.292696 kernel: ata3: SATA link down (SStatus 0 SControl 300) Sep 5 09:49:49.292705 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Sep 5 09:49:49.292766 kernel: ata5: SATA link down (SStatus 0 SControl 300) Sep 5 09:49:49.292774 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Sep 5 09:49:49.292833 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Sep 5 09:49:49.292894 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Sep 5 09:49:49.292903 kernel: mlx5_core 0000:01:00.0: Port module event: module 0, Cable plugged Sep 5 09:49:49.292962 kernel: ata2.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Sep 5 09:49:49.292970 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Sep 5 09:49:49.292984 kernel: ata1.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Sep 5 09:49:48.895135 systemd[1]: Stopping systemd-vconsole-setup.service - Virtual Console Setup... Sep 5 09:49:49.332366 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Sep 5 09:49:49.332378 kernel: ata2.00: Features: NCQ-prio Sep 5 09:49:49.332386 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Sep 5 09:49:49.226403 systemd[1]: Starting systemd-vconsole-setup.service - Virtual Console Setup... Sep 5 09:49:49.371909 kernel: ata1.00: Features: NCQ-prio Sep 5 09:49:49.371935 kernel: ata2.00: configured for UDMA/133 Sep 5 09:49:49.371942 kernel: ata1.00: configured for UDMA/133 Sep 5 09:49:49.371949 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Sep 5 09:49:49.380290 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0 basic) Sep 5 09:49:49.380405 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Sep 5 09:49:49.389370 kernel: hid: raw HID events driver (C) Jiri Kosina Sep 5 09:49:49.392340 kernel: mlx5_core 0000:01:00.1: firmware version: 14.28.2006 Sep 5 09:49:49.392453 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Sep 5 09:49:49.417291 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Sep 5 09:49:49.502149 systemd[1]: Finished systemd-vconsole-setup.service - Virtual Console Setup. Sep 5 09:49:49.534664 kernel: usbcore: registered new interface driver usbhid Sep 5 09:49:49.534680 kernel: usbhid: USB HID core driver Sep 5 09:49:49.548354 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Sep 5 09:49:49.548375 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Sep 5 09:49:49.549474 systemd[1]: Starting dracut-cmdline-ask.service - dracut ask for additional cmdline parameters... Sep 5 09:49:49.593686 systemd[1]: Finished dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Sep 5 09:49:50.013402 kernel: ata2.00: Enabling discard_zeroes_data Sep 5 09:49:50.013422 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Sep 5 09:49:50.013516 kernel: ata1.00: Enabling discard_zeroes_data Sep 5 09:49:50.013525 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Sep 5 09:49:50.013598 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Sep 5 09:49:50.013669 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Sep 5 09:49:50.013728 kernel: sd 1:0:0:0: [sdb] Write Protect is off Sep 5 09:49:50.013787 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Sep 5 09:49:50.013848 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Sep 5 09:49:50.013907 kernel: sd 1:0:0:0: [sdb] Preferred minimum I/O size 4096 bytes Sep 5 09:49:50.013966 kernel: ata2.00: Enabling discard_zeroes_data Sep 5 09:49:50.013974 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Sep 5 09:49:50.014031 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Sep 5 09:49:50.014039 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Sep 5 09:49:50.014097 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Sep 5 09:49:50.014168 kernel: sd 0:0:0:0: [sda] Write Protect is off Sep 5 09:49:50.014227 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Sep 5 09:49:50.014302 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Sep 5 09:49:50.014364 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Sep 5 09:49:50.014422 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Sep 5 09:49:50.014487 kernel: sd 0:0:0:0: [sda] Preferred minimum I/O size 4096 bytes Sep 5 09:49:50.014546 kernel: ata1.00: Enabling discard_zeroes_data Sep 5 09:49:50.014554 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 5 09:49:50.022940 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Sep 5 09:49:50.075214 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device - Micron_5200_MTFDDAK480TDN ROOT. Sep 5 09:49:50.084344 kernel: BTRFS: device label OEM devid 1 transid 19 /dev/sda6 scanned by (udev-worker) (539) Sep 5 09:49:50.084380 kernel: BTRFS: device fsid 0dc40443-7f77-4fa7-b5e4-579d4bba0772 devid 1 transid 37 /dev/sda3 scanned by (udev-worker) (534) Sep 5 09:49:50.116376 systemd[1]: Found device dev-disk-by\x2dpartlabel-ROOT.device - Micron_5200_MTFDDAK480TDN ROOT. Sep 5 09:49:50.146211 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device - Micron_5200_MTFDDAK480TDN OEM. Sep 5 09:49:50.162177 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device - Micron_5200_MTFDDAK480TDN USR-A. Sep 5 09:49:50.180474 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device - Micron_5200_MTFDDAK480TDN USR-A. Sep 5 09:49:50.221884 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0 basic) Sep 5 09:49:50.246351 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth2 Sep 5 09:49:50.250815 systemd[1]: Reached target initrd-root-device.target - Initrd Root Device. Sep 5 09:49:50.276550 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth0 Sep 5 09:49:50.282432 systemd[1]: Starting decrypt-root.service - Generate and execute a systemd-cryptsetup service to decrypt the ROOT partition... Sep 5 09:49:50.294757 systemd[1]: Starting disk-uuid.service - Generate new UUID for disk GPT if necessary... Sep 5 09:49:50.319604 systemd[1]: Finished decrypt-root.service - Generate and execute a systemd-cryptsetup service to decrypt the ROOT partition. Sep 5 09:49:50.341869 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 5 09:49:50.341965 systemd[1]: Finished disk-uuid.service - Generate new UUID for disk GPT if necessary. Sep 5 09:49:50.372254 systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems. Sep 5 09:49:50.374561 systemd[1]: Reached target local-fs.target - Local File Systems. Sep 5 09:49:50.405506 systemd[1]: Reached target sysinit.target - System Initialization. Sep 5 09:49:50.426646 systemd[1]: Reached target basic.target - Basic System. Sep 5 09:49:50.457621 systemd[1]: Starting dracut-initqueue.service - dracut initqueue hook... Sep 5 09:49:50.465363 systemd[1]: Starting verity-setup.service - Verity Setup for /dev/mapper/usr... Sep 5 09:49:50.488429 sh[702]: Success Sep 5 09:49:50.504314 systemd[1]: Finished dracut-initqueue.service - dracut initqueue hook. Sep 5 09:49:50.540465 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Sep 5 09:49:50.530674 systemd[1]: Reached target remote-fs-pre.target - Preparation for Remote File Systems. Sep 5 09:49:50.551397 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes. Sep 5 09:49:50.573498 systemd[1]: Reached target remote-fs.target - Remote File Systems. Sep 5 09:49:50.599470 systemd[1]: Starting dracut-pre-mount.service - dracut pre-mount hook... Sep 5 09:49:50.609119 systemd[1]: Found device dev-mapper-usr.device - /dev/mapper/usr. Sep 5 09:49:50.632103 systemd[1]: Finished verity-setup.service - Verity Setup for /dev/mapper/usr. Sep 5 09:49:50.675550 systemd[1]: Mounting sysusr-usr.mount - /sysusr/usr... Sep 5 09:49:50.684478 systemd[1]: Finished dracut-pre-mount.service - dracut pre-mount hook. Sep 5 09:49:50.822521 kernel: BTRFS info (device dm-0): first mount of filesystem 0dc40443-7f77-4fa7-b5e4-579d4bba0772 Sep 5 09:49:50.822540 kernel: BTRFS info (device dm-0): using crc32c (crc32c-intel) checksum algorithm Sep 5 09:49:50.822548 kernel: BTRFS warning (device dm-0): 'nologreplay' is deprecated, use 'rescue=nologreplay' instead Sep 5 09:49:50.822556 kernel: BTRFS info (device dm-0): disabling log replay at mount time Sep 5 09:49:50.822563 kernel: BTRFS info (device dm-0): using free space tree Sep 5 09:49:50.822570 kernel: BTRFS info (device dm-0): enabling ssd optimizations Sep 5 09:49:50.823615 systemd[1]: Starting systemd-fsck-root.service - File System Check on /dev/disk/by-label/ROOT... Sep 5 09:49:50.835883 systemd[1]: Mounted sysusr-usr.mount - /sysusr/usr. Sep 5 09:49:50.863973 systemd-fsck[751]: ROOT: clean, 77/553520 files, 52714/553472 blocks Sep 5 09:49:50.874625 systemd[1]: Finished systemd-fsck-root.service - File System Check on /dev/disk/by-label/ROOT. Sep 5 09:49:50.881622 systemd[1]: Mounting sysroot.mount - /sysroot... Sep 5 09:49:51.001292 kernel: EXT4-fs (sda9): mounted filesystem bdbe0f61-2675-40b7-b9ae-5653402e9b23 r/w with ordered data mode. Quota mode: none. Sep 5 09:49:51.001572 systemd[1]: Mounted sysroot.mount - /sysroot. Sep 5 09:49:51.010743 systemd[1]: Reached target initrd-root-fs.target - Initrd Root File System. Sep 5 09:49:51.047503 systemd[1]: Mounting sysroot-oem.mount - /sysroot/oem... Sep 5 09:49:51.156203 kernel: BTRFS info (device sda6): first mount of filesystem b2463ce1-c756-4e78-b7f2-401dad24571d Sep 5 09:49:51.156217 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 5 09:49:51.156225 kernel: BTRFS info (device sda6): using free space tree Sep 5 09:49:51.156232 kernel: BTRFS info (device sda6): enabling ssd optimizations Sep 5 09:49:51.156242 kernel: BTRFS info (device sda6): auto enabling async discard Sep 5 09:49:51.055863 systemd[1]: Mounting sysroot-usr.mount - /sysroot/usr... Sep 5 09:49:51.173578 systemd[1]: Mounted sysroot-oem.mount - /sysroot/oem. Sep 5 09:49:51.184196 systemd[1]: Mounted sysroot-usr.mount - /sysroot/usr. Sep 5 09:49:51.215591 systemd[1]: Starting initrd-setup-root.service - Root filesystem setup... Sep 5 09:49:51.278219 initrd-setup-root[784]: cut: /sysroot/etc/passwd: No such file or directory Sep 5 09:49:51.289427 initrd-setup-root[791]: cut: /sysroot/etc/group: No such file or directory Sep 5 09:49:51.300596 initrd-setup-root[798]: cut: /sysroot/etc/shadow: No such file or directory Sep 5 09:49:51.310417 initrd-setup-root[805]: cut: /sysroot/etc/gshadow: No such file or directory Sep 5 09:49:51.398622 systemd[1]: Finished initrd-setup-root.service - Root filesystem setup. Sep 5 09:49:51.419524 systemd[1]: Starting initrd-setup-root-after-ignition.service - Root filesystem completion... Sep 5 09:49:51.430754 systemd[1]: Finished initrd-setup-root-after-ignition.service - Root filesystem completion. Sep 5 09:49:51.452861 systemd[1]: Reached target ignition-subsequent.target - Subsequent (Not Ignition) boot complete. Sep 5 09:49:51.484645 systemd[1]: Starting initrd-parse-etc.service - Mountpoints Configured in the Real Root... Sep 5 09:49:51.508564 initrd-setup-root-after-ignition[950]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 5 09:49:51.508564 initrd-setup-root-after-ignition[950]: grep: /sysroot/usr/share/flatcar/enabled-sysext.conf: No such file or directory Sep 5 09:49:51.536547 initrd-setup-root-after-ignition[954]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 5 09:49:51.565430 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 5 09:49:51.565481 systemd[1]: Finished initrd-parse-etc.service - Mountpoints Configured in the Real Root. Sep 5 09:49:51.583764 systemd[1]: Reached target initrd-fs.target - Initrd File Systems. Sep 5 09:49:51.604564 systemd[1]: Reached target initrd.target - Initrd Default Target. Sep 5 09:49:51.624675 systemd[1]: dracut-mount.service - dracut mount hook was skipped because no trigger condition checks were met. Sep 5 09:49:51.634536 systemd[1]: Starting dracut-pre-pivot.service - dracut pre-pivot and cleanup hook... Sep 5 09:49:51.690693 systemd[1]: Finished dracut-pre-pivot.service - dracut pre-pivot and cleanup hook. Sep 5 09:49:51.718686 systemd[1]: Starting initrd-cleanup.service - Cleaning Up and Shutting Down Daemons... Sep 5 09:49:51.743484 systemd[1]: Stopped target remote-cryptsetup.target - Remote Encrypted Volumes. Sep 5 09:49:51.754969 systemd[1]: Stopped target timers.target - Timer Units. Sep 5 09:49:51.772862 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 5 09:49:51.773231 systemd[1]: Stopped dracut-pre-pivot.service - dracut pre-pivot and cleanup hook. Sep 5 09:49:51.812726 systemd[1]: Stopped target initrd.target - Initrd Default Target. Sep 5 09:49:51.822900 systemd[1]: Stopped target basic.target - Basic System. Sep 5 09:49:51.843006 systemd[1]: Stopped target ignition-subsequent.target - Subsequent (Not Ignition) boot complete. Sep 5 09:49:51.862912 systemd[1]: Stopped target ignition-diskful-subsequent.target - Ignition Subsequent Boot Disk Setup. Sep 5 09:49:51.886905 systemd[1]: Stopped target initrd-root-device.target - Initrd Root Device. Sep 5 09:49:51.911903 systemd[1]: Stopped target paths.target - Path Units. Sep 5 09:49:51.929917 systemd[1]: Stopped target remote-fs.target - Remote File Systems. Sep 5 09:49:51.947902 systemd[1]: Stopped target remote-fs-pre.target - Preparation for Remote File Systems. Sep 5 09:49:51.968882 systemd[1]: Stopped target slices.target - Slice Units. Sep 5 09:49:51.987892 systemd[1]: Stopped target sockets.target - Socket Units. Sep 5 09:49:52.005908 systemd[1]: Stopped target sysinit.target - System Initialization. Sep 5 09:49:52.023916 systemd[1]: Stopped target local-fs.target - Local File Systems. Sep 5 09:49:52.043880 systemd[1]: Stopped target swap.target - Swaps. Sep 5 09:49:52.061859 systemd[1]: iscsid.socket: Deactivated successfully. Sep 5 09:49:52.062125 systemd[1]: Closed iscsid.socket - Open-iSCSI iscsid Socket. Sep 5 09:49:52.078935 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 5 09:49:52.079209 systemd[1]: Closed iscsiuio.socket - Open-iSCSI iscsiuio Socket. Sep 5 09:49:52.096890 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 5 09:49:52.097234 systemd[1]: Stopped dracut-pre-mount.service - dracut pre-mount hook. Sep 5 09:49:52.122927 systemd[1]: Stopped target cryptsetup.target - Local Encrypted Volumes. Sep 5 09:49:52.142799 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 5 09:49:52.143239 systemd[1]: Stopped systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch. Sep 5 09:49:52.161913 systemd[1]: Stopped target cryptsetup-pre.target - Local Encrypted Volumes (Pre). Sep 5 09:49:52.182786 systemd[1]: clevis-luks-askpass.path: Deactivated successfully. Sep 5 09:49:52.183201 systemd[1]: Stopped clevis-luks-askpass.path - Forward Password Requests to Clevis Directory Watch. Sep 5 09:49:52.203798 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 5 09:49:52.204166 systemd[1]: Stopped dracut-initqueue.service - dracut initqueue hook. Sep 5 09:49:52.236800 systemd[1]: decrypt-root.service: Deactivated successfully. Sep 5 09:49:52.237211 systemd[1]: Stopped decrypt-root.service - Generate and execute a systemd-cryptsetup service to decrypt the ROOT partition. Sep 5 09:49:52.259969 systemd[1]: ignition-setup-pre.service: Deactivated successfully. Sep 5 09:49:52.260333 systemd[1]: Stopped ignition-setup-pre.service - Ignition env setup. Sep 5 09:49:52.277965 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 5 09:49:52.278339 systemd[1]: Stopped initrd-setup-root-after-ignition.service - Root filesystem completion. Sep 5 09:49:52.301975 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 5 09:49:52.302339 systemd[1]: Stopped initrd-setup-root.service - Root filesystem setup. Sep 5 09:49:52.319992 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 5 09:49:52.320350 systemd[1]: Stopped kmod-static-nodes.service - Create List of Static Device Nodes. Sep 5 09:49:52.340944 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 5 09:49:52.341282 systemd[1]: Stopped systemd-sysctl.service - Apply Kernel Variables. Sep 5 09:49:52.358948 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 5 09:49:52.359314 systemd[1]: Stopped systemd-modules-load.service - Load Kernel Modules. Sep 5 09:49:52.382959 systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Sep 5 09:49:52.383324 systemd[1]: Stopped systemd-tmpfiles-setup.service - Create System Files and Directories. Sep 5 09:49:52.403953 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 5 09:49:52.404314 systemd[1]: Stopped systemd-udev-trigger.service - Coldplug All udev Devices. Sep 5 09:49:52.425993 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 5 09:49:52.426362 systemd[1]: Stopped dracut-pre-trigger.service - dracut pre-trigger hook. Sep 5 09:49:52.459436 systemd[1]: Stopping systemd-udevd.service - Rule-based Manager for Device Events and Files... Sep 5 09:49:52.490024 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 5 09:49:52.490398 systemd[1]: Stopped systemd-udevd.service - Rule-based Manager for Device Events and Files. Sep 5 09:49:52.506112 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 5 09:49:52.506347 systemd[1]: Finished initrd-cleanup.service - Cleaning Up and Shutting Down Daemons. Sep 5 09:49:52.523712 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 5 09:49:52.523889 systemd[1]: Closed systemd-udevd-control.socket - udev Control Socket. Sep 5 09:49:52.544601 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 5 09:49:52.544699 systemd[1]: Closed systemd-udevd-kernel.socket - udev Kernel Socket. Sep 5 09:49:52.562638 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 5 09:49:52.864466 systemd-journald[258]: Received SIGTERM from PID 1 (systemd). Sep 5 09:49:52.562791 systemd[1]: Stopped dracut-pre-udev.service - dracut pre-udev hook. Sep 5 09:49:52.592543 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 5 09:49:52.592710 systemd[1]: Stopped dracut-cmdline.service - dracut cmdline hook. Sep 5 09:49:52.634537 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 5 09:49:52.634719 systemd[1]: Stopped dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Sep 5 09:49:52.676596 systemd[1]: Starting initrd-udevadm-cleanup-db.service - Cleanup udev Database... Sep 5 09:49:52.687528 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Sep 5 09:49:52.687560 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Sep 5 09:49:52.718670 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 5 09:49:52.718744 systemd[1]: Stopped systemd-vconsole-setup.service - Virtual Console Setup. Sep 5 09:49:52.739502 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 5 09:49:52.739713 systemd[1]: Finished initrd-udevadm-cleanup-db.service - Cleanup udev Database. Sep 5 09:49:52.761562 systemd[1]: Reached target initrd-switch-root.target - Switch Root. Sep 5 09:49:52.792665 systemd[1]: Starting initrd-switch-root.service - Switch Root... Sep 5 09:49:52.814806 systemd[1]: Switching root. Sep 5 09:49:52.864790 systemd-journald[258]: Journal stopped Sep 5 09:49:47.009941 kernel: microcode: updated early: 0xf4 -> 0xfc, date = 2023-07-27 Sep 5 09:49:47.009955 kernel: Linux version 6.6.48-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 13.3.1_p20240614 p17) 13.3.1 20240614, GNU ld (Gentoo 2.42 p3) 2.42.0) #1 SMP PREEMPT_DYNAMIC Wed Sep 4 15:54:07 -00 2024 Sep 5 09:49:47.009961 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=ceda2dd706627da8006bcd6ae77ea155b2a7de6732e2c1c7ab4bed271400663d Sep 5 09:49:47.009967 kernel: BIOS-provided physical RAM map: Sep 5 09:49:47.009971 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Sep 5 09:49:47.009974 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Sep 5 09:49:47.009979 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Sep 5 09:49:47.009983 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Sep 5 09:49:47.009988 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Sep 5 09:49:47.009992 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000081b27fff] usable Sep 5 09:49:47.009996 kernel: BIOS-e820: [mem 0x0000000081b28000-0x0000000081b28fff] ACPI NVS Sep 5 09:49:47.010001 kernel: BIOS-e820: [mem 0x0000000081b29000-0x0000000081b29fff] reserved Sep 5 09:49:47.010005 kernel: BIOS-e820: [mem 0x0000000081b2a000-0x000000008afccfff] usable Sep 5 09:49:47.010009 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Sep 5 09:49:47.010014 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Sep 5 09:49:47.010019 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Sep 5 09:49:47.010025 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Sep 5 09:49:47.010030 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Sep 5 09:49:47.010034 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Sep 5 09:49:47.010039 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Sep 5 09:49:47.010044 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Sep 5 09:49:47.010048 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Sep 5 09:49:47.010053 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Sep 5 09:49:47.010058 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Sep 5 09:49:47.010062 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Sep 5 09:49:47.010067 kernel: NX (Execute Disable) protection: active Sep 5 09:49:47.010072 kernel: APIC: Static calls initialized Sep 5 09:49:47.010077 kernel: SMBIOS 3.2.1 present. Sep 5 09:49:47.010082 kernel: DMI: Supermicro SYS-5019C-MR-PH004/X11SCM-F, BIOS 1.9 09/16/2022 Sep 5 09:49:47.010087 kernel: tsc: Detected 3400.000 MHz processor Sep 5 09:49:47.010092 kernel: tsc: Detected 3399.906 MHz TSC Sep 5 09:49:47.010097 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Sep 5 09:49:47.010102 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Sep 5 09:49:47.010107 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Sep 5 09:49:47.010112 kernel: MTRR map: 4 entries (3 fixed + 1 variable; max 23), built from 10 variable MTRRs Sep 5 09:49:47.010117 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Sep 5 09:49:47.010121 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Sep 5 09:49:47.010126 kernel: Using GB pages for direct mapping Sep 5 09:49:47.010132 kernel: ACPI: Early table checksum verification disabled Sep 5 09:49:47.010137 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Sep 5 09:49:47.010144 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Sep 5 09:49:47.010149 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Sep 5 09:49:47.010154 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Sep 5 09:49:47.010159 kernel: ACPI: FACS 0x000000008C66CF80 000040 Sep 5 09:49:47.010165 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Sep 5 09:49:47.010170 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Sep 5 09:49:47.010176 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Sep 5 09:49:47.010181 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Sep 5 09:49:47.010186 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Sep 5 09:49:47.010191 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Sep 5 09:49:47.010196 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Sep 5 09:49:47.010202 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Sep 5 09:49:47.010207 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Sep 5 09:49:47.010212 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Sep 5 09:49:47.010217 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Sep 5 09:49:47.010222 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Sep 5 09:49:47.010227 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Sep 5 09:49:47.010232 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Sep 5 09:49:47.010237 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Sep 5 09:49:47.010242 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Sep 5 09:49:47.010248 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Sep 5 09:49:47.010253 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Sep 5 09:49:47.010258 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Sep 5 09:49:47.010264 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Sep 5 09:49:47.010269 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Sep 5 09:49:47.010274 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Sep 5 09:49:47.010279 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Sep 5 09:49:47.010286 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Sep 5 09:49:47.010293 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Sep 5 09:49:47.010298 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Sep 5 09:49:47.010303 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Sep 5 09:49:47.010308 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Sep 5 09:49:47.010313 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Sep 5 09:49:47.010318 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Sep 5 09:49:47.010323 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Sep 5 09:49:47.010328 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Sep 5 09:49:47.010333 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Sep 5 09:49:47.010340 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Sep 5 09:49:47.010345 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Sep 5 09:49:47.010350 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Sep 5 09:49:47.010355 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Sep 5 09:49:47.010360 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Sep 5 09:49:47.010365 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Sep 5 09:49:47.010370 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Sep 5 09:49:47.010375 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Sep 5 09:49:47.010380 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Sep 5 09:49:47.010386 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Sep 5 09:49:47.010391 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Sep 5 09:49:47.010396 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Sep 5 09:49:47.010401 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Sep 5 09:49:47.010406 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Sep 5 09:49:47.010411 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Sep 5 09:49:47.010416 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Sep 5 09:49:47.010421 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Sep 5 09:49:47.010426 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Sep 5 09:49:47.010431 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Sep 5 09:49:47.010437 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Sep 5 09:49:47.010442 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Sep 5 09:49:47.010447 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Sep 5 09:49:47.010452 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Sep 5 09:49:47.010457 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Sep 5 09:49:47.010462 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Sep 5 09:49:47.010467 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Sep 5 09:49:47.010472 kernel: No NUMA configuration found Sep 5 09:49:47.010478 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Sep 5 09:49:47.010483 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Sep 5 09:49:47.010489 kernel: Zone ranges: Sep 5 09:49:47.010494 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Sep 5 09:49:47.010499 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Sep 5 09:49:47.010504 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Sep 5 09:49:47.010509 kernel: Movable zone start for each node Sep 5 09:49:47.010514 kernel: Early memory node ranges Sep 5 09:49:47.010519 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Sep 5 09:49:47.010524 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Sep 5 09:49:47.010529 kernel: node 0: [mem 0x0000000040400000-0x0000000081b27fff] Sep 5 09:49:47.010535 kernel: node 0: [mem 0x0000000081b2a000-0x000000008afccfff] Sep 5 09:49:47.010540 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Sep 5 09:49:47.010545 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Sep 5 09:49:47.010554 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Sep 5 09:49:47.010560 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Sep 5 09:49:47.010565 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Sep 5 09:49:47.010571 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Sep 5 09:49:47.010577 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Sep 5 09:49:47.010582 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Sep 5 09:49:47.010588 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Sep 5 09:49:47.010593 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Sep 5 09:49:47.010599 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Sep 5 09:49:47.010604 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Sep 5 09:49:47.010610 kernel: ACPI: PM-Timer IO Port: 0x1808 Sep 5 09:49:47.010615 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Sep 5 09:49:47.010621 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Sep 5 09:49:47.010627 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Sep 5 09:49:47.010632 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Sep 5 09:49:47.010638 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Sep 5 09:49:47.010643 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Sep 5 09:49:47.010648 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Sep 5 09:49:47.010654 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Sep 5 09:49:47.010659 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Sep 5 09:49:47.010664 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Sep 5 09:49:47.010670 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Sep 5 09:49:47.010675 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Sep 5 09:49:47.010682 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Sep 5 09:49:47.010687 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Sep 5 09:49:47.010692 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Sep 5 09:49:47.010698 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Sep 5 09:49:47.010703 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Sep 5 09:49:47.010708 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Sep 5 09:49:47.010714 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Sep 5 09:49:47.010719 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Sep 5 09:49:47.010725 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Sep 5 09:49:47.010731 kernel: TSC deadline timer available Sep 5 09:49:47.010737 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Sep 5 09:49:47.010742 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Sep 5 09:49:47.010747 kernel: Booting paravirtualized kernel on bare hardware Sep 5 09:49:47.010753 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Sep 5 09:49:47.010758 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:16 nr_cpu_ids:16 nr_node_ids:1 Sep 5 09:49:47.010764 kernel: percpu: Embedded 58 pages/cpu s196904 r8192 d32472 u262144 Sep 5 09:49:47.010769 kernel: pcpu-alloc: s196904 r8192 d32472 u262144 alloc=1*2097152 Sep 5 09:49:47.010775 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Sep 5 09:49:47.010781 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=ceda2dd706627da8006bcd6ae77ea155b2a7de6732e2c1c7ab4bed271400663d Sep 5 09:49:47.010787 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Sep 5 09:49:47.010792 kernel: random: crng init done Sep 5 09:49:47.010798 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Sep 5 09:49:47.010803 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Sep 5 09:49:47.010809 kernel: Fallback order for Node 0: 0 Sep 5 09:49:47.010814 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Sep 5 09:49:47.010819 kernel: Policy zone: Normal Sep 5 09:49:47.010826 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 5 09:49:47.010831 kernel: software IO TLB: area num 16. Sep 5 09:49:47.010837 kernel: Memory: 32720316K/33452980K available (12288K kernel code, 2304K rwdata, 22708K rodata, 42704K init, 2488K bss, 732404K reserved, 0K cma-reserved) Sep 5 09:49:47.010843 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Sep 5 09:49:47.010848 kernel: ftrace: allocating 37748 entries in 148 pages Sep 5 09:49:47.010854 kernel: ftrace: allocated 148 pages with 3 groups Sep 5 09:49:47.010859 kernel: Dynamic Preempt: voluntary Sep 5 09:49:47.010865 kernel: rcu: Preemptible hierarchical RCU implementation. Sep 5 09:49:47.010871 kernel: rcu: RCU event tracing is enabled. Sep 5 09:49:47.010877 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Sep 5 09:49:47.010883 kernel: Trampoline variant of Tasks RCU enabled. Sep 5 09:49:47.010888 kernel: Rude variant of Tasks RCU enabled. Sep 5 09:49:47.010894 kernel: Tracing variant of Tasks RCU enabled. Sep 5 09:49:47.010899 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 5 09:49:47.010904 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Sep 5 09:49:47.010910 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Sep 5 09:49:47.010915 kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Sep 5 09:49:47.010921 kernel: Console: colour dummy device 80x25 Sep 5 09:49:47.010927 kernel: printk: console [tty0] enabled Sep 5 09:49:47.010932 kernel: printk: console [ttyS1] enabled Sep 5 09:49:47.010938 kernel: ACPI: Core revision 20230628 Sep 5 09:49:47.010943 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Sep 5 09:49:47.010949 kernel: APIC: Switch to symmetric I/O mode setup Sep 5 09:49:47.010954 kernel: DMAR: Host address width 39 Sep 5 09:49:47.010959 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Sep 5 09:49:47.010965 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Sep 5 09:49:47.010970 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Sep 5 09:49:47.010977 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Sep 5 09:49:47.010982 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Sep 5 09:49:47.010988 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Sep 5 09:49:47.010993 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Sep 5 09:49:47.010998 kernel: x2apic enabled Sep 5 09:49:47.011004 kernel: APIC: Switched APIC routing to: cluster x2apic Sep 5 09:49:47.011009 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Sep 5 09:49:47.011015 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Sep 5 09:49:47.011020 kernel: CPU0: Thermal monitoring enabled (TM1) Sep 5 09:49:47.011027 kernel: process: using mwait in idle threads Sep 5 09:49:47.011032 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Sep 5 09:49:47.011037 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Sep 5 09:49:47.011043 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Sep 5 09:49:47.011048 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Sep 5 09:49:47.011054 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Sep 5 09:49:47.011059 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Sep 5 09:49:47.011064 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Sep 5 09:49:47.011070 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Sep 5 09:49:47.011075 kernel: RETBleed: Mitigation: Enhanced IBRS Sep 5 09:49:47.011080 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Sep 5 09:49:47.011087 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Sep 5 09:49:47.011092 kernel: TAA: Mitigation: TSX disabled Sep 5 09:49:47.011097 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Sep 5 09:49:47.011103 kernel: SRBDS: Mitigation: Microcode Sep 5 09:49:47.011108 kernel: GDS: Mitigation: Microcode Sep 5 09:49:47.011113 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Sep 5 09:49:47.011119 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Sep 5 09:49:47.011124 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Sep 5 09:49:47.011130 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Sep 5 09:49:47.011135 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Sep 5 09:49:47.011140 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Sep 5 09:49:47.011147 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Sep 5 09:49:47.011152 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Sep 5 09:49:47.011157 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Sep 5 09:49:47.011163 kernel: Freeing SMP alternatives memory: 32K Sep 5 09:49:47.011168 kernel: pid_max: default: 32768 minimum: 301 Sep 5 09:49:47.011173 kernel: LSM: initializing lsm=lockdown,capability,landlock,selinux,integrity Sep 5 09:49:47.011179 kernel: landlock: Up and running. Sep 5 09:49:47.011184 kernel: SELinux: Initializing. Sep 5 09:49:47.011190 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 5 09:49:47.011195 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 5 09:49:47.011200 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Sep 5 09:49:47.011207 kernel: RCU Tasks: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1. Sep 5 09:49:47.011212 kernel: RCU Tasks Rude: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1. Sep 5 09:49:47.011218 kernel: RCU Tasks Trace: Setting shift to 4 and lim to 1 rcu_task_cb_adjust=1. Sep 5 09:49:47.011223 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Sep 5 09:49:47.011229 kernel: ... version: 4 Sep 5 09:49:47.011234 kernel: ... bit width: 48 Sep 5 09:49:47.011240 kernel: ... generic registers: 4 Sep 5 09:49:47.011245 kernel: ... value mask: 0000ffffffffffff Sep 5 09:49:47.011250 kernel: ... max period: 00007fffffffffff Sep 5 09:49:47.011257 kernel: ... fixed-purpose events: 3 Sep 5 09:49:47.011262 kernel: ... event mask: 000000070000000f Sep 5 09:49:47.011268 kernel: signal: max sigframe size: 2032 Sep 5 09:49:47.011273 kernel: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Sep 5 09:49:47.011279 kernel: rcu: Hierarchical SRCU implementation. Sep 5 09:49:47.011286 kernel: rcu: Max phase no-delay instances is 400. Sep 5 09:49:47.011291 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Sep 5 09:49:47.011297 kernel: smp: Bringing up secondary CPUs ... Sep 5 09:49:47.011302 kernel: smpboot: x86: Booting SMP configuration: Sep 5 09:49:47.011308 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 #9 #10 #11 #12 #13 #14 #15 Sep 5 09:49:47.011314 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Sep 5 09:49:47.011320 kernel: smp: Brought up 1 node, 16 CPUs Sep 5 09:49:47.011325 kernel: smpboot: Max logical packages: 1 Sep 5 09:49:47.011331 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Sep 5 09:49:47.011336 kernel: devtmpfs: initialized Sep 5 09:49:47.011342 kernel: x86/mm: Memory block size: 128MB Sep 5 09:49:47.011347 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x81b28000-0x81b28fff] (4096 bytes) Sep 5 09:49:47.011352 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Sep 5 09:49:47.011359 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 5 09:49:47.011365 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Sep 5 09:49:47.011370 kernel: pinctrl core: initialized pinctrl subsystem Sep 5 09:49:47.011375 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 5 09:49:47.011381 kernel: audit: initializing netlink subsys (disabled) Sep 5 09:49:47.011386 kernel: audit: type=2000 audit(1725529781.039:1): state=initialized audit_enabled=0 res=1 Sep 5 09:49:47.011391 kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 5 09:49:47.011397 kernel: thermal_sys: Registered thermal governor 'user_space' Sep 5 09:49:47.011402 kernel: cpuidle: using governor menu Sep 5 09:49:47.011408 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 5 09:49:47.011414 kernel: dca service started, version 1.12.1 Sep 5 09:49:47.011419 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Sep 5 09:49:47.011425 kernel: PCI: Using configuration type 1 for base access Sep 5 09:49:47.011430 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Sep 5 09:49:47.011435 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Sep 5 09:49:47.011441 kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Sep 5 09:49:47.011446 kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Sep 5 09:49:47.011452 kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Sep 5 09:49:47.011458 kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Sep 5 09:49:47.011464 kernel: ACPI: Added _OSI(Module Device) Sep 5 09:49:47.011469 kernel: ACPI: Added _OSI(Processor Device) Sep 5 09:49:47.011474 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Sep 5 09:49:47.011480 kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 5 09:49:47.011485 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Sep 5 09:49:47.011491 kernel: ACPI: Dynamic OEM Table Load: Sep 5 09:49:47.011496 kernel: ACPI: SSDT 0xFFFF9C0301EC8800 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Sep 5 09:49:47.011501 kernel: ACPI: Dynamic OEM Table Load: Sep 5 09:49:47.011508 kernel: ACPI: SSDT 0xFFFF9C0301EC4800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Sep 5 09:49:47.011513 kernel: ACPI: Dynamic OEM Table Load: Sep 5 09:49:47.011519 kernel: ACPI: SSDT 0xFFFF9C0301537400 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Sep 5 09:49:47.011524 kernel: ACPI: Dynamic OEM Table Load: Sep 5 09:49:47.011529 kernel: ACPI: SSDT 0xFFFF9C0301EC2000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Sep 5 09:49:47.011535 kernel: ACPI: Dynamic OEM Table Load: Sep 5 09:49:47.011540 kernel: ACPI: SSDT 0xFFFF9C0301ED4000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Sep 5 09:49:47.011545 kernel: ACPI: Dynamic OEM Table Load: Sep 5 09:49:47.011551 kernel: ACPI: SSDT 0xFFFF9C0301ECDC00 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Sep 5 09:49:47.011556 kernel: ACPI: _OSC evaluated successfully for all CPUs Sep 5 09:49:47.011563 kernel: ACPI: Interpreter enabled Sep 5 09:49:47.011568 kernel: ACPI: PM: (supports S0 S5) Sep 5 09:49:47.011573 kernel: ACPI: Using IOAPIC for interrupt routing Sep 5 09:49:47.011579 kernel: HEST: Enabling Firmware First mode for corrected errors. Sep 5 09:49:47.011584 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Sep 5 09:49:47.011589 kernel: HEST: Table parsing has been initialized. Sep 5 09:49:47.011595 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Sep 5 09:49:47.011600 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Sep 5 09:49:47.011606 kernel: PCI: Using E820 reservations for host bridge windows Sep 5 09:49:47.011612 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Sep 5 09:49:47.011618 kernel: ACPI: \_SB_.PCI0.XDCI.USBC: New power resource Sep 5 09:49:47.011623 kernel: ACPI: \_SB_.PCI0.SAT0.VOL0.V0PR: New power resource Sep 5 09:49:47.011629 kernel: ACPI: \_SB_.PCI0.SAT0.VOL1.V1PR: New power resource Sep 5 09:49:47.011634 kernel: ACPI: \_SB_.PCI0.SAT0.VOL2.V2PR: New power resource Sep 5 09:49:47.011639 kernel: ACPI: \_SB_.PCI0.CNVW.WRST: New power resource Sep 5 09:49:47.011645 kernel: ACPI: \_TZ_.FN00: New power resource Sep 5 09:49:47.011650 kernel: ACPI: \_TZ_.FN01: New power resource Sep 5 09:49:47.011656 kernel: ACPI: \_TZ_.FN02: New power resource Sep 5 09:49:47.011662 kernel: ACPI: \_TZ_.FN03: New power resource Sep 5 09:49:47.011668 kernel: ACPI: \_TZ_.FN04: New power resource Sep 5 09:49:47.011673 kernel: ACPI: \PIN_: New power resource Sep 5 09:49:47.011679 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Sep 5 09:49:47.011752 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Sep 5 09:49:47.011808 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Sep 5 09:49:47.011856 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Sep 5 09:49:47.011865 kernel: PCI host bridge to bus 0000:00 Sep 5 09:49:47.011917 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Sep 5 09:49:47.011961 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Sep 5 09:49:47.012005 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Sep 5 09:49:47.012046 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Sep 5 09:49:47.012089 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Sep 5 09:49:47.012131 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Sep 5 09:49:47.012192 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Sep 5 09:49:47.012245 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Sep 5 09:49:47.012300 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Sep 5 09:49:47.012356 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Sep 5 09:49:47.012405 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Sep 5 09:49:47.012457 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Sep 5 09:49:47.012508 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Sep 5 09:49:47.012561 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Sep 5 09:49:47.012609 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Sep 5 09:49:47.012657 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Sep 5 09:49:47.012709 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Sep 5 09:49:47.012758 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Sep 5 09:49:47.012807 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Sep 5 09:49:47.012859 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Sep 5 09:49:47.012906 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Sep 5 09:49:47.012959 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Sep 5 09:49:47.013007 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Sep 5 09:49:47.013059 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Sep 5 09:49:47.013108 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Sep 5 09:49:47.013158 kernel: pci 0000:00:16.0: PME# supported from D3hot Sep 5 09:49:47.013220 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Sep 5 09:49:47.013270 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Sep 5 09:49:47.013321 kernel: pci 0000:00:16.1: PME# supported from D3hot Sep 5 09:49:47.013373 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Sep 5 09:49:47.013422 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Sep 5 09:49:47.013472 kernel: pci 0000:00:16.4: PME# supported from D3hot Sep 5 09:49:47.013525 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Sep 5 09:49:47.013573 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Sep 5 09:49:47.013621 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Sep 5 09:49:47.013668 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Sep 5 09:49:47.013715 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Sep 5 09:49:47.013762 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Sep 5 09:49:47.013813 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Sep 5 09:49:47.013860 kernel: pci 0000:00:17.0: PME# supported from D3hot Sep 5 09:49:47.013913 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Sep 5 09:49:47.013961 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Sep 5 09:49:47.014016 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Sep 5 09:49:47.014066 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Sep 5 09:49:47.014119 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Sep 5 09:49:47.014168 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Sep 5 09:49:47.014226 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Sep 5 09:49:47.014308 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Sep 5 09:49:47.014376 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Sep 5 09:49:47.014425 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Sep 5 09:49:47.014475 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Sep 5 09:49:47.014523 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Sep 5 09:49:47.014574 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Sep 5 09:49:47.014626 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Sep 5 09:49:47.014675 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Sep 5 09:49:47.014724 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Sep 5 09:49:47.014775 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Sep 5 09:49:47.014823 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Sep 5 09:49:47.014881 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Sep 5 09:49:47.014931 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Sep 5 09:49:47.014983 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Sep 5 09:49:47.015030 kernel: pci 0000:01:00.0: PME# supported from D3cold Sep 5 09:49:47.015079 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Sep 5 09:49:47.015128 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Sep 5 09:49:47.015182 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Sep 5 09:49:47.015231 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Sep 5 09:49:47.015280 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Sep 5 09:49:47.015366 kernel: pci 0000:01:00.1: PME# supported from D3cold Sep 5 09:49:47.015415 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Sep 5 09:49:47.015463 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Sep 5 09:49:47.015512 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Sep 5 09:49:47.015560 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Sep 5 09:49:47.015607 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Sep 5 09:49:47.015655 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Sep 5 09:49:47.015707 kernel: pci 0000:03:00.0: working around ROM BAR overlap defect Sep 5 09:49:47.015809 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Sep 5 09:49:47.015859 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Sep 5 09:49:47.015907 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Sep 5 09:49:47.015957 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Sep 5 09:49:47.016005 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Sep 5 09:49:47.016054 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Sep 5 09:49:47.016101 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Sep 5 09:49:47.016152 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Sep 5 09:49:47.016204 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect Sep 5 09:49:47.016254 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Sep 5 09:49:47.016323 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Sep 5 09:49:47.016388 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Sep 5 09:49:47.016437 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Sep 5 09:49:47.016485 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Sep 5 09:49:47.016604 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Sep 5 09:49:47.016675 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Sep 5 09:49:47.016722 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Sep 5 09:49:47.016770 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Sep 5 09:49:47.016823 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Sep 5 09:49:47.016872 kernel: pci 0000:06:00.0: enabling Extended Tags Sep 5 09:49:47.016922 kernel: pci 0000:06:00.0: supports D1 D2 Sep 5 09:49:47.016971 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Sep 5 09:49:47.017021 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Sep 5 09:49:47.017070 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Sep 5 09:49:47.017116 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Sep 5 09:49:47.017168 kernel: pci_bus 0000:07: extended config space not accessible Sep 5 09:49:47.017225 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Sep 5 09:49:47.017278 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Sep 5 09:49:47.017375 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Sep 5 09:49:47.017429 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Sep 5 09:49:47.017481 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Sep 5 09:49:47.017530 kernel: pci 0000:07:00.0: supports D1 D2 Sep 5 09:49:47.017582 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Sep 5 09:49:47.017631 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Sep 5 09:49:47.017681 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Sep 5 09:49:47.017730 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Sep 5 09:49:47.017738 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Sep 5 09:49:47.017746 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Sep 5 09:49:47.017753 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Sep 5 09:49:47.017758 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Sep 5 09:49:47.017764 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Sep 5 09:49:47.017770 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Sep 5 09:49:47.017775 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Sep 5 09:49:47.017781 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Sep 5 09:49:47.017787 kernel: iommu: Default domain type: Translated Sep 5 09:49:47.017792 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Sep 5 09:49:47.017799 kernel: PCI: Using ACPI for IRQ routing Sep 5 09:49:47.017805 kernel: PCI: pci_cache_line_size set to 64 bytes Sep 5 09:49:47.017810 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Sep 5 09:49:47.017816 kernel: e820: reserve RAM buffer [mem 0x81b28000-0x83ffffff] Sep 5 09:49:47.017822 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Sep 5 09:49:47.017827 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Sep 5 09:49:47.017833 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Sep 5 09:49:47.017838 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Sep 5 09:49:47.017889 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Sep 5 09:49:47.017940 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Sep 5 09:49:47.017990 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Sep 5 09:49:47.017999 kernel: vgaarb: loaded Sep 5 09:49:47.018005 kernel: clocksource: Switched to clocksource tsc-early Sep 5 09:49:47.018011 kernel: VFS: Disk quotas dquot_6.6.0 Sep 5 09:49:47.018016 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 5 09:49:47.018022 kernel: pnp: PnP ACPI init Sep 5 09:49:47.018070 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Sep 5 09:49:47.018120 kernel: pnp 00:02: [dma 0 disabled] Sep 5 09:49:47.018169 kernel: pnp 00:03: [dma 0 disabled] Sep 5 09:49:47.018214 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Sep 5 09:49:47.018259 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Sep 5 09:49:47.018333 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Sep 5 09:49:47.018404 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Sep 5 09:49:47.018451 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Sep 5 09:49:47.018494 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Sep 5 09:49:47.018538 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Sep 5 09:49:47.018581 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Sep 5 09:49:47.018624 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Sep 5 09:49:47.018667 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Sep 5 09:49:47.018710 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Sep 5 09:49:47.018759 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Sep 5 09:49:47.018804 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Sep 5 09:49:47.018850 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Sep 5 09:49:47.018895 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Sep 5 09:49:47.018938 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Sep 5 09:49:47.018982 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Sep 5 09:49:47.019026 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Sep 5 09:49:47.019074 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Sep 5 09:49:47.019083 kernel: pnp: PnP ACPI: found 10 devices Sep 5 09:49:47.019089 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Sep 5 09:49:47.019095 kernel: NET: Registered PF_INET protocol family Sep 5 09:49:47.019101 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 5 09:49:47.019107 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Sep 5 09:49:47.019113 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 5 09:49:47.019118 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Sep 5 09:49:47.019126 kernel: TCP bind hash table entries: 65536 (order: 9, 2097152 bytes, linear) Sep 5 09:49:47.019131 kernel: TCP: Hash tables configured (established 262144 bind 65536) Sep 5 09:49:47.019137 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Sep 5 09:49:47.019143 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Sep 5 09:49:47.019148 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 5 09:49:47.019154 kernel: NET: Registered PF_XDP protocol family Sep 5 09:49:47.019202 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Sep 5 09:49:47.019252 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Sep 5 09:49:47.019326 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Sep 5 09:49:47.019397 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Sep 5 09:49:47.019448 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Sep 5 09:49:47.019497 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Sep 5 09:49:47.019547 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Sep 5 09:49:47.019595 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Sep 5 09:49:47.019646 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Sep 5 09:49:47.019694 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Sep 5 09:49:47.019745 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Sep 5 09:49:47.019792 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Sep 5 09:49:47.019841 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Sep 5 09:49:47.019888 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Sep 5 09:49:47.019936 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Sep 5 09:49:47.019987 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Sep 5 09:49:47.020036 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Sep 5 09:49:47.020084 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Sep 5 09:49:47.020133 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Sep 5 09:49:47.020182 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Sep 5 09:49:47.020230 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Sep 5 09:49:47.020279 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Sep 5 09:49:47.020375 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Sep 5 09:49:47.020423 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Sep 5 09:49:47.020470 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Sep 5 09:49:47.020515 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Sep 5 09:49:47.020557 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Sep 5 09:49:47.020601 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Sep 5 09:49:47.020643 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Sep 5 09:49:47.020686 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Sep 5 09:49:47.020734 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Sep 5 09:49:47.020781 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Sep 5 09:49:47.020829 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Sep 5 09:49:47.020874 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Sep 5 09:49:47.020924 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Sep 5 09:49:47.020968 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Sep 5 09:49:47.021017 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Sep 5 09:49:47.021064 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Sep 5 09:49:47.021111 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Sep 5 09:49:47.021157 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Sep 5 09:49:47.021165 kernel: PCI: CLS 64 bytes, default 64 Sep 5 09:49:47.021171 kernel: DMAR: No ATSR found Sep 5 09:49:47.021177 kernel: DMAR: No SATC found Sep 5 09:49:47.021183 kernel: DMAR: dmar0: Using Queued invalidation Sep 5 09:49:47.021231 kernel: pci 0000:00:00.0: Adding to iommu group 0 Sep 5 09:49:47.021280 kernel: pci 0000:00:01.0: Adding to iommu group 1 Sep 5 09:49:47.021373 kernel: pci 0000:00:08.0: Adding to iommu group 2 Sep 5 09:49:47.021421 kernel: pci 0000:00:12.0: Adding to iommu group 3 Sep 5 09:49:47.021469 kernel: pci 0000:00:14.0: Adding to iommu group 4 Sep 5 09:49:47.021517 kernel: pci 0000:00:14.2: Adding to iommu group 4 Sep 5 09:49:47.021565 kernel: pci 0000:00:15.0: Adding to iommu group 5 Sep 5 09:49:47.021613 kernel: pci 0000:00:15.1: Adding to iommu group 5 Sep 5 09:49:47.021662 kernel: pci 0000:00:16.0: Adding to iommu group 6 Sep 5 09:49:47.021710 kernel: pci 0000:00:16.1: Adding to iommu group 6 Sep 5 09:49:47.021760 kernel: pci 0000:00:16.4: Adding to iommu group 6 Sep 5 09:49:47.021808 kernel: pci 0000:00:17.0: Adding to iommu group 7 Sep 5 09:49:47.021856 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Sep 5 09:49:47.021904 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Sep 5 09:49:47.021951 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Sep 5 09:49:47.021999 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Sep 5 09:49:47.022048 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Sep 5 09:49:47.022096 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Sep 5 09:49:47.022145 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Sep 5 09:49:47.022194 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Sep 5 09:49:47.022241 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Sep 5 09:49:47.022294 kernel: pci 0000:01:00.0: Adding to iommu group 1 Sep 5 09:49:47.022387 kernel: pci 0000:01:00.1: Adding to iommu group 1 Sep 5 09:49:47.022437 kernel: pci 0000:03:00.0: Adding to iommu group 15 Sep 5 09:49:47.022487 kernel: pci 0000:04:00.0: Adding to iommu group 16 Sep 5 09:49:47.022537 kernel: pci 0000:06:00.0: Adding to iommu group 17 Sep 5 09:49:47.022592 kernel: pci 0000:07:00.0: Adding to iommu group 17 Sep 5 09:49:47.022600 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Sep 5 09:49:47.022606 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Sep 5 09:49:47.022612 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Sep 5 09:49:47.022618 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Sep 5 09:49:47.022624 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Sep 5 09:49:47.022630 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Sep 5 09:49:47.022635 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Sep 5 09:49:47.022684 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Sep 5 09:49:47.022695 kernel: Initialise system trusted keyrings Sep 5 09:49:47.022701 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Sep 5 09:49:47.022707 kernel: Key type asymmetric registered Sep 5 09:49:47.022712 kernel: Asymmetric key parser 'x509' registered Sep 5 09:49:47.022718 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 251) Sep 5 09:49:47.022723 kernel: io scheduler mq-deadline registered Sep 5 09:49:47.022729 kernel: io scheduler kyber registered Sep 5 09:49:47.022735 kernel: io scheduler bfq registered Sep 5 09:49:47.022785 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Sep 5 09:49:47.022833 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Sep 5 09:49:47.022883 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Sep 5 09:49:47.022932 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Sep 5 09:49:47.022981 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Sep 5 09:49:47.023029 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Sep 5 09:49:47.023081 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Sep 5 09:49:47.023091 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Sep 5 09:49:47.023097 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Sep 5 09:49:47.023103 kernel: pstore: Using crash dump compression: deflate Sep 5 09:49:47.023109 kernel: pstore: Registered erst as persistent store backend Sep 5 09:49:47.023115 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Sep 5 09:49:47.023120 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 5 09:49:47.023126 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Sep 5 09:49:47.023132 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Sep 5 09:49:47.023138 kernel: hpet_acpi_add: no address or irqs in _CRS Sep 5 09:49:47.023186 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Sep 5 09:49:47.023195 kernel: i8042: PNP: No PS/2 controller found. Sep 5 09:49:47.023238 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Sep 5 09:49:47.023283 kernel: rtc_cmos rtc_cmos: registered as rtc0 Sep 5 09:49:47.023375 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-09-05T09:49:45 UTC (1725529785) Sep 5 09:49:47.023420 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Sep 5 09:49:47.023428 kernel: intel_pstate: Intel P-state driver initializing Sep 5 09:49:47.023434 kernel: intel_pstate: Disabling energy efficiency optimization Sep 5 09:49:47.023442 kernel: intel_pstate: HWP enabled Sep 5 09:49:47.023447 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Sep 5 09:49:47.023453 kernel: vesafb: scrolling: redraw Sep 5 09:49:47.023459 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Sep 5 09:49:47.023465 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x00000000303248d6, using 768k, total 768k Sep 5 09:49:47.023470 kernel: Console: switching to colour frame buffer device 128x48 Sep 5 09:49:47.023476 kernel: fb0: VESA VGA frame buffer device Sep 5 09:49:47.023482 kernel: NET: Registered PF_INET6 protocol family Sep 5 09:49:47.023487 kernel: Segment Routing with IPv6 Sep 5 09:49:47.023494 kernel: In-situ OAM (IOAM) with IPv6 Sep 5 09:49:47.023500 kernel: NET: Registered PF_PACKET protocol family Sep 5 09:49:47.023505 kernel: Key type dns_resolver registered Sep 5 09:49:47.023511 kernel: microcode: Microcode Update Driver: v2.2. Sep 5 09:49:47.023517 kernel: IPI shorthand broadcast: enabled Sep 5 09:49:47.023522 kernel: sched_clock: Marking stable (2478000688, 1380821990)->(4397613211, -538790533) Sep 5 09:49:47.023528 kernel: registered taskstats version 1 Sep 5 09:49:47.023534 kernel: Loading compiled-in X.509 certificates Sep 5 09:49:47.023540 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 6.6.48-flatcar: 8669771ab5e11f458b79e6634fe685dacc266b18' Sep 5 09:49:47.023546 kernel: Key type .fscrypt registered Sep 5 09:49:47.023552 kernel: Key type fscrypt-provisioning registered Sep 5 09:49:47.023557 kernel: ima: Allocated hash algorithm: sha1 Sep 5 09:49:47.023563 kernel: ima: No architecture policies found Sep 5 09:49:47.023569 kernel: clk: Disabling unused clocks Sep 5 09:49:47.023575 kernel: Freeing unused kernel image (initmem) memory: 42704K Sep 5 09:49:47.023580 kernel: Write protecting the kernel read-only data: 36864k Sep 5 09:49:47.023586 kernel: Freeing unused kernel image (rodata/data gap) memory: 1868K Sep 5 09:49:47.023592 kernel: Run /init as init process Sep 5 09:49:47.023599 kernel: with arguments: Sep 5 09:49:47.023604 kernel: /init Sep 5 09:49:47.023610 kernel: with environment: Sep 5 09:49:47.023615 kernel: HOME=/ Sep 5 09:49:47.023621 kernel: TERM=linux Sep 5 09:49:47.023626 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Sep 5 09:49:47.023633 systemd[1]: systemd 255 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP -SYSVINIT default-hierarchy=unified) Sep 5 09:49:47.023641 systemd[1]: Detected architecture x86-64. Sep 5 09:49:47.023648 systemd[1]: Running in initrd. Sep 5 09:49:47.023654 systemd[1]: No hostname configured, using default hostname. Sep 5 09:49:47.023660 systemd[1]: Hostname set to <localhost>. Sep 5 09:49:47.023666 systemd[1]: Initializing machine ID from random generator. Sep 5 09:49:47.023672 systemd[1]: Queued start job for default target initrd.target. Sep 5 09:49:47.023678 systemd[1]: Started clevis-luks-askpass.path - Forward Password Requests to Clevis Directory Watch. Sep 5 09:49:47.023684 systemd[1]: Started systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch. Sep 5 09:49:47.023691 systemd[1]: Expecting device dev-disk-by\x2dlabel-OEM.device - /dev/disk/by-label/OEM... Sep 5 09:49:47.023697 systemd[1]: Expecting device dev-disk-by\x2dlabel-ROOT.device - /dev/disk/by-label/ROOT... Sep 5 09:49:47.023703 systemd[1]: Expecting device dev-disk-by\x2dpartlabel-ROOT.device - /dev/disk/by-partlabel/ROOT... Sep 5 09:49:47.023709 systemd[1]: Expecting device dev-disk-by\x2dpartlabel-USR\x2dA.device - /dev/disk/by-partlabel/USR-A... Sep 5 09:49:47.023716 systemd[1]: Expecting device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device - /dev/disk/by-partuuid/7130c94a-213a-4e5a-8e26-6cce9662f132... Sep 5 09:49:47.023722 kernel: tsc: Refined TSC clocksource calibration: 3407.998 MHz Sep 5 09:49:47.023728 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd208cfc, max_idle_ns: 440795283699 ns Sep 5 09:49:47.023734 kernel: clocksource: Switched to clocksource tsc Sep 5 09:49:47.023740 systemd[1]: Expecting device dev-mapper-usr.device - /dev/mapper/usr... Sep 5 09:49:47.023746 systemd[1]: Reached target cryptsetup-pre.target - Local Encrypted Volumes (Pre). Sep 5 09:49:47.023753 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes. Sep 5 09:49:47.023759 systemd[1]: Reached target ignition-diskful-subsequent.target - Ignition Subsequent Boot Disk Setup. Sep 5 09:49:47.023765 systemd[1]: Reached target paths.target - Path Units. Sep 5 09:49:47.023771 systemd[1]: Reached target slices.target - Slice Units. Sep 5 09:49:47.023777 systemd[1]: Reached target swap.target - Swaps. Sep 5 09:49:47.023782 systemd[1]: Reached target timers.target - Timer Units. Sep 5 09:49:47.023789 systemd[1]: Listening on iscsid.socket - Open-iSCSI iscsid Socket. Sep 5 09:49:47.023795 systemd[1]: Listening on iscsiuio.socket - Open-iSCSI iscsiuio Socket. Sep 5 09:49:47.023802 systemd[1]: Listening on systemd-journald-dev-log.socket - Journal Socket (/dev/log). Sep 5 09:49:47.023808 systemd[1]: Listening on systemd-journald.socket - Journal Socket. Sep 5 09:49:47.023813 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. Sep 5 09:49:47.023820 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. Sep 5 09:49:47.023826 systemd[1]: Reached target sockets.target - Socket Units. Sep 5 09:49:47.023832 systemd[1]: Starting ignition-setup-pre.service - Ignition env setup... Sep 5 09:49:47.023839 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... Sep 5 09:49:47.023845 systemd[1]: Starting systemd-fsck-usr.service... Sep 5 09:49:47.023851 systemd[1]: Starting systemd-journald.service - Journal Service... Sep 5 09:49:47.023867 systemd-journald[258]: Collecting audit messages is disabled. Sep 5 09:49:47.023882 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... Sep 5 09:49:47.023889 systemd-journald[258]: Journal started Sep 5 09:49:47.023903 systemd-journald[258]: Runtime Journal (/run/log/journal/850e23a8e87840daaee177e78fa8c26b) is 8.0M, max 639.9M, 631.9M free. Sep 5 09:49:47.030368 systemd-modules-load[259]: Inserted module 'overlay' Sep 5 09:49:47.059290 systemd[1]: Starting systemd-vconsole-setup.service - Virtual Console Setup... Sep 5 09:49:47.102307 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Sep 5 09:49:47.122291 systemd[1]: Started systemd-journald.service - Journal Service. Sep 5 09:49:47.122323 kernel: Bridge firewalling registered Sep 5 09:49:47.122355 systemd[1]: Finished ignition-setup-pre.service - Ignition env setup. Sep 5 09:49:47.139919 systemd-modules-load[259]: Inserted module 'br_netfilter' Sep 5 09:49:47.158738 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. Sep 5 09:49:47.178572 systemd[1]: Finished systemd-fsck-usr.service. Sep 5 09:49:47.198703 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules. Sep 5 09:49:47.215809 systemd[1]: Finished systemd-vconsole-setup.service - Virtual Console Setup. Sep 5 09:49:47.252538 systemd[1]: Starting dracut-cmdline-ask.service - dracut ask for additional cmdline parameters... Sep 5 09:49:47.263891 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables... Sep 5 09:49:47.277231 systemd[1]: Starting systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in /dev gracefully... Sep 5 09:49:47.277920 systemd[1]: Starting systemd-tmpfiles-setup.service - Create System Files and Directories... Sep 5 09:49:47.282435 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables. Sep 5 09:49:47.284342 systemd[1]: Finished systemd-tmpfiles-setup-dev-early.service - Create Static Device Nodes in /dev gracefully. Sep 5 09:49:47.285347 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... Sep 5 09:49:47.287096 systemd[1]: Finished systemd-tmpfiles-setup.service - Create System Files and Directories. Sep 5 09:49:47.290704 systemd[1]: Finished dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Sep 5 09:49:47.302739 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Sep 5 09:49:47.340525 systemd[1]: Starting dracut-cmdline.service - dracut cmdline hook... Sep 5 09:49:47.361412 dracut-cmdline[296]: dracut-dracut-053 Sep 5 09:49:47.361412 dracut-cmdline[296]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=ceda2dd706627da8006bcd6ae77ea155b2a7de6732e2c1c7ab4bed271400663d Sep 5 09:49:47.481316 kernel: SCSI subsystem initialized Sep 5 09:49:47.504329 kernel: Loading iSCSI transport class v2.0-870. Sep 5 09:49:47.527345 kernel: iscsi: registered transport (tcp) Sep 5 09:49:47.559379 kernel: iscsi: registered transport (qla4xxx) Sep 5 09:49:47.559398 kernel: QLogic iSCSI HBA Driver Sep 5 09:49:47.592721 systemd[1]: Finished dracut-cmdline.service - dracut cmdline hook. Sep 5 09:49:47.602652 systemd[1]: Starting dracut-pre-udev.service - dracut pre-udev hook... Sep 5 09:49:47.698874 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 5 09:49:47.698908 kernel: device-mapper: uevent: version 1.0.3 Sep 5 09:49:47.718672 kernel: device-mapper: ioctl: 4.48.0-ioctl (2023-03-01) initialised: dm-devel@redhat.com Sep 5 09:49:47.777356 kernel: raid6: avx2x4 gen() 53389 MB/s Sep 5 09:49:47.809289 kernel: raid6: avx2x2 gen() 52480 MB/s Sep 5 09:49:47.846245 kernel: raid6: avx2x1 gen() 44078 MB/s Sep 5 09:49:47.846264 kernel: raid6: using algorithm avx2x4 gen() 53389 MB/s Sep 5 09:49:47.893958 kernel: raid6: .... xor() 21632 MB/s, rmw enabled Sep 5 09:49:47.893976 kernel: raid6: using avx2x2 recovery algorithm Sep 5 09:49:47.935339 kernel: xor: automatically using best checksumming function avx Sep 5 09:49:48.053294 kernel: Btrfs loaded, zoned=no, fsverity=no Sep 5 09:49:48.058671 systemd[1]: Finished dracut-pre-udev.service - dracut pre-udev hook. Sep 5 09:49:48.092627 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... Sep 5 09:49:48.099717 systemd-udevd[485]: Using default interface naming scheme 'v255'. Sep 5 09:49:48.103442 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Sep 5 09:49:48.139555 systemd[1]: Starting dracut-pre-trigger.service - dracut pre-trigger hook... Sep 5 09:49:48.166509 systemd[1]: Finished dracut-pre-trigger.service - dracut pre-trigger hook. Sep 5 09:49:48.190555 dracut-pre-trigger[498]: rd.md=0: removing MD RAID activation Sep 5 09:49:48.192676 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... Sep 5 09:49:48.254599 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Sep 5 09:49:48.312300 kernel: pps_core: LinuxPPS API ver. 1 registered Sep 5 09:49:48.312325 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it> Sep 5 09:49:48.312343 kernel: cryptd: max_cpu_qlen set to 1000 Sep 5 09:49:48.279809 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 5 09:49:48.395480 kernel: libata version 3.00 loaded. Sep 5 09:49:48.395502 kernel: PTP clock support registered Sep 5 09:49:48.395510 kernel: ACPI: bus type USB registered Sep 5 09:49:48.395517 kernel: usbcore: registered new interface driver usbfs Sep 5 09:49:48.395525 kernel: usbcore: registered new interface driver hub Sep 5 09:49:48.395532 kernel: usbcore: registered new device driver usb Sep 5 09:49:48.395544 kernel: AVX2 version of gcm_enc/dec engaged. Sep 5 09:49:48.279844 systemd[1]: Stopped dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Sep 5 09:49:48.427348 kernel: AES CTR mode by8 optimization enabled Sep 5 09:49:48.414313 systemd[1]: Stopping dracut-cmdline-ask.service - dracut ask for additional cmdline parameters... Sep 5 09:49:48.868277 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Sep 5 09:49:48.868430 kernel: ahci 0000:00:17.0: version 3.0 Sep 5 09:49:48.868507 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Sep 5 09:49:48.868586 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Sep 5 09:49:48.868656 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Sep 5 09:49:48.868754 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Sep 5 09:49:48.868865 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Sep 5 09:49:48.868979 kernel: scsi host0: ahci Sep 5 09:49:48.869093 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Sep 5 09:49:48.869168 kernel: scsi host1: ahci Sep 5 09:49:48.869230 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Sep 5 09:49:48.869294 kernel: scsi host2: ahci Sep 5 09:49:48.869356 kernel: hub 1-0:1.0: USB hub found Sep 5 09:49:48.869499 kernel: scsi host3: ahci Sep 5 09:49:48.869557 kernel: hub 1-0:1.0: 16 ports detected Sep 5 09:49:48.869623 kernel: scsi host4: ahci Sep 5 09:49:48.869687 kernel: hub 2-0:1.0: USB hub found Sep 5 09:49:48.869756 kernel: scsi host5: ahci Sep 5 09:49:48.869815 kernel: hub 2-0:1.0: 10 ports detected Sep 5 09:49:48.869880 kernel: scsi host6: ahci Sep 5 09:49:48.869964 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 127 Sep 5 09:49:48.869974 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 127 Sep 5 09:49:48.869983 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 127 Sep 5 09:49:48.869991 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 127 Sep 5 09:49:48.869998 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 127 Sep 5 09:49:48.870005 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 127 Sep 5 09:49:48.870012 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 127 Sep 5 09:49:48.870019 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Sep 5 09:49:48.870034 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Sep 5 09:49:48.870042 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Sep 5 09:49:48.443383 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 5 09:49:48.955226 kernel: mlx5_core 0000:01:00.0: firmware version: 14.28.2006 Sep 5 09:49:48.955319 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Sep 5 09:49:48.955387 kernel: pps pps0: new PPS source ptp0 Sep 5 09:49:48.955451 kernel: igb 0000:03:00.0: added PHC on eth0 Sep 5 09:49:48.955520 kernel: hub 1-14:1.0: USB hub found Sep 5 09:49:48.955596 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Sep 5 09:49:48.955662 kernel: hub 1-14:1.0: 4 ports detected Sep 5 09:49:48.955730 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:70:d8:a8 Sep 5 09:49:48.955793 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Sep 5 09:49:48.443433 systemd[1]: Stopped systemd-vconsole-setup.service - Virtual Console Setup. Sep 5 09:49:49.292267 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Sep 5 09:49:49.292402 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Sep 5 09:49:49.292414 kernel: pps pps1: new PPS source ptp1 Sep 5 09:49:49.292482 kernel: ata4: SATA link down (SStatus 0 SControl 300) Sep 5 09:49:49.292490 kernel: igb 0000:04:00.0: added PHC on eth1 Sep 5 09:49:49.292558 kernel: ata6: SATA link down (SStatus 0 SControl 300) Sep 5 09:49:49.292566 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Sep 5 09:49:49.292627 kernel: ata7: SATA link down (SStatus 0 SControl 300) Sep 5 09:49:49.292635 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:70:d8:a9 Sep 5 09:49:49.292696 kernel: ata3: SATA link down (SStatus 0 SControl 300) Sep 5 09:49:49.292705 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Sep 5 09:49:49.292766 kernel: ata5: SATA link down (SStatus 0 SControl 300) Sep 5 09:49:49.292774 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Sep 5 09:49:49.292833 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Sep 5 09:49:49.292894 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Sep 5 09:49:49.292903 kernel: mlx5_core 0000:01:00.0: Port module event: module 0, Cable plugged Sep 5 09:49:49.292962 kernel: ata2.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Sep 5 09:49:49.292970 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Sep 5 09:49:49.292984 kernel: ata1.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Sep 5 09:49:48.895135 systemd[1]: Stopping systemd-vconsole-setup.service - Virtual Console Setup... Sep 5 09:49:49.332366 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Sep 5 09:49:49.332378 kernel: ata2.00: Features: NCQ-prio Sep 5 09:49:49.332386 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Sep 5 09:49:49.226403 systemd[1]: Starting systemd-vconsole-setup.service - Virtual Console Setup... Sep 5 09:49:49.371909 kernel: ata1.00: Features: NCQ-prio Sep 5 09:49:49.371935 kernel: ata2.00: configured for UDMA/133 Sep 5 09:49:49.371942 kernel: ata1.00: configured for UDMA/133 Sep 5 09:49:49.371949 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Sep 5 09:49:49.380290 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0 basic) Sep 5 09:49:49.380405 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Sep 5 09:49:49.389370 kernel: hid: raw HID events driver (C) Jiri Kosina Sep 5 09:49:49.392340 kernel: mlx5_core 0000:01:00.1: firmware version: 14.28.2006 Sep 5 09:49:49.392453 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Sep 5 09:49:49.417291 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Sep 5 09:49:49.502149 systemd[1]: Finished systemd-vconsole-setup.service - Virtual Console Setup. Sep 5 09:49:49.534664 kernel: usbcore: registered new interface driver usbhid Sep 5 09:49:49.534680 kernel: usbhid: USB HID core driver Sep 5 09:49:49.548354 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Sep 5 09:49:49.548375 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Sep 5 09:49:49.549474 systemd[1]: Starting dracut-cmdline-ask.service - dracut ask for additional cmdline parameters... Sep 5 09:49:49.593686 systemd[1]: Finished dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Sep 5 09:49:50.013402 kernel: ata2.00: Enabling discard_zeroes_data Sep 5 09:49:50.013422 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Sep 5 09:49:50.013516 kernel: ata1.00: Enabling discard_zeroes_data Sep 5 09:49:50.013525 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Sep 5 09:49:50.013598 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Sep 5 09:49:50.013669 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Sep 5 09:49:50.013728 kernel: sd 1:0:0:0: [sdb] Write Protect is off Sep 5 09:49:50.013787 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Sep 5 09:49:50.013848 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Sep 5 09:49:50.013907 kernel: sd 1:0:0:0: [sdb] Preferred minimum I/O size 4096 bytes Sep 5 09:49:50.013966 kernel: ata2.00: Enabling discard_zeroes_data Sep 5 09:49:50.013974 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Sep 5 09:49:50.014031 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Sep 5 09:49:50.014039 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Sep 5 09:49:50.014097 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Sep 5 09:49:50.014168 kernel: sd 0:0:0:0: [sda] Write Protect is off Sep 5 09:49:50.014227 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Sep 5 09:49:50.014302 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Sep 5 09:49:50.014364 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Sep 5 09:49:50.014422 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Sep 5 09:49:50.014487 kernel: sd 0:0:0:0: [sda] Preferred minimum I/O size 4096 bytes Sep 5 09:49:50.014546 kernel: ata1.00: Enabling discard_zeroes_data Sep 5 09:49:50.014554 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Sep 5 09:49:50.022940 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Sep 5 09:49:50.075214 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device - Micron_5200_MTFDDAK480TDN ROOT. Sep 5 09:49:50.084344 kernel: BTRFS: device label OEM devid 1 transid 19 /dev/sda6 scanned by (udev-worker) (539) Sep 5 09:49:50.084380 kernel: BTRFS: device fsid 0dc40443-7f77-4fa7-b5e4-579d4bba0772 devid 1 transid 37 /dev/sda3 scanned by (udev-worker) (534) Sep 5 09:49:50.116376 systemd[1]: Found device dev-disk-by\x2dpartlabel-ROOT.device - Micron_5200_MTFDDAK480TDN ROOT. Sep 5 09:49:50.146211 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device - Micron_5200_MTFDDAK480TDN OEM. Sep 5 09:49:50.162177 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device - Micron_5200_MTFDDAK480TDN USR-A. Sep 5 09:49:50.180474 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device - Micron_5200_MTFDDAK480TDN USR-A. Sep 5 09:49:50.221884 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0 basic) Sep 5 09:49:50.246351 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth2 Sep 5 09:49:50.250815 systemd[1]: Reached target initrd-root-device.target - Initrd Root Device. Sep 5 09:49:50.276550 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth0 Sep 5 09:49:50.282432 systemd[1]: Starting decrypt-root.service - Generate and execute a systemd-cryptsetup service to decrypt the ROOT partition... Sep 5 09:49:50.294757 systemd[1]: Starting disk-uuid.service - Generate new UUID for disk GPT if necessary... Sep 5 09:49:50.319604 systemd[1]: Finished decrypt-root.service - Generate and execute a systemd-cryptsetup service to decrypt the ROOT partition. Sep 5 09:49:50.341869 systemd[1]: disk-uuid.service: Deactivated successfully. Sep 5 09:49:50.341965 systemd[1]: Finished disk-uuid.service - Generate new UUID for disk GPT if necessary. Sep 5 09:49:50.372254 systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems. Sep 5 09:49:50.374561 systemd[1]: Reached target local-fs.target - Local File Systems. Sep 5 09:49:50.405506 systemd[1]: Reached target sysinit.target - System Initialization. Sep 5 09:49:50.426646 systemd[1]: Reached target basic.target - Basic System. Sep 5 09:49:50.457621 systemd[1]: Starting dracut-initqueue.service - dracut initqueue hook... Sep 5 09:49:50.465363 systemd[1]: Starting verity-setup.service - Verity Setup for /dev/mapper/usr... Sep 5 09:49:50.488429 sh[702]: Success Sep 5 09:49:50.504314 systemd[1]: Finished dracut-initqueue.service - dracut initqueue hook. Sep 5 09:49:50.540465 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Sep 5 09:49:50.530674 systemd[1]: Reached target remote-fs-pre.target - Preparation for Remote File Systems. Sep 5 09:49:50.551397 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes. Sep 5 09:49:50.573498 systemd[1]: Reached target remote-fs.target - Remote File Systems. Sep 5 09:49:50.599470 systemd[1]: Starting dracut-pre-mount.service - dracut pre-mount hook... Sep 5 09:49:50.609119 systemd[1]: Found device dev-mapper-usr.device - /dev/mapper/usr. Sep 5 09:49:50.632103 systemd[1]: Finished verity-setup.service - Verity Setup for /dev/mapper/usr. Sep 5 09:49:50.675550 systemd[1]: Mounting sysusr-usr.mount - /sysusr/usr... Sep 5 09:49:50.684478 systemd[1]: Finished dracut-pre-mount.service - dracut pre-mount hook. Sep 5 09:49:50.822521 kernel: BTRFS info (device dm-0): first mount of filesystem 0dc40443-7f77-4fa7-b5e4-579d4bba0772 Sep 5 09:49:50.822540 kernel: BTRFS info (device dm-0): using crc32c (crc32c-intel) checksum algorithm Sep 5 09:49:50.822548 kernel: BTRFS warning (device dm-0): 'nologreplay' is deprecated, use 'rescue=nologreplay' instead Sep 5 09:49:50.822556 kernel: BTRFS info (device dm-0): disabling log replay at mount time Sep 5 09:49:50.822563 kernel: BTRFS info (device dm-0): using free space tree Sep 5 09:49:50.822570 kernel: BTRFS info (device dm-0): enabling ssd optimizations Sep 5 09:49:50.823615 systemd[1]: Starting systemd-fsck-root.service - File System Check on /dev/disk/by-label/ROOT... Sep 5 09:49:50.835883 systemd[1]: Mounted sysusr-usr.mount - /sysusr/usr. Sep 5 09:49:50.863973 systemd-fsck[751]: ROOT: clean, 77/553520 files, 52714/553472 blocks Sep 5 09:49:50.874625 systemd[1]: Finished systemd-fsck-root.service - File System Check on /dev/disk/by-label/ROOT. Sep 5 09:49:50.881622 systemd[1]: Mounting sysroot.mount - /sysroot... Sep 5 09:49:51.001292 kernel: EXT4-fs (sda9): mounted filesystem bdbe0f61-2675-40b7-b9ae-5653402e9b23 r/w with ordered data mode. Quota mode: none. Sep 5 09:49:51.001572 systemd[1]: Mounted sysroot.mount - /sysroot. Sep 5 09:49:51.010743 systemd[1]: Reached target initrd-root-fs.target - Initrd Root File System. Sep 5 09:49:51.047503 systemd[1]: Mounting sysroot-oem.mount - /sysroot/oem... Sep 5 09:49:51.156203 kernel: BTRFS info (device sda6): first mount of filesystem b2463ce1-c756-4e78-b7f2-401dad24571d Sep 5 09:49:51.156217 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Sep 5 09:49:51.156225 kernel: BTRFS info (device sda6): using free space tree Sep 5 09:49:51.156232 kernel: BTRFS info (device sda6): enabling ssd optimizations Sep 5 09:49:51.156242 kernel: BTRFS info (device sda6): auto enabling async discard Sep 5 09:49:51.055863 systemd[1]: Mounting sysroot-usr.mount - /sysroot/usr... Sep 5 09:49:51.173578 systemd[1]: Mounted sysroot-oem.mount - /sysroot/oem. Sep 5 09:49:51.184196 systemd[1]: Mounted sysroot-usr.mount - /sysroot/usr. Sep 5 09:49:51.215591 systemd[1]: Starting initrd-setup-root.service - Root filesystem setup... Sep 5 09:49:51.278219 initrd-setup-root[784]: cut: /sysroot/etc/passwd: No such file or directory Sep 5 09:49:51.289427 initrd-setup-root[791]: cut: /sysroot/etc/group: No such file or directory Sep 5 09:49:51.300596 initrd-setup-root[798]: cut: /sysroot/etc/shadow: No such file or directory Sep 5 09:49:51.310417 initrd-setup-root[805]: cut: /sysroot/etc/gshadow: No such file or directory Sep 5 09:49:51.398622 systemd[1]: Finished initrd-setup-root.service - Root filesystem setup. Sep 5 09:49:51.419524 systemd[1]: Starting initrd-setup-root-after-ignition.service - Root filesystem completion... Sep 5 09:49:51.430754 systemd[1]: Finished initrd-setup-root-after-ignition.service - Root filesystem completion. Sep 5 09:49:51.452861 systemd[1]: Reached target ignition-subsequent.target - Subsequent (Not Ignition) boot complete. Sep 5 09:49:51.484645 systemd[1]: Starting initrd-parse-etc.service - Mountpoints Configured in the Real Root... Sep 5 09:49:51.508564 initrd-setup-root-after-ignition[950]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 5 09:49:51.508564 initrd-setup-root-after-ignition[950]: grep: /sysroot/usr/share/flatcar/enabled-sysext.conf: No such file or directory Sep 5 09:49:51.536547 initrd-setup-root-after-ignition[954]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Sep 5 09:49:51.565430 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 5 09:49:51.565481 systemd[1]: Finished initrd-parse-etc.service - Mountpoints Configured in the Real Root. Sep 5 09:49:51.583764 systemd[1]: Reached target initrd-fs.target - Initrd File Systems. Sep 5 09:49:51.604564 systemd[1]: Reached target initrd.target - Initrd Default Target. Sep 5 09:49:51.624675 systemd[1]: dracut-mount.service - dracut mount hook was skipped because no trigger condition checks were met. Sep 5 09:49:51.634536 systemd[1]: Starting dracut-pre-pivot.service - dracut pre-pivot and cleanup hook... Sep 5 09:49:51.690693 systemd[1]: Finished dracut-pre-pivot.service - dracut pre-pivot and cleanup hook. Sep 5 09:49:51.718686 systemd[1]: Starting initrd-cleanup.service - Cleaning Up and Shutting Down Daemons... Sep 5 09:49:51.743484 systemd[1]: Stopped target remote-cryptsetup.target - Remote Encrypted Volumes. Sep 5 09:49:51.754969 systemd[1]: Stopped target timers.target - Timer Units. Sep 5 09:49:51.772862 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 5 09:49:51.773231 systemd[1]: Stopped dracut-pre-pivot.service - dracut pre-pivot and cleanup hook. Sep 5 09:49:51.812726 systemd[1]: Stopped target initrd.target - Initrd Default Target. Sep 5 09:49:51.822900 systemd[1]: Stopped target basic.target - Basic System. Sep 5 09:49:51.843006 systemd[1]: Stopped target ignition-subsequent.target - Subsequent (Not Ignition) boot complete. Sep 5 09:49:51.862912 systemd[1]: Stopped target ignition-diskful-subsequent.target - Ignition Subsequent Boot Disk Setup. Sep 5 09:49:51.886905 systemd[1]: Stopped target initrd-root-device.target - Initrd Root Device. Sep 5 09:49:51.911903 systemd[1]: Stopped target paths.target - Path Units. Sep 5 09:49:51.929917 systemd[1]: Stopped target remote-fs.target - Remote File Systems. Sep 5 09:49:51.947902 systemd[1]: Stopped target remote-fs-pre.target - Preparation for Remote File Systems. Sep 5 09:49:51.968882 systemd[1]: Stopped target slices.target - Slice Units. Sep 5 09:49:51.987892 systemd[1]: Stopped target sockets.target - Socket Units. Sep 5 09:49:52.005908 systemd[1]: Stopped target sysinit.target - System Initialization. Sep 5 09:49:52.023916 systemd[1]: Stopped target local-fs.target - Local File Systems. Sep 5 09:49:52.043880 systemd[1]: Stopped target swap.target - Swaps. Sep 5 09:49:52.061859 systemd[1]: iscsid.socket: Deactivated successfully. Sep 5 09:49:52.062125 systemd[1]: Closed iscsid.socket - Open-iSCSI iscsid Socket. Sep 5 09:49:52.078935 systemd[1]: iscsiuio.socket: Deactivated successfully. Sep 5 09:49:52.079209 systemd[1]: Closed iscsiuio.socket - Open-iSCSI iscsiuio Socket. Sep 5 09:49:52.096890 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 5 09:49:52.097234 systemd[1]: Stopped dracut-pre-mount.service - dracut pre-mount hook. Sep 5 09:49:52.122927 systemd[1]: Stopped target cryptsetup.target - Local Encrypted Volumes. Sep 5 09:49:52.142799 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 5 09:49:52.143239 systemd[1]: Stopped systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch. Sep 5 09:49:52.161913 systemd[1]: Stopped target cryptsetup-pre.target - Local Encrypted Volumes (Pre). Sep 5 09:49:52.182786 systemd[1]: clevis-luks-askpass.path: Deactivated successfully. Sep 5 09:49:52.183201 systemd[1]: Stopped clevis-luks-askpass.path - Forward Password Requests to Clevis Directory Watch. Sep 5 09:49:52.203798 systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 5 09:49:52.204166 systemd[1]: Stopped dracut-initqueue.service - dracut initqueue hook. Sep 5 09:49:52.236800 systemd[1]: decrypt-root.service: Deactivated successfully. Sep 5 09:49:52.237211 systemd[1]: Stopped decrypt-root.service - Generate and execute a systemd-cryptsetup service to decrypt the ROOT partition. Sep 5 09:49:52.259969 systemd[1]: ignition-setup-pre.service: Deactivated successfully. Sep 5 09:49:52.260333 systemd[1]: Stopped ignition-setup-pre.service - Ignition env setup. Sep 5 09:49:52.277965 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Sep 5 09:49:52.278339 systemd[1]: Stopped initrd-setup-root-after-ignition.service - Root filesystem completion. Sep 5 09:49:52.301975 systemd[1]: initrd-setup-root.service: Deactivated successfully. Sep 5 09:49:52.302339 systemd[1]: Stopped initrd-setup-root.service - Root filesystem setup. Sep 5 09:49:52.319992 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 5 09:49:52.320350 systemd[1]: Stopped kmod-static-nodes.service - Create List of Static Device Nodes. Sep 5 09:49:52.340944 systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 5 09:49:52.341282 systemd[1]: Stopped systemd-sysctl.service - Apply Kernel Variables. Sep 5 09:49:52.358948 systemd[1]: systemd-modules-load.service: Deactivated successfully. Sep 5 09:49:52.359314 systemd[1]: Stopped systemd-modules-load.service - Load Kernel Modules. Sep 5 09:49:52.382959 systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Sep 5 09:49:52.383324 systemd[1]: Stopped systemd-tmpfiles-setup.service - Create System Files and Directories. Sep 5 09:49:52.403953 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 5 09:49:52.404314 systemd[1]: Stopped systemd-udev-trigger.service - Coldplug All udev Devices. Sep 5 09:49:52.425993 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 5 09:49:52.426362 systemd[1]: Stopped dracut-pre-trigger.service - dracut pre-trigger hook. Sep 5 09:49:52.459436 systemd[1]: Stopping systemd-udevd.service - Rule-based Manager for Device Events and Files... Sep 5 09:49:52.490024 systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 5 09:49:52.490398 systemd[1]: Stopped systemd-udevd.service - Rule-based Manager for Device Events and Files. Sep 5 09:49:52.506112 systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 5 09:49:52.506347 systemd[1]: Finished initrd-cleanup.service - Cleaning Up and Shutting Down Daemons. Sep 5 09:49:52.523712 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 5 09:49:52.523889 systemd[1]: Closed systemd-udevd-control.socket - udev Control Socket. Sep 5 09:49:52.544601 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 5 09:49:52.544699 systemd[1]: Closed systemd-udevd-kernel.socket - udev Kernel Socket. Sep 5 09:49:52.562638 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 5 09:49:52.864466 systemd-journald[258]: Received SIGTERM from PID 1 (systemd). Sep 5 09:49:52.562791 systemd[1]: Stopped dracut-pre-udev.service - dracut pre-udev hook. Sep 5 09:49:52.592543 systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 5 09:49:52.592710 systemd[1]: Stopped dracut-cmdline.service - dracut cmdline hook. Sep 5 09:49:52.634537 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Sep 5 09:49:52.634719 systemd[1]: Stopped dracut-cmdline-ask.service - dracut ask for additional cmdline parameters. Sep 5 09:49:52.676596 systemd[1]: Starting initrd-udevadm-cleanup-db.service - Cleanup udev Database... Sep 5 09:49:52.687528 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Sep 5 09:49:52.687560 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Sep 5 09:49:52.718670 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 5 09:49:52.718744 systemd[1]: Stopped systemd-vconsole-setup.service - Virtual Console Setup. Sep 5 09:49:52.739502 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 5 09:49:52.739713 systemd[1]: Finished initrd-udevadm-cleanup-db.service - Cleanup udev Database. Sep 5 09:49:52.761562 systemd[1]: Reached target initrd-switch-root.target - Switch Root. Sep 5 09:49:52.792665 systemd[1]: Starting initrd-switch-root.service - Switch Root... Sep 5 09:49:52.814806 systemd[1]: Switching root. Sep 5 09:49:52.864790 systemd-journald[258]: Journal stopped Sep 5 09:49:55.466970 kernel: SELinux: policy capability network_peer_controls=1 Sep 5 09:49:55.466984 kernel: SELinux: policy capability open_perms=1 Sep 5 09:49:55.466992 kernel: SELinux: policy capability extended_socket_class=1 Sep 5 09:49:55.466998 kernel: SELinux: policy capability always_check_network=0 Sep 5 09:49:55.467003 kernel: SELinux: policy capability cgroup_seclabel=1 Sep 5 09:49:55.467008 kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 5 09:49:55.467015 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Sep 5 09:49:55.467020 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Sep 5 09:49:55.467025 kernel: audit: type=1403 audit(1725529793.069:2): auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 5 09:49:55.467032 systemd[1]: Successfully loaded SELinux policy in 166.763ms. Sep 5 09:49:55.467040 systemd[1]: Relabeled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.839ms. Sep 5 09:49:55.467046 systemd[1]: systemd 255 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL +ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP -SYSVINIT default-hierarchy=unified) Sep 5 09:49:55.467052 systemd[1]: Detected architecture x86-64. Sep 5 09:49:55.467058 systemd[1]: Detected first boot. Sep 5 09:49:55.467065 systemd[1]: Hostname set to <ci-4054.1.0-a-bb5433f02d>. Sep 5 09:49:55.467072 systemd[1]: Initializing machine ID from random generator. Sep 5 09:49:55.467079 zram_generator::config[996]: No configuration found. Sep 5 09:49:55.467085 systemd[1]: Populated /etc with preset unit settings. Sep 5 09:49:55.467092 systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 5 09:49:55.467098 systemd[1]: Stopped initrd-switch-root.service - Switch Root. Sep 5 09:49:55.467104 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 5 09:49:55.467110 systemd[1]: Created slice system-addon\x2dconfig.slice - Slice /system/addon-config. Sep 5 09:49:55.467117 systemd[1]: Created slice system-addon\x2drun.slice - Slice /system/addon-run. Sep 5 09:49:55.467123 systemd[1]: Created slice system-getty.slice - Slice /system/getty. Sep 5 09:49:55.467130 systemd[1]: Created slice system-modprobe.slice - Slice /system/modprobe. Sep 5 09:49:55.467136 systemd[1]: Created slice system-serial\x2dgetty.slice - Slice /system/serial-getty. Sep 5 09:49:55.467142 systemd[1]: Created slice system-system\x2dcloudinit.slice - Slice /system/system-cloudinit. Sep 5 09:49:55.467149 systemd[1]: Created slice system-systemd\x2dfsck.slice - Slice /system/systemd-fsck. Sep 5 09:49:55.467155 systemd[1]: Created slice user.slice - User and Session Slice. Sep 5 09:49:55.467162 systemd[1]: Started clevis-luks-askpass.path - Forward Password Requests to Clevis Directory Watch. Sep 5 09:49:55.467169 systemd[1]: Started systemd-ask-password-console.path - Dispatch Password Requests to Console Directory Watch. Sep 5 09:49:55.467175 systemd[1]: Started systemd-ask-password-wall.path - Forward Password Requests to Wall Directory Watch. Sep 5 09:49:55.467182 systemd[1]: Set up automount boot.automount - Boot partition Automount Point. Sep 5 09:49:55.467188 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount - Arbitrary Executable File Formats File System Automount Point. Sep 5 09:49:55.467195 systemd[1]: Expecting device dev-disk-by\x2dlabel-OEM.device - /dev/disk/by-label/OEM... Sep 5 09:49:55.467201 systemd[1]: Expecting device dev-ttyS1.device - /dev/ttyS1... Sep 5 09:49:55.467208 systemd[1]: Reached target cryptsetup-pre.target - Local Encrypted Volumes (Pre). Sep 5 09:49:55.467215 systemd[1]: Stopped target initrd-switch-root.target - Switch Root. Sep 5 09:49:55.467221 systemd[1]: Stopped target initrd-fs.target - Initrd File Systems. Sep 5 09:49:55.467227 systemd[1]: Stopped target initrd-root-fs.target - Initrd Root File System. Sep 5 09:49:55.467235 systemd[1]: Reached target integritysetup.target - Local Integrity Protected Volumes. Sep 5 09:49:55.467242 systemd[1]: Reached target remote-cryptsetup.target - Remote Encrypted Volumes. Sep 5 09:49:55.467249 systemd[1]: Reached target remote-fs.target - Remote File Systems. Sep 5 09:49:55.467255 systemd[1]: Reached target slices.target - Slice Units. Sep 5 09:49:55.467262 systemd[1]: Reached target swap.target - Swaps. Sep 5 09:49:55.467269 systemd[1]: Reached target veritysetup.target - Local Verity Protected Volumes. Sep 5 09:49:55.467276 systemd[1]: Listening on systemd-coredump.socket - Process Core Dump Socket. Sep 5 09:49:55.467282 systemd[1]: Listening on systemd-networkd.socket - Network Service Netlink Socket. Sep 5 09:49:55.467291 systemd[1]: Listening on systemd-udevd-control.socket - udev Control Socket. Sep 5 09:49:55.467300 systemd[1]: Listening on systemd-udevd-kernel.socket - udev Kernel Socket. Sep 5 09:49:55.467308 systemd[1]: Listening on systemd-userdbd.socket - User Database Manager Socket. Sep 5 09:49:55.467315 systemd[1]: Mounting dev-hugepages.mount - Huge Pages File System... Sep 5 09:49:55.467321 systemd[1]: Mounting dev-mqueue.mount - POSIX Message Queue File System... Sep 5 09:49:55.467328 systemd[1]: Mounting media.mount - External Media Directory... Sep 5 09:49:55.467335 systemd[1]: proc-xen.mount - /proc/xen was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 5 09:49:55.467342 systemd[1]: Mounting sys-kernel-debug.mount - Kernel Debug File System... Sep 5 09:49:55.467348 systemd[1]: Mounting sys-kernel-tracing.mount - Kernel Trace File System... Sep 5 09:49:55.467356 systemd[1]: Mounting tmp.mount - Temporary Directory /tmp... Sep 5 09:49:55.467363 systemd[1]: var-lib-machines.mount - Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 5 09:49:55.467370 systemd[1]: Reached target machines.target - Containers. Sep 5 09:49:55.467377 systemd[1]: Starting flatcar-tmpfiles.service - Create missing system files... Sep 5 09:49:55.467383 systemd[1]: ignition-delete-config.service - Ignition (delete config) was skipped because no trigger condition checks were met. Sep 5 09:49:55.467390 systemd[1]: Starting kmod-static-nodes.service - Create List of Static Device Nodes... Sep 5 09:49:55.467397 systemd[1]: Starting modprobe@configfs.service - Load Kernel Module configfs... Sep 5 09:49:55.467403 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Sep 5 09:49:55.467410 systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... Sep 5 09:49:55.467417 systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Sep 5 09:49:55.467424 systemd[1]: Starting modprobe@fuse.service - Load Kernel Module fuse... Sep 5 09:49:55.467431 kernel: ACPI: bus type drm_connector registered Sep 5 09:49:55.467437 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Sep 5 09:49:55.467443 kernel: loop: module loaded Sep 5 09:49:55.467450 systemd[1]: setup-nsswitch.service - Create /etc/nsswitch.conf was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Sep 5 09:49:55.467456 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 5 09:49:55.467463 systemd[1]: Stopped systemd-fsck-root.service - File System Check on Root Device. Sep 5 09:49:55.467471 kernel: fuse: init (API version 7.39) Sep 5 09:49:55.467477 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Sep 5 09:49:55.467483 systemd[1]: Stopped systemd-fsck-usr.service. Sep 5 09:49:55.467490 systemd[1]: Starting systemd-journald.service - Journal Service... Sep 5 09:49:55.467504 systemd-journald[1096]: Collecting audit messages is disabled. Sep 5 09:49:55.467520 systemd-journald[1096]: Journal started Sep 5 09:49:55.467533 systemd-journald[1096]: Runtime Journal (/run/log/journal/a4bac18ead4c4a6d9abc172153874536) is 8.0M, max 639.9M, 631.9M free. Sep 5 09:49:53.598113 systemd[1]: Queued start job for default target multi-user.target. Sep 5 09:49:53.617175 systemd[1]: Unnecessary job was removed for dev-sda6.device - /dev/sda6. Sep 5 09:49:53.617404 systemd[1]: systemd-journald.service: Deactivated successfully. Sep 5 09:49:55.495410 systemd[1]: Starting systemd-modules-load.service - Load Kernel Modules... Sep 5 09:49:55.529323 systemd[1]: Starting systemd-network-generator.service - Generate network units from Kernel command line... Sep 5 09:49:55.563541 systemd[1]: Starting systemd-remount-fs.service - Remount Root and Kernel File Systems... Sep 5 09:49:55.597335 systemd[1]: Starting systemd-udev-trigger.service - Coldplug All udev Devices... Sep 5 09:49:55.632048 systemd[1]: verity-setup.service: Deactivated successfully. Sep 5 09:49:55.632076 systemd[1]: Stopped verity-setup.service. Sep 5 09:49:55.695340 systemd[1]: xenserver-pv-version.service - Set fake PV driver version for XenServer was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 5 09:49:55.716506 systemd[1]: Started systemd-journald.service - Journal Service. Sep 5 09:49:55.726875 systemd[1]: Mounted dev-hugepages.mount - Huge Pages File System. Sep 5 09:49:55.737556 systemd[1]: Mounted dev-mqueue.mount - POSIX Message Queue File System. Sep 5 09:49:55.747555 systemd[1]: Mounted media.mount - External Media Directory. Sep 5 09:49:55.757548 systemd[1]: Mounted sys-kernel-debug.mount - Kernel Debug File System. Sep 5 09:49:55.767530 systemd[1]: Mounted sys-kernel-tracing.mount - Kernel Trace File System. Sep 5 09:49:55.777527 systemd[1]: Mounted tmp.mount - Temporary Directory /tmp. Sep 5 09:49:55.787644 systemd[1]: Finished flatcar-tmpfiles.service - Create missing system files. Sep 5 09:49:55.798720 systemd[1]: Finished kmod-static-nodes.service - Create List of Static Device Nodes. Sep 5 09:49:55.809987 systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 5 09:49:55.810257 systemd[1]: Finished modprobe@configfs.service - Load Kernel Module configfs. Sep 5 09:49:55.822144 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 5 09:49:55.822500 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Sep 5 09:49:55.834197 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 5 09:49:55.834601 systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm. Sep 5 09:49:55.845166 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 5 09:49:55.845532 systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Sep 5 09:49:55.857210 systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 5 09:49:55.857627 systemd[1]: Finished modprobe@fuse.service - Load Kernel Module fuse. Sep 5 09:49:55.868228 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 5 09:49:55.868670 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Sep 5 09:49:55.879236 systemd[1]: Finished systemd-modules-load.service - Load Kernel Modules. Sep 5 09:49:55.890208 systemd[1]: Finished systemd-network-generator.service - Generate network units from Kernel command line. Sep 5 09:49:55.902196 systemd[1]: Finished systemd-remount-fs.service - Remount Root and Kernel File Systems. Sep 5 09:49:55.914146 systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Sep 5 09:49:55.948579 systemd[1]: Reached target network-pre.target - Preparation for Network. Sep 5 09:49:55.975531 systemd[1]: Mounting sys-fs-fuse-connections.mount - FUSE Control File System... Sep 5 09:49:55.986105 systemd[1]: Mounting sys-kernel-config.mount - Kernel Configuration File System... Sep 5 09:49:55.996481 systemd[1]: remount-root.service - Remount Root File System was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Sep 5 09:49:55.996503 systemd[1]: Reached target local-fs.target - Local File Systems. Sep 5 09:49:56.007280 systemd[1]: Listening on systemd-sysext.socket - System Extension Image Management (Varlink). Sep 5 09:49:56.024574 systemd[1]: Starting dracut-shutdown.service - Restore /run/initramfs on shutdown... Sep 5 09:49:56.037417 systemd[1]: Starting ldconfig.service - Rebuild Dynamic Linker Cache... Sep 5 09:49:56.047547 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Sep 5 09:49:56.048628 systemd[1]: Starting systemd-hwdb-update.service - Rebuild Hardware Database... Sep 5 09:49:56.058895 systemd[1]: Starting systemd-journal-flush.service - Flush Journal to Persistent Storage... Sep 5 09:49:56.069410 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 5 09:49:56.070006 systemd[1]: Starting systemd-random-seed.service - Load/Save OS Random Seed... Sep 5 09:49:56.073395 systemd-journald[1096]: Time spent on flushing to /var/log/journal/a4bac18ead4c4a6d9abc172153874536 is 9.965ms for 1137 entries. Sep 5 09:49:56.073395 systemd-journald[1096]: System Journal (/var/log/journal/a4bac18ead4c4a6d9abc172153874536) is 8.0M, max 195.6M, 187.6M free. Sep 5 09:49:56.116632 systemd-journald[1096]: Received client request to flush runtime journal. Sep 5 09:49:56.087425 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Sep 5 09:49:56.087994 systemd[1]: Starting systemd-sysctl.service - Apply Kernel Variables... Sep 5 09:49:56.096382 systemd[1]: Starting systemd-sysext.service - Merge System Extension Images into /usr/ and /opt/... Sep 5 09:49:56.106050 systemd[1]: Starting systemd-sysusers.service - Create System Users... Sep 5 09:49:56.117072 systemd[1]: Starting systemd-udev-settle.service - Wait for udev To Complete Device Initialization... Sep 5 09:49:56.143291 kernel: loop0: detected capacity change from 0 to 89336 Sep 5 09:49:56.154323 systemd[1]: Mounted sys-fs-fuse-connections.mount - FUSE Control File System. Sep 5 09:49:56.171495 systemd[1]: Mounted sys-kernel-config.mount - Kernel Configuration File System. Sep 5 09:49:56.176289 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Sep 5 09:49:56.187526 systemd[1]: Finished dracut-shutdown.service - Restore /run/initramfs on shutdown. Sep 5 09:49:56.198611 systemd[1]: Finished systemd-journal-flush.service - Flush Journal to Persistent Storage. Sep 5 09:49:56.209510 systemd[1]: Finished systemd-random-seed.service - Load/Save OS Random Seed. Sep 5 09:49:56.234291 kernel: loop1: detected capacity change from 0 to 140728 Sep 5 09:49:56.239524 systemd[1]: Finished systemd-sysctl.service - Apply Kernel Variables. Sep 5 09:49:56.249505 systemd[1]: Finished systemd-sysusers.service - Create System Users. Sep 5 09:49:56.262273 systemd[1]: Reached target first-boot-complete.target - First Boot Complete. Sep 5 09:49:56.288581 systemd[1]: Starting systemd-machine-id-commit.service - Commit a transient machine-id on disk... Sep 5 09:49:56.305291 kernel: loop2: detected capacity change from 0 to 8 Sep 5 09:49:56.317083 systemd[1]: Starting systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev... Sep 5 09:49:56.328889 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Sep 5 09:49:56.329296 systemd[1]: Finished systemd-machine-id-commit.service - Commit a transient machine-id on disk. Sep 5 09:49:56.341379 systemd-tmpfiles[1146]: ACLs are not supported, ignoring. Sep 5 09:49:56.341390 systemd-tmpfiles[1146]: ACLs are not supported, ignoring. Sep 5 09:49:56.345008 systemd[1]: Finished systemd-tmpfiles-setup-dev.service - Create Static Device Nodes in /dev. Sep 5 09:49:56.358335 kernel: loop3: detected capacity change from 0 to 89336 Sep 5 09:49:56.373557 udevadm[1131]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Sep 5 09:49:56.386344 kernel: loop4: detected capacity change from 0 to 140728 Sep 5 09:49:56.421720 ldconfig[1122]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Sep 5 09:49:56.423148 systemd[1]: Finished ldconfig.service - Rebuild Dynamic Linker Cache. Sep 5 09:49:56.423288 kernel: loop5: detected capacity change from 0 to 8 Sep 5 09:49:56.423654 (sd-merge)[1148]: Using extensions 'containerd-flatcar', 'docker-flatcar', 'oem-packet'. Sep 5 09:49:56.423869 (sd-merge)[1148]: Merged extensions into '/usr'. Sep 5 09:49:56.433098 systemd[1]: Finished systemd-sysext.service - Merge System Extension Images into /usr/ and /opt/. Sep 5 09:49:56.454530 systemd[1]: Starting ensure-sysext.service... Sep 5 09:49:56.462041 systemd[1]: Starting systemd-tmpfiles-setup.service - Create System Files and Directories... Sep 5 09:49:56.476876 systemd[1]: Reloading requested from client PID 1153 ('systemctl') (unit ensure-sysext.service)... Sep 5 09:49:56.476884 systemd[1]: Reloading... Sep 5 09:49:56.482738 systemd-tmpfiles[1154]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 5 09:49:56.482945 systemd-tmpfiles[1154]: /usr/lib/tmpfiles.d/systemd-flatcar.conf:6: Duplicate line for path "/var/log/journal", ignoring. Sep 5 09:49:56.483449 systemd-tmpfiles[1154]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 5 09:49:56.483615 systemd-tmpfiles[1154]: ACLs are not supported, ignoring. Sep 5 09:49:56.483648 systemd-tmpfiles[1154]: ACLs are not supported, ignoring. Sep 5 09:49:56.485232 systemd-tmpfiles[1154]: Detected autofs mount point /boot during canonicalization of boot. Sep 5 09:49:56.485236 systemd-tmpfiles[1154]: Skipping /boot Sep 5 09:49:56.489349 systemd-tmpfiles[1154]: Detected autofs mount point /boot during canonicalization of boot. Sep 5 09:49:56.489354 systemd-tmpfiles[1154]: Skipping /boot Sep 5 09:49:56.514353 zram_generator::config[1179]: No configuration found. Sep 5 09:49:56.565201 systemd[1]: /usr/lib/systemd/system/docker.socket:6: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Sep 5 09:49:56.605663 systemd[1]: Reloading finished in 128 ms. Sep 5 09:49:56.630539 systemd[1]: Finished systemd-hwdb-update.service - Rebuild Hardware Database. Sep 5 09:49:56.652737 systemd[1]: Finished systemd-tmpfiles-setup.service - Create System Files and Directories. Sep 5 09:49:56.667828 systemd[1]: Starting audit-rules.service - Load Security Auditing Rules... Sep 5 09:49:56.678792 systemd[1]: Starting clean-ca-certificates.service - Clean up broken links in /etc/ssl/certs... Sep 5 09:49:56.691238 systemd[1]: Starting systemd-journal-catalog-update.service - Rebuild Journal Catalog... Sep 5 09:49:56.700244 augenrules[1252]: No rules Sep 5 09:49:56.703704 systemd[1]: Starting systemd-resolved.service - Network Name Resolution... Sep 5 09:49:56.714200 systemd[1]: Starting systemd-udevd.service - Rule-based Manager for Device Events and Files... Sep 5 09:49:56.726098 systemd[1]: Starting systemd-update-utmp.service - Record System Boot/Shutdown in UTMP... Sep 5 09:49:56.738905 systemd[1]: Finished audit-rules.service - Load Security Auditing Rules. Sep 5 09:49:56.739581 systemd-udevd[1258]: Using default interface naming scheme 'v255'. Sep 5 09:49:56.749704 systemd[1]: Finished clean-ca-certificates.service - Clean up broken links in /etc/ssl/certs. Sep 5 09:49:56.760510 systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Sep 5 09:49:56.771880 systemd[1]: Finished systemd-journal-catalog-update.service - Rebuild Journal Catalog. Sep 5 09:49:56.794318 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Sep 5 09:49:56.794397 kernel: BTRFS warning: duplicate device /dev/sda3 devid 1 generation 37 scanned by (udev-worker) (1263) Sep 5 09:49:56.794418 kernel: ACPI: button: Sleep Button [SLPB] Sep 5 09:49:56.810138 kernel: BTRFS info: devid 1 device path /dev/mapper/usr changed to /dev/dm-0 scanned by (udev-worker) (1266) Sep 5 09:49:56.810179 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Sep 5 09:49:56.818293 kernel: BTRFS info: devid 1 device path /dev/dm-0 changed to /dev/mapper/usr scanned by (udev-worker) (1266) Sep 5 09:49:56.829319 kernel: ACPI: button: Power Button [PWRF] Sep 5 09:49:56.849422 systemd[1]: Finished systemd-update-utmp.service - Record System Boot/Shutdown in UTMP. Sep 5 09:49:56.922290 kernel: mousedev: PS/2 mouse device common for all mice Sep 5 09:49:56.961294 kernel: IPMI message handler: version 39.2 Sep 5 09:49:56.972914 systemd[1]: Condition check resulted in dev-ttyS1.device - /dev/ttyS1 being skipped. Sep 5 09:49:56.974640 systemd[1]: Finished ensure-sysext.service. Sep 5 09:49:56.998527 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Sep 5 09:49:56.998739 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Sep 5 09:49:57.011295 kernel: ipmi device interface Sep 5 09:49:57.014289 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Sep 5 09:49:57.021504 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device - Micron_5200_MTFDDAK480TDN OEM. Sep 5 09:49:57.051289 kernel: iTCO_vendor_support: vendor-support=0 Sep 5 09:49:57.051325 kernel: ipmi_si: IPMI System Interface driver Sep 5 09:49:57.051342 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Sep 5 09:49:57.051455 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Sep 5 09:49:57.081009 systemd[1]: proc-xen.mount - /proc/xen was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 5 09:49:57.081161 systemd[1]: ignition-delete-config.service - Ignition (delete config) was skipped because no trigger condition checks were met. Sep 5 09:49:57.123294 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Sep 5 09:49:57.123511 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Sep 5 09:49:57.123525 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Sep 5 09:49:57.123537 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Sep 5 09:49:57.201782 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Sep 5 09:49:57.221763 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Sep 5 09:49:57.238535 kernel: ipmi_si: Adding ACPI-specified kcs state machine Sep 5 09:49:57.259368 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Sep 5 09:49:57.273421 systemd[1]: Starting modprobe@dm_mod.service - Load Kernel Module dm_mod... Sep 5 09:49:57.284054 systemd[1]: Starting modprobe@drm.service - Load Kernel Module drm... Sep 5 09:49:57.301919 systemd[1]: Starting modprobe@efi_pstore.service - Load Kernel Module efi_pstore... Sep 5 09:49:57.310309 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Sep 5 09:49:57.310587 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Sep 5 09:49:57.310797 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Sep 5 09:49:57.351294 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Sep 5 09:49:57.385786 systemd[1]: Starting modprobe@loop.service - Load Kernel Module loop... Sep 5 09:49:57.412289 kernel: intel_rapl_common: Found RAPL domain package Sep 5 09:49:57.412326 kernel: intel_rapl_common: Found RAPL domain core Sep 5 09:49:57.412338 kernel: intel_rapl_common: Found RAPL domain dram Sep 5 09:49:57.455434 systemd[1]: systemd-binfmt.service - Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Sep 5 09:49:57.463899 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service - File System Check on /dev/disk/by-label/OEM... Sep 5 09:49:57.475232 systemd[1]: Starting systemd-networkd.service - Network Configuration... Sep 5 09:49:57.492235 systemd[1]: Starting systemd-timesyncd.service - Network Time Synchronization... Sep 5 09:49:57.499299 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Sep 5 09:49:57.499822 systemd[1]: Starting systemd-update-done.service - Update is Completed... Sep 5 09:49:57.500614 systemd[1]: Starting systemd-userdbd.service - User Database Manager... Sep 5 09:49:57.501184 systemd[1]: Starting systemd-vconsole-setup.service - Virtual Console Setup... Sep 5 09:49:57.518334 kernel: ipmi_ssif: IPMI SSIF Interface driver Sep 5 09:49:57.529398 systemd[1]: update-ca-certificates.service - Update CA bundle at /etc/ssl/certs/ca-certificates.crt was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Sep 5 09:49:57.529420 systemd[1]: xenserver-pv-version.service - Set fake PV driver version for XenServer was skipped because of an unmet condition check (ConditionVirtualization=xen). Sep 5 09:49:57.529833 systemd[1]: Finished systemd-udev-settle.service - Wait for udev To Complete Device Initialization. Sep 5 09:49:57.549571 systemd[1]: Started systemd-userdbd.service - User Database Manager. Sep 5 09:49:57.549853 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Sep 5 09:49:57.549933 systemd[1]: Finished modprobe@dm_mod.service - Load Kernel Module dm_mod. Sep 5 09:49:57.550080 systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 5 09:49:57.550149 systemd[1]: Finished modprobe@drm.service - Load Kernel Module drm. Sep 5 09:49:57.550292 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 5 09:49:57.550362 systemd[1]: Finished modprobe@efi_pstore.service - Load Kernel Module efi_pstore. Sep 5 09:49:57.550496 systemd[1]: modprobe@loop.service: Deactivated successfully. Sep 5 09:49:57.550561 systemd[1]: Finished modprobe@loop.service - Load Kernel Module loop. Sep 5 09:49:57.550691 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service - File System Check on /dev/disk/by-label/OEM. Sep 5 09:49:57.550829 systemd[1]: Finished systemd-update-done.service - Update is Completed. Sep 5 09:49:57.553964 systemd[1]: Starting lvm2-activation-early.service - Activation of LVM2 logical volumes... Sep 5 09:49:57.554002 systemd[1]: systemd-pstore.service - Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 5 09:49:57.554034 systemd[1]: systemd-repart.service - Repartition Root Disk was skipped because no trigger condition checks were met. Sep 5 09:49:57.563945 lvm[1393]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 5 09:49:57.566457 systemd-resolved[1257]: Positive Trust Anchors: Sep 5 09:49:57.566467 systemd-resolved[1257]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Sep 5 09:49:57.566492 systemd-resolved[1257]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 170.0.0.192.in-addr.arpa 171.0.0.192.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa ipv4only.arpa resolver.arpa corp home internal intranet lan local private test Sep 5 09:49:57.569597 systemd-resolved[1257]: Using system hostname 'ci-4054.1.0-a-bb5433f02d'. Sep 5 09:49:57.570394 systemd[1]: Started systemd-resolved.service - Network Name Resolution. Sep 5 09:49:57.570474 systemd[1]: Reached target nss-lookup.target - Host and Network Name Lookups. Sep 5 09:49:57.579299 systemd[1]: Started systemd-timesyncd.service - Network Time Synchronization. Sep 5 09:49:57.579411 systemd[1]: Reached target time-set.target - System Time Set. Sep 5 09:49:57.595505 systemd-networkd[1370]: lo: Link UP Sep 5 09:49:57.595508 systemd-networkd[1370]: lo: Gained carrier Sep 5 09:49:57.598024 systemd-networkd[1370]: bond0: netdev ready Sep 5 09:49:57.598437 systemd-networkd[1370]: Enumeration completed Sep 5 09:49:57.598524 systemd[1]: Started systemd-networkd.service - Network Configuration. Sep 5 09:49:57.601582 systemd-networkd[1370]: enp1s0f0np0: Configuring with /etc/systemd/network/10-0c:42:a1:97:f6:64.network. Sep 5 09:49:57.662568 systemd[1]: Finished systemd-vconsole-setup.service - Virtual Console Setup. Sep 5 09:49:57.673472 systemd[1]: Finished lvm2-activation-early.service - Activation of LVM2 logical volumes. Sep 5 09:49:57.686017 systemd[1]: Reached target cryptsetup.target - Local Encrypted Volumes. Sep 5 09:49:57.696324 systemd[1]: Reached target network.target - Network. Sep 5 09:49:57.705329 systemd[1]: Reached target sysinit.target - System Initialization. Sep 5 09:49:57.715380 systemd[1]: Started motdgen.path - Watch for update engine configuration changes. Sep 5 09:49:57.726387 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path - Watch for a cloud-config at /var/lib/flatcar-install/user_data. Sep 5 09:49:57.737456 systemd[1]: Started logrotate.timer - Daily rotation of log files. Sep 5 09:49:57.747396 systemd[1]: Started mdadm.timer - Weekly check for MD array's redundancy information.. Sep 5 09:49:57.758365 systemd[1]: Started systemd-tmpfiles-clean.timer - Daily Cleanup of Temporary Directories. Sep 5 09:49:57.769326 systemd[1]: update-engine-stub.timer - Update Engine Stub Timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Sep 5 09:49:57.769361 systemd[1]: Reached target paths.target - Path Units. Sep 5 09:49:57.777328 systemd[1]: Reached target timers.target - Timer Units. Sep 5 09:49:57.785866 systemd[1]: Listening on dbus.socket - D-Bus System Message Bus Socket. Sep 5 09:49:57.796029 systemd[1]: Starting docker.socket - Docker Socket for the API... Sep 5 09:49:57.806469 systemd[1]: Listening on sshd.socket - OpenSSH Server Socket. Sep 5 09:49:57.817042 systemd[1]: Starting lvm2-activation.service - Activation of LVM2 logical volumes... Sep 5 09:49:57.838765 systemd[1]: Starting systemd-networkd-wait-online.service - Wait for Network to be Configured... Sep 5 09:49:57.840718 lvm[1407]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Sep 5 09:49:57.849737 systemd[1]: Listening on docker.socket - Docker Socket for the API. Sep 5 09:49:57.859439 systemd[1]: Reached target sockets.target - Socket Units. Sep 5 09:49:57.869389 systemd[1]: Reached target basic.target - Basic System. Sep 5 09:49:57.877357 systemd[1]: addon-config@oem.service - Configure Addon /oem was skipped because no trigger condition checks were met. Sep 5 09:49:57.877370 systemd[1]: addon-run@oem.service - Run Addon /oem was skipped because no trigger condition checks were met. Sep 5 09:49:57.885345 systemd[1]: Starting containerd.service - containerd container runtime... Sep 5 09:49:57.896034 systemd[1]: Starting coreos-metadata.service - Flatcar Metadata Agent... Sep 5 09:49:57.905869 systemd[1]: Starting dbus.service - D-Bus System Message Bus... Sep 5 09:49:57.915016 systemd[1]: Starting enable-oem-cloudinit.service - Enable cloudinit... Sep 5 09:49:57.925057 systemd[1]: Starting extend-filesystems.service - Extend Filesystems... Sep 5 09:49:57.927536 jq[1412]: false Sep 5 09:49:57.931789 dbus-daemon[1411]: [system] SELinux support is enabled Sep 5 09:49:57.933692 coreos-metadata[1410]: Sep 05 09:49:57.933 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Sep 5 09:49:57.934389 systemd[1]: flatcar-setup-environment.service - Modifies /etc/environment for CoreOS was skipped because of an unmet condition check (ConditionPathExists=/oem/bin/flatcar-setup-environment). Sep 5 09:49:57.934466 coreos-metadata[1410]: Sep 05 09:49:57.934 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata) Sep 5 09:49:57.935043 systemd[1]: Starting motdgen.service - Generate /run/flatcar/motd... Sep 5 09:49:57.942190 extend-filesystems[1415]: Found loop3 Sep 5 09:49:57.944403 extend-filesystems[1415]: Found loop4 Sep 5 09:49:57.944403 extend-filesystems[1415]: Found loop5 Sep 5 09:49:57.944403 extend-filesystems[1415]: Found sda Sep 5 09:49:57.944403 extend-filesystems[1415]: Found sda1 Sep 5 09:49:57.944403 extend-filesystems[1415]: Found sda2 Sep 5 09:49:57.944403 extend-filesystems[1415]: Found sda3 Sep 5 09:49:57.944403 extend-filesystems[1415]: Found usr Sep 5 09:49:57.944403 extend-filesystems[1415]: Found sda4 Sep 5 09:49:57.944403 extend-filesystems[1415]: Found sda6 Sep 5 09:49:57.944403 extend-filesystems[1415]: Found sda7 Sep 5 09:49:57.944403 extend-filesystems[1415]: Found sda9 Sep 5 09:49:57.944403 extend-filesystems[1415]: Checking size of /dev/sda9 Sep 5 09:49:58.134396 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Sep 5 09:49:58.134414 kernel: BTRFS warning: duplicate device /dev/sda3 devid 1 generation 37 scanned by (udev-worker) (1289) Sep 5 09:49:58.134433 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Sep 5 09:49:58.134540 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Sep 5 09:49:58.134571 extend-filesystems[1415]: Resized partition /dev/sda9 Sep 5 09:49:57.945063 systemd[1]: Starting ssh-key-proc-cmdline.service - Install an ssh key from /proc/cmdline... Sep 5 09:49:58.159504 extend-filesystems[1424]: resize2fs 1.47.1 (20-May-2024) Sep 5 09:49:57.996133 systemd[1]: Starting sshd-keygen.service - Generate sshd host keys... Sep 5 09:49:58.030186 systemd[1]: Starting systemd-logind.service - User Login Management... Sep 5 09:49:58.046228 systemd[1]: Starting tcsd.service - TCG Core Services Daemon... Sep 5 09:49:58.177568 sshd_keygen[1438]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Sep 5 09:49:58.052745 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Sep 5 09:49:58.177683 update_engine[1440]: I0905 09:49:58.110342 1440 main.cc:92] Flatcar Update Engine starting Sep 5 09:49:58.177683 update_engine[1440]: I0905 09:49:58.111156 1440 update_check_scheduler.cc:74] Next update check in 2m53s Sep 5 09:49:58.053125 systemd[1]: Starting update-engine.service - Update Engine... Sep 5 09:49:58.177844 jq[1441]: true Sep 5 09:49:58.058463 systemd-logind[1435]: Watching system buttons on /dev/input/event3 (Power Button) Sep 5 09:49:58.058473 systemd-logind[1435]: Watching system buttons on /dev/input/event2 (Sleep Button) Sep 5 09:49:58.058482 systemd-logind[1435]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Sep 5 09:49:58.058769 systemd-logind[1435]: New seat seat0. Sep 5 09:49:58.103683 systemd[1]: Starting update-ssh-keys-after-ignition.service - Run update-ssh-keys once after Ignition... Sep 5 09:49:58.110960 systemd-networkd[1370]: enp1s0f1np1: Configuring with /etc/systemd/network/10-0c:42:a1:97:f6:65.network. Sep 5 09:49:58.115719 systemd[1]: Started dbus.service - D-Bus System Message Bus. Sep 5 09:49:58.151691 systemd[1]: Started systemd-logind.service - User Login Management. Sep 5 09:49:58.169588 systemd[1]: Finished lvm2-activation.service - Activation of LVM2 logical volumes. Sep 5 09:49:58.200541 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Sep 5 09:49:58.200635 systemd[1]: Condition check resulted in enable-oem-cloudinit.service - Enable cloudinit being skipped. Sep 5 09:49:58.200805 systemd[1]: motdgen.service: Deactivated successfully. Sep 5 09:49:58.200890 systemd[1]: Finished motdgen.service - Generate /run/flatcar/motd. Sep 5 09:49:58.210500 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Sep 5 09:49:58.210587 systemd[1]: Finished ssh-key-proc-cmdline.service - Install an ssh key from /proc/cmdline. Sep 5 09:49:58.221529 systemd[1]: Finished sshd-keygen.service - Generate sshd host keys. Sep 5 09:49:58.247603 jq[1450]: false Sep 5 09:49:58.247944 systemd[1]: update-ssh-keys-after-ignition.service: Skipped due to 'exec-condition'. Sep 5 09:49:58.248038 systemd[1]: Condition check resulted in update-ssh-keys-after-ignition.service - Run update-ssh-keys once after Ignition being skipped. Sep 5 09:49:58.248183 (ntainerd)[1451]: containerd.service: Referenced but unset environment variable evaluates to an empty string: TORCX_IMAGEDIR, TORCX_UNPACKDIR Sep 5 09:49:58.251529 dbus-daemon[1411]: [system] Successfully activated service 'org.freedesktop.systemd1' Sep 5 09:49:58.260730 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Sep 5 09:49:58.260824 systemd[1]: Condition check resulted in tcsd.service - TCG Core Services Daemon being skipped. Sep 5 09:49:58.262880 systemd[1]: Started update-engine.service - Update Engine. Sep 5 09:49:58.273713 systemd[1]: Starting issuegen.service - Generate /run/issue... Sep 5 09:49:58.283361 systemd[1]: Starting sshkeys.service... Sep 5 09:49:58.296418 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service - Load cloud-config from /usr/share/oem/cloud-config.yml was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Sep 5 09:49:58.296528 systemd[1]: Reached target system-config.target - Load system-provided cloud configs. Sep 5 09:49:58.304333 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Sep 5 09:49:58.304286 systemd[1]: user-cloudinit-proc-cmdline.service - Load cloud-config from url defined in /proc/cmdline was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Sep 5 09:49:58.304404 systemd[1]: Reached target user-config.target - Load user-provided cloud configs. Sep 5 09:49:58.329338 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Sep 5 09:49:58.329376 systemd-networkd[1370]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Sep 5 09:49:58.329806 systemd-networkd[1370]: enp1s0f0np0: Link UP Sep 5 09:49:58.331205 systemd-networkd[1370]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-0c:42:a1:97:f6:64.network. Sep 5 09:49:58.331444 systemd-networkd[1370]: enp1s0f1np1: Link UP Sep 5 09:49:58.331665 systemd-networkd[1370]: bond0: Link UP Sep 5 09:49:58.351292 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Sep 5 09:49:58.352199 systemd-networkd[1370]: enp1s0f0np0: Gained carrier Sep 5 09:49:58.355648 systemd[1]: Started locksmithd.service - Cluster reboot manager. Sep 5 09:49:58.366442 systemd-networkd[1370]: enp1s0f1np1: Gained carrier Sep 5 09:49:58.367803 systemd[1]: issuegen.service: Deactivated successfully. Sep 5 09:49:58.367896 systemd[1]: Finished issuegen.service - Generate /run/issue. Sep 5 09:49:58.381158 systemd[1]: Starting systemd-user-sessions.service - Permit User Sessions... Sep 5 09:49:58.383438 systemd-networkd[1370]: bond0: Gained carrier Sep 5 09:49:58.383546 systemd-timesyncd[1372]: Network configuration changed, trying to establish connection. Sep 5 09:49:58.383715 systemd-timesyncd[1372]: Network configuration changed, trying to establish connection. Sep 5 09:49:58.392054 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice - Slice /system/coreos-metadata-sshkeys. Sep 5 09:49:58.403926 locksmithd[1477]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Sep 5 09:49:58.404386 systemd[1]: Starting coreos-metadata-sshkeys@core.service - Flatcar Metadata Agent (SSH Keys)... Sep 5 09:49:58.416658 systemd[1]: Finished systemd-user-sessions.service - Permit User Sessions. Sep 5 09:49:58.427469 coreos-metadata[1484]: Sep 05 09:49:58.427 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Sep 5 09:49:58.429515 systemd[1]: Started getty@tty1.service - Getty on tty1. Sep 5 09:49:58.434726 containerd[1451]: time="2024-09-05T09:49:58.434687290Z" level=info msg="starting containerd" revision=8ccfc03e4e2b73c22899202ae09d0caf906d3863 version=v1.7.20 Sep 5 09:49:58.448099 containerd[1451]: time="2024-09-05T09:49:58.448062336Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Sep 5 09:49:58.448807 containerd[1451]: time="2024-09-05T09:49:58.448789843Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/6.6.48-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Sep 5 09:49:58.448807 containerd[1451]: time="2024-09-05T09:49:58.448806022Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Sep 5 09:49:58.448885 containerd[1451]: time="2024-09-05T09:49:58.448815278Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Sep 5 09:49:58.448907 containerd[1451]: time="2024-09-05T09:49:58.448893841Z" level=info msg="loading plugin \"io.containerd.warning.v1.deprecations\"..." type=io.containerd.warning.v1 Sep 5 09:49:58.448907 containerd[1451]: time="2024-09-05T09:49:58.448904219Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.blockfile\"..." type=io.containerd.snapshotter.v1 Sep 5 09:49:58.448951 containerd[1451]: time="2024-09-05T09:49:58.448936543Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.blockfile\"..." error="no scratch file generator: skip plugin" type=io.containerd.snapshotter.v1 Sep 5 09:49:58.448951 containerd[1451]: time="2024-09-05T09:49:58.448944663Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Sep 5 09:49:58.449053 containerd[1451]: time="2024-09-05T09:49:58.449032980Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 5 09:49:58.449053 containerd[1451]: time="2024-09-05T09:49:58.449042642Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Sep 5 09:49:58.449053 containerd[1451]: time="2024-09-05T09:49:58.449050195Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." error="devmapper not configured: skip plugin" type=io.containerd.snapshotter.v1 Sep 5 09:49:58.449116 containerd[1451]: time="2024-09-05T09:49:58.449055667Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Sep 5 09:49:58.449116 containerd[1451]: time="2024-09-05T09:49:58.449096318Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Sep 5 09:49:58.449219 containerd[1451]: time="2024-09-05T09:49:58.449207267Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Sep 5 09:49:58.449302 containerd[1451]: time="2024-09-05T09:49:58.449259374Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Sep 5 09:49:58.449302 containerd[1451]: time="2024-09-05T09:49:58.449268121Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Sep 5 09:49:58.449393 containerd[1451]: time="2024-09-05T09:49:58.449314867Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Sep 5 09:49:58.449393 containerd[1451]: time="2024-09-05T09:49:58.449341427Z" level=info msg="metadata content store policy set" policy=shared Sep 5 09:49:58.454290 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex Sep 5 09:49:58.454313 kernel: bond0: active interface up! Sep 5 09:49:58.468848 systemd[1]: Started serial-getty@ttyS1.service - Serial Getty on ttyS1. Sep 5 09:49:58.469024 containerd[1451]: time="2024-09-05T09:49:58.469012961Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Sep 5 09:49:58.469057 containerd[1451]: time="2024-09-05T09:49:58.469034567Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Sep 5 09:49:58.469078 containerd[1451]: time="2024-09-05T09:49:58.469064829Z" level=info msg="loading plugin \"io.containerd.lease.v1.manager\"..." type=io.containerd.lease.v1 Sep 5 09:49:58.469104 containerd[1451]: time="2024-09-05T09:49:58.469083622Z" level=info msg="loading plugin \"io.containerd.streaming.v1.manager\"..." type=io.containerd.streaming.v1 Sep 5 09:49:58.469104 containerd[1451]: time="2024-09-05T09:49:58.469093099Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Sep 5 09:49:58.469168 containerd[1451]: time="2024-09-05T09:49:58.469160349Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Sep 5 09:49:58.469287 containerd[1451]: time="2024-09-05T09:49:58.469276872Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Sep 5 09:49:58.469343 containerd[1451]: time="2024-09-05T09:49:58.469334740Z" level=info msg="loading plugin \"io.containerd.runtime.v2.shim\"..." type=io.containerd.runtime.v2 Sep 5 09:49:58.469370 containerd[1451]: time="2024-09-05T09:49:58.469344900Z" level=info msg="loading plugin \"io.containerd.sandbox.store.v1.local\"..." type=io.containerd.sandbox.store.v1 Sep 5 09:49:58.469370 containerd[1451]: time="2024-09-05T09:49:58.469352339Z" level=info msg="loading plugin \"io.containerd.sandbox.controller.v1.local\"..." type=io.containerd.sandbox.controller.v1 Sep 5 09:49:58.469370 containerd[1451]: time="2024-09-05T09:49:58.469360324Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Sep 5 09:49:58.469370 containerd[1451]: time="2024-09-05T09:49:58.469367371Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Sep 5 09:49:58.469431 containerd[1451]: time="2024-09-05T09:49:58.469373997Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Sep 5 09:49:58.469431 containerd[1451]: time="2024-09-05T09:49:58.469381561Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Sep 5 09:49:58.469431 containerd[1451]: time="2024-09-05T09:49:58.469389959Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Sep 5 09:49:58.469431 containerd[1451]: time="2024-09-05T09:49:58.469397479Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Sep 5 09:49:58.469431 containerd[1451]: time="2024-09-05T09:49:58.469404180Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Sep 5 09:49:58.469431 containerd[1451]: time="2024-09-05T09:49:58.469410554Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Sep 5 09:49:58.469431 containerd[1451]: time="2024-09-05T09:49:58.469427319Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Sep 5 09:49:58.469542 containerd[1451]: time="2024-09-05T09:49:58.469435498Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Sep 5 09:49:58.469542 containerd[1451]: time="2024-09-05T09:49:58.469443003Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Sep 5 09:49:58.469542 containerd[1451]: time="2024-09-05T09:49:58.469450167Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Sep 5 09:49:58.469542 containerd[1451]: time="2024-09-05T09:49:58.469456703Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Sep 5 09:49:58.469542 containerd[1451]: time="2024-09-05T09:49:58.469463941Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Sep 5 09:49:58.469542 containerd[1451]: time="2024-09-05T09:49:58.469470071Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Sep 5 09:49:58.469542 containerd[1451]: time="2024-09-05T09:49:58.469477089Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Sep 5 09:49:58.469542 containerd[1451]: time="2024-09-05T09:49:58.469484203Z" level=info msg="loading plugin \"io.containerd.grpc.v1.sandbox-controllers\"..." type=io.containerd.grpc.v1 Sep 5 09:49:58.469542 containerd[1451]: time="2024-09-05T09:49:58.469491729Z" level=info msg="loading plugin \"io.containerd.grpc.v1.sandboxes\"..." type=io.containerd.grpc.v1 Sep 5 09:49:58.469542 containerd[1451]: time="2024-09-05T09:49:58.469497999Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Sep 5 09:49:58.469542 containerd[1451]: time="2024-09-05T09:49:58.469505205Z" level=info msg="loading plugin \"io.containerd.grpc.v1.streaming\"..." type=io.containerd.grpc.v1 Sep 5 09:49:58.469542 containerd[1451]: time="2024-09-05T09:49:58.469511607Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Sep 5 09:49:58.469542 containerd[1451]: time="2024-09-05T09:49:58.469519733Z" level=info msg="loading plugin \"io.containerd.transfer.v1.local\"..." type=io.containerd.transfer.v1 Sep 5 09:49:58.469542 containerd[1451]: time="2024-09-05T09:49:58.469531232Z" level=info msg="loading plugin \"io.containerd.grpc.v1.transfer\"..." type=io.containerd.grpc.v1 Sep 5 09:49:58.469542 containerd[1451]: time="2024-09-05T09:49:58.469537867Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Sep 5 09:49:58.469794 containerd[1451]: time="2024-09-05T09:49:58.469543536Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Sep 5 09:49:58.469794 containerd[1451]: time="2024-09-05T09:49:58.469569279Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Sep 5 09:49:58.469794 containerd[1451]: time="2024-09-05T09:49:58.469578988Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="skip plugin: tracing endpoint not configured" type=io.containerd.tracing.processor.v1 Sep 5 09:49:58.469794 containerd[1451]: time="2024-09-05T09:49:58.469585519Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Sep 5 09:49:58.469794 containerd[1451]: time="2024-09-05T09:49:58.469592246Z" level=info msg="skip loading plugin \"io.containerd.internal.v1.tracing\"..." error="skip plugin: tracing endpoint not configured" type=io.containerd.internal.v1 Sep 5 09:49:58.469794 containerd[1451]: time="2024-09-05T09:49:58.469597948Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Sep 5 09:49:58.469794 containerd[1451]: time="2024-09-05T09:49:58.469604502Z" level=info msg="loading plugin \"io.containerd.nri.v1.nri\"..." type=io.containerd.nri.v1 Sep 5 09:49:58.469794 containerd[1451]: time="2024-09-05T09:49:58.469612857Z" level=info msg="NRI interface is disabled by configuration." Sep 5 09:49:58.469794 containerd[1451]: time="2024-09-05T09:49:58.469619694Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Sep 5 09:49:58.469932 containerd[1451]: time="2024-09-05T09:49:58.469768438Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: SandboxMode:podsandbox}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreBlockIONotEnabledErrors:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginSetupSerially:false NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.8 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false EnableCDI:false CDISpecDirs:[/etc/cdi /var/run/cdi] ImagePullProgressTimeout:5m0s DrainExecSyncIOTimeout:0s ImagePullWithSyncFs:false IgnoreDeprecationWarnings:[]} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Sep 5 09:49:58.469932 containerd[1451]: time="2024-09-05T09:49:58.469803849Z" level=info msg="Connect containerd service" Sep 5 09:49:58.469932 containerd[1451]: time="2024-09-05T09:49:58.469818448Z" level=info msg="using legacy CRI server" Sep 5 09:49:58.469932 containerd[1451]: time="2024-09-05T09:49:58.469822326Z" level=info msg="using experimental NRI integration - disable nri plugin to prevent this" Sep 5 09:49:58.469932 containerd[1451]: time="2024-09-05T09:49:58.469877722Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Sep 5 09:49:58.470166 containerd[1451]: time="2024-09-05T09:49:58.470155201Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Sep 5 09:49:58.470343 containerd[1451]: time="2024-09-05T09:49:58.470270674Z" level=info msg="Start subscribing containerd event" Sep 5 09:49:58.470343 containerd[1451]: time="2024-09-05T09:49:58.470304643Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Sep 5 09:49:58.470343 containerd[1451]: time="2024-09-05T09:49:58.470330712Z" level=info msg=serving... address=/run/containerd/containerd.sock Sep 5 09:49:58.470343 containerd[1451]: time="2024-09-05T09:49:58.470305926Z" level=info msg="Start recovering state" Sep 5 09:49:58.470420 containerd[1451]: time="2024-09-05T09:49:58.470371429Z" level=info msg="Start event monitor" Sep 5 09:49:58.470420 containerd[1451]: time="2024-09-05T09:49:58.470379138Z" level=info msg="Start snapshots syncer" Sep 5 09:49:58.470420 containerd[1451]: time="2024-09-05T09:49:58.470384960Z" level=info msg="Start cni network conf syncer for default" Sep 5 09:49:58.470420 containerd[1451]: time="2024-09-05T09:49:58.470396274Z" level=info msg="Start streaming server" Sep 5 09:49:58.470471 containerd[1451]: time="2024-09-05T09:49:58.470424023Z" level=info msg="containerd successfully booted in 0.036510s" Sep 5 09:49:58.478549 systemd[1]: Reached target getty.target - Login Prompts. Sep 5 09:49:58.492661 systemd[1]: Started containerd.service - containerd container runtime. Sep 5 09:49:58.499335 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Sep 5 09:49:58.518902 extend-filesystems[1424]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Sep 5 09:49:58.518902 extend-filesystems[1424]: old_desc_blocks = 1, new_desc_blocks = 56 Sep 5 09:49:58.518902 extend-filesystems[1424]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Sep 5 09:49:58.559367 extend-filesystems[1415]: Resized filesystem in /dev/sda9 Sep 5 09:49:58.559367 extend-filesystems[1415]: Found sdb Sep 5 09:49:58.519700 systemd[1]: extend-filesystems.service: Deactivated successfully. Sep 5 09:49:58.519805 systemd[1]: Finished extend-filesystems.service - Extend Filesystems. Sep 5 09:49:58.583346 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Sep 5 09:49:58.934572 coreos-metadata[1410]: Sep 05 09:49:58.934 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Sep 5 09:49:59.512420 systemd-networkd[1370]: bond0: Gained IPv6LL Sep 5 09:49:59.512677 systemd-timesyncd[1372]: Network configuration changed, trying to establish connection. Sep 5 09:50:00.088665 systemd-timesyncd[1372]: Network configuration changed, trying to establish connection. Sep 5 09:50:00.088756 systemd-timesyncd[1372]: Network configuration changed, trying to establish connection. Sep 5 09:50:00.089734 systemd[1]: Finished systemd-networkd-wait-online.service - Wait for Network to be Configured. Sep 5 09:50:00.101095 systemd[1]: Reached target network-online.target - Network is Online. Sep 5 09:50:00.125540 systemd[1]: Starting nvidia.service - NVIDIA Configure Service... Sep 5 09:50:00.135547 systemd[1]: Finished nvidia.service - NVIDIA Configure Service. Sep 5 09:50:01.025804 kernel: mlx5_core 0000:01:00.0: lag map: port 1:1 port 2:2 Sep 5 09:50:01.025955 kernel: mlx5_core 0000:01:00.0: shared_fdb:0 mode:queue_affinity Sep 5 09:50:01.690322 systemd[1]: Created slice system-sshd.slice - Slice /system/sshd. Sep 5 09:50:01.713809 systemd[1]: Started sshd@0-147.75.90.131:22-139.178.89.65:56488.service - OpenSSH per-connection server daemon (139.178.89.65:56488). Sep 5 09:50:01.750897 sshd[1515]: Connection closed by authenticating user core 139.178.89.65 port 56488 [preauth] Sep 5 09:50:01.751473 systemd[1]: sshd@0-147.75.90.131:22-139.178.89.65:56488.service: Deactivated successfully. Sep 5 09:50:02.159450 coreos-metadata[1410]: Sep 05 09:50:02.159 INFO Fetch successful Sep 5 09:50:02.243440 systemd[1]: Finished coreos-metadata.service - Flatcar Metadata Agent. Sep 5 09:50:02.255799 systemd[1]: Starting etcd-member.service - etcd (System Application Container)... Sep 5 09:50:02.266048 (-wrapper)[1524]: etcd-member.service: Referenced but unset environment variable evaluates to an empty string: ETCD_OPTS Sep 5 09:50:02.266373 systemd[1]: Starting packet-phone-home.service - Report Success to Packet... Sep 5 09:50:02.389712 systemd[1]: Starting docker.service - Docker Application Container Engine... Sep 5 09:50:02.389729 (dockerd)[1538]: docker.service: Referenced but unset environment variable evaluates to an empty string: DOCKER_CGROUPS, DOCKER_OPTS, DOCKER_OPT_BIP, DOCKER_OPT_IPMASQ, DOCKER_OPT_MTU Sep 5 09:50:02.459949 coreos-metadata[1484]: Sep 05 09:50:02.459 INFO Fetch successful Sep 5 09:50:02.491824 unknown[1484]: wrote ssh authorized keys file for user: core Sep 5 09:50:02.526467 update-ssh-keys[1539]: Updated "/home/core/.ssh/authorized_keys" Sep 5 09:50:02.526741 systemd[1]: Finished coreos-metadata-sshkeys@core.service - Flatcar Metadata Agent (SSH Keys). Sep 5 09:50:02.538093 systemd[1]: Finished sshkeys.service. Sep 5 09:50:02.675908 dockerd[1538]: time="2024-09-05T09:50:02.675848141Z" level=info msg="Starting up" Sep 5 09:50:02.692941 systemd[1]: Finished packet-phone-home.service - Report Success to Packet. Sep 5 09:50:02.834639 dockerd[1538]: time="2024-09-05T09:50:02.834566113Z" level=info msg="Loading containers: start." Sep 5 09:50:02.918446 kernel: Initializing XFRM netlink socket Sep 5 09:50:02.934199 systemd-timesyncd[1372]: Network configuration changed, trying to establish connection. Sep 5 09:50:02.934247 systemd-timesyncd[1372]: Network configuration changed, trying to establish connection. Sep 5 09:50:02.937341 systemd-timesyncd[1372]: Network configuration changed, trying to establish connection. Sep 5 09:50:02.971341 systemd-networkd[1370]: docker0: Link UP Sep 5 09:50:02.971603 systemd-timesyncd[1372]: Network configuration changed, trying to establish connection. Sep 5 09:50:02.990212 dockerd[1538]: time="2024-09-05T09:50:02.990167800Z" level=info msg="Loading containers: done." Sep 5 09:50:02.997376 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck823205447-merged.mount: Deactivated successfully. Sep 5 09:50:02.997502 dockerd[1538]: time="2024-09-05T09:50:02.997392201Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Sep 5 09:50:02.997502 dockerd[1538]: time="2024-09-05T09:50:02.997435775Z" level=info msg="Docker daemon" commit=061aa95809be396a6b5542618d8a34b02a21ff77 containerd-snapshotter=false storage-driver=overlay2 version=26.1.0 Sep 5 09:50:02.997502 dockerd[1538]: time="2024-09-05T09:50:02.997485273Z" level=info msg="Daemon has completed initialization" Sep 5 09:50:03.011219 dockerd[1538]: time="2024-09-05T09:50:03.011182863Z" level=info msg="API listen on /run/docker.sock" Sep 5 09:50:03.011294 systemd[1]: Started docker.service - Docker Application Container Engine. Sep 5 09:50:03.011996 etcd-wrapper[1529]: Error response from daemon: No such container: etcd-member Sep 5 09:50:03.019032 etcd-wrapper[1686]: Error response from daemon: No such container: etcd-member Sep 5 09:50:03.036725 etcd-wrapper[1705]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Sep 5 09:50:03.519977 login[1498]: pam_lastlog(login:session): file /var/log/lastlog is locked/read, retrying Sep 5 09:50:03.520411 login[1490]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 5 09:50:03.526189 systemd-logind[1435]: New session 1 of user core. Sep 5 09:50:03.526921 systemd[1]: Created slice user-500.slice - User Slice of UID 500. Sep 5 09:50:03.527500 systemd[1]: Starting user-runtime-dir@500.service - User Runtime Directory /run/user/500... Sep 5 09:50:03.535272 systemd[1]: Finished user-runtime-dir@500.service - User Runtime Directory /run/user/500. Sep 5 09:50:03.536664 systemd[1]: Starting user@500.service - User Manager for UID 500... Sep 5 09:50:03.541173 (systemd)[1722]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Sep 5 09:50:03.613797 systemd[1722]: Queued start job for default target default.target. Sep 5 09:50:03.624913 systemd[1722]: Created slice app.slice - User Application Slice. Sep 5 09:50:03.624927 systemd[1722]: Reached target paths.target - Paths. Sep 5 09:50:03.624936 systemd[1722]: Reached target timers.target - Timers. Sep 5 09:50:03.625567 systemd[1722]: Starting dbus.socket - D-Bus User Message Bus Socket... Sep 5 09:50:03.630816 systemd[1722]: Listening on dbus.socket - D-Bus User Message Bus Socket. Sep 5 09:50:03.630844 systemd[1722]: Reached target sockets.target - Sockets. Sep 5 09:50:03.630853 systemd[1722]: Reached target basic.target - Basic System. Sep 5 09:50:03.630873 systemd[1722]: Reached target default.target - Main User Target. Sep 5 09:50:03.630889 systemd[1722]: Startup finished in 85ms. Sep 5 09:50:03.631009 systemd[1]: Started user@500.service - User Manager for UID 500. Sep 5 09:50:03.631782 systemd[1]: Started session-1.scope - Session 1 of User core. Sep 5 09:50:04.267770 etcd-wrapper[1705]: v3.5.0: Pulling from coreos/etcd Sep 5 09:50:04.526365 login[1498]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Sep 5 09:50:04.537709 systemd-logind[1435]: New session 2 of user core. Sep 5 09:50:04.547725 systemd[1]: Started session-2.scope - Session 2 of User core. Sep 5 09:50:04.589141 etcd-wrapper[1705]: 1813d21adc01: Pulling fs layer Sep 5 09:50:04.589141 etcd-wrapper[1705]: 6e96907ab677: Pulling fs layer Sep 5 09:50:04.589141 etcd-wrapper[1705]: 444ed0ea8673: Pulling fs layer Sep 5 09:50:04.589141 etcd-wrapper[1705]: 0fd2df5633f0: Pulling fs layer Sep 5 09:50:04.589281 etcd-wrapper[1705]: 8cc22b9456bb: Pulling fs layer Sep 5 09:50:04.589281 etcd-wrapper[1705]: 7ac70aecd290: Pulling fs layer Sep 5 09:50:04.589281 etcd-wrapper[1705]: 4b376c64dfe4: Pulling fs layer Sep 5 09:50:04.589281 etcd-wrapper[1705]: 0fd2df5633f0: Waiting Sep 5 09:50:04.589281 etcd-wrapper[1705]: 8cc22b9456bb: Waiting Sep 5 09:50:04.589281 etcd-wrapper[1705]: 7ac70aecd290: Waiting Sep 5 09:50:04.589281 etcd-wrapper[1705]: 4b376c64dfe4: Waiting Sep 5 09:50:04.998482 etcd-wrapper[1705]: 444ed0ea8673: Verifying Checksum Sep 5 09:50:04.998482 etcd-wrapper[1705]: 444ed0ea8673: Download complete Sep 5 09:50:05.005743 etcd-wrapper[1705]: 6e96907ab677: Verifying Checksum Sep 5 09:50:05.005743 etcd-wrapper[1705]: 6e96907ab677: Download complete Sep 5 09:50:05.089045 etcd-wrapper[1705]: 1813d21adc01: Verifying Checksum Sep 5 09:50:05.089045 etcd-wrapper[1705]: 1813d21adc01: Download complete Sep 5 09:50:05.308557 etcd-wrapper[1705]: 8cc22b9456bb: Download complete Sep 5 09:50:05.340427 etcd-wrapper[1705]: 0fd2df5633f0: Verifying Checksum Sep 5 09:50:05.340427 etcd-wrapper[1705]: 0fd2df5633f0: Download complete Sep 5 09:50:05.414934 etcd-wrapper[1705]: 7ac70aecd290: Verifying Checksum Sep 5 09:50:05.414934 etcd-wrapper[1705]: 7ac70aecd290: Download complete Sep 5 09:50:05.430355 etcd-wrapper[1705]: 1813d21adc01: Pull complete Sep 5 09:50:05.509867 systemd[1]: var-lib-docker-overlay2-8435d511614a9a13f0bcdcb4da28826caf70e181a894d42ec5a8ef85d1af5cb8-merged.mount: Deactivated successfully. Sep 5 09:50:05.632890 etcd-wrapper[1705]: 4b376c64dfe4: Verifying Checksum Sep 5 09:50:05.632890 etcd-wrapper[1705]: 4b376c64dfe4: Download complete Sep 5 09:50:05.734572 etcd-wrapper[1705]: 6e96907ab677: Pull complete Sep 5 09:50:05.810534 systemd[1]: var-lib-docker-overlay2-8661582ed3c35b748adc43a7ad6947de7d7c910931625ae0feff8185d32336ff-merged.mount: Deactivated successfully. Sep 5 09:50:05.852196 etcd-wrapper[1705]: 444ed0ea8673: Pull complete Sep 5 09:50:05.943920 etcd-wrapper[1705]: 0fd2df5633f0: Pull complete Sep 5 09:50:05.949931 etcd-wrapper[1705]: 8cc22b9456bb: Pull complete Sep 5 09:50:05.974426 etcd-wrapper[1705]: 7ac70aecd290: Pull complete Sep 5 09:50:05.980649 etcd-wrapper[1705]: 4b376c64dfe4: Pull complete Sep 5 09:50:05.983823 etcd-wrapper[1705]: Digest: sha256:28759af54acd6924b2191dc1a1d096e2fa2e219717a21b9d8edf89717db3631b Sep 5 09:50:05.984746 etcd-wrapper[1705]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.0 Sep 5 09:50:06.091800 containerd[1451]: time="2024-09-05T09:50:06.091730633Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Sep 5 09:50:06.091800 containerd[1451]: time="2024-09-05T09:50:06.091760157Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Sep 5 09:50:06.091800 containerd[1451]: time="2024-09-05T09:50:06.091767249Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 5 09:50:06.092051 containerd[1451]: time="2024-09-05T09:50:06.091806517Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.pause\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Sep 5 09:50:06.113570 systemd[1]: Started docker-ad5d2632196c478ba40c710bdff2482b9b156d5e4041a19fb09a5dc277ddcb07.scope - libcontainer container ad5d2632196c478ba40c710bdff2482b9b156d5e4041a19fb09a5dc277ddcb07. Sep 5 09:50:06.150194 etcd-wrapper[1705]: {"level":"info","ts":1725529806.1500719,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Sep 5 09:50:06.150194 etcd-wrapper[1705]: {"level":"info","ts":1725529806.1501293,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"a4bac18ead4c4a6d9abc172153874536"} Sep 5 09:50:06.150194 etcd-wrapper[1705]: {"level":"warn","ts":1725529806.1501453,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Sep 5 09:50:06.150194 etcd-wrapper[1705]: {"level":"warn","ts":1725529806.1501515,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Sep 5 09:50:06.150194 etcd-wrapper[1705]: {"level":"warn","ts":1725529806.1501548,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Sep 5 09:50:06.150194 etcd-wrapper[1705]: {"level":"warn","ts":1725529806.150158,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Sep 5 09:50:06.150516 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:06.150Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-peer-urls=http://10.67.80.105:2380","--listen-client-urls=http://0.0.0.0:2379","--initial-advertise-peer-urls=http://10.67.80.105:2380","--advertise-client-urls=http://10.67.80.105:2379","--discovery=https://discovery.etcd.io/3ddc8df26e1913717bb8cb4c716681e8"]} Sep 5 09:50:06.150516 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:06.150Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://10.67.80.105:2380"]} Sep 5 09:50:06.150673 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:06.150Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Sep 5 09:50:06.150741 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:06.150Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":false,"name":"a4bac18ead4c4a6d9abc172153874536","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://10.67.80.105:2380"],"listen-peer-urls":["http://10.67.80.105:2380"],"advertise-client-urls":["http://10.67.80.105:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"a4bac18ead4c4a6d9abc172153874536=http://10.67.80.105:2380","initial-cluster-state":"new","initial-cluster-token":"https://discovery.etcd.io/3ddc8df26e1913717bb8cb4c716681e8","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"https://discovery.etcd.io/3ddc8df26e1913717bb8cb4c716681e8","discovery-proxy":"","downgrade-check-interval":"5s"} Sep 5 09:50:06.151561 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:06.151Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"540.294µs"} Sep 5 09:50:06.439174 systemd[1]: var-lib-docker-overlay2-b4e0cb71e37c64ecd908eae4f7b062172307aa729ccf8ab2573fcffafdbc7134-merged.mount: Deactivated successfully. Sep 5 09:50:06.611921 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:06.611Z","caller":"v2discovery/discovery.go:336","msg":"found self from discovery server","discovery-url":"https://discovery.etcd.io","self":"cb86d319780e4df2"} Sep 5 09:50:06.611921 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:06.611Z","caller":"v2discovery/discovery.go:352","msg":"found peers from discovery server; waiting for more","discovery-url":"https://discovery.etcd.io","found-peers":1,"needed-peers":2} Sep 5 09:50:07.603748 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:07.603Z","caller":"v2discovery/discovery.go:371","msg":"found peer from discovery server","discovery-url":"https://discovery.etcd.io","peer":"ca9cfbc0150fc19a"} Sep 5 09:50:07.603748 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:07.603Z","caller":"v2discovery/discovery.go:352","msg":"found peers from discovery server; waiting for more","discovery-url":"https://discovery.etcd.io","found-peers":2,"needed-peers":1} Sep 5 09:50:11.765603 systemd[1]: Started sshd@1-147.75.90.131:22-139.178.89.65:36948.service - OpenSSH per-connection server daemon (139.178.89.65:36948). Sep 5 09:50:11.796389 sshd[1831]: Accepted publickey for core from 139.178.89.65 port 36948 ssh2: RSA SHA256:viQcM3T4EuxqlQU5+hMta+lvR6NH/c2V5YTON/8MGTQ Sep 5 09:50:11.797064 sshd[1831]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Sep 5 09:50:11.799769 systemd-logind[1435]: New session 3 of user core. Sep 5 09:50:11.809451 systemd[1]: Started session-3.scope - Session 3 of User core. Sep 5 09:50:11.866338 systemd[1]: Started sshd@2-147.75.90.131:22-139.178.89.65:36952.service - OpenSSH per-connection server daemon (139.178.89.65:36952). Sep 5 09:50:11.893621 sshd[1836]: Accepted publickey for core from 139.178.89.65 port 36952 ssh2: RSA SHA256:viQcM3T4EuxqlQU5+hMta+lvR6NH/c2V5YTON/8MGTQ Sep 5 09:50:11.894233 sshd[1836]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Sep 5 09:50:11.896818 systemd-logind[1435]: New session 4 of user core. Sep 5 09:50:11.905431 systemd[1]: Started session-4.scope - Session 4 of User core. Sep 5 09:50:11.957385 sshd[1836]: pam_unix(sshd:session): session closed for user core Sep 5 09:50:11.977178 systemd[1]: sshd@2-147.75.90.131:22-139.178.89.65:36952.service: Deactivated successfully. Sep 5 09:50:11.978130 systemd[1]: session-4.scope: Deactivated successfully. Sep 5 09:50:11.978831 systemd-logind[1435]: Session 4 logged out. Waiting for processes to exit. Sep 5 09:50:11.979303 systemd[1]: Started sshd@3-147.75.90.131:22-139.178.89.65:36958.service - OpenSSH per-connection server daemon (139.178.89.65:36958). Sep 5 09:50:11.979879 systemd-logind[1435]: Removed session 4. Sep 5 09:50:12.007423 sshd[1843]: Accepted publickey for core from 139.178.89.65 port 36958 ssh2: RSA SHA256:viQcM3T4EuxqlQU5+hMta+lvR6NH/c2V5YTON/8MGTQ Sep 5 09:50:12.008121 sshd[1843]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Sep 5 09:50:12.010925 systemd-logind[1435]: New session 5 of user core. Sep 5 09:50:12.028643 systemd[1]: Started session-5.scope - Session 5 of User core. Sep 5 09:50:12.081539 sshd[1843]: pam_unix(sshd:session): session closed for user core Sep 5 09:50:12.082932 systemd[1]: sshd@3-147.75.90.131:22-139.178.89.65:36958.service: Deactivated successfully. Sep 5 09:50:12.083754 systemd[1]: session-5.scope: Deactivated successfully. Sep 5 09:50:12.084331 systemd-logind[1435]: Session 5 logged out. Waiting for processes to exit. Sep 5 09:50:12.085036 systemd-logind[1435]: Removed session 5. Sep 5 09:50:22.097504 systemd[1]: Started sshd@4-147.75.90.131:22-139.178.89.65:35948.service - OpenSSH per-connection server daemon (139.178.89.65:35948). Sep 5 09:50:22.128816 sshd[1850]: Accepted publickey for core from 139.178.89.65 port 35948 ssh2: RSA SHA256:viQcM3T4EuxqlQU5+hMta+lvR6NH/c2V5YTON/8MGTQ Sep 5 09:50:22.129451 sshd[1850]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Sep 5 09:50:22.131882 systemd-logind[1435]: New session 6 of user core. Sep 5 09:50:22.144526 systemd[1]: Started session-6.scope - Session 6 of User core. Sep 5 09:50:22.194834 sshd[1850]: pam_unix(sshd:session): session closed for user core Sep 5 09:50:22.208046 systemd[1]: sshd@4-147.75.90.131:22-139.178.89.65:35948.service: Deactivated successfully. Sep 5 09:50:22.209491 systemd[1]: session-6.scope: Deactivated successfully. Sep 5 09:50:22.210787 systemd-logind[1435]: Session 6 logged out. Waiting for processes to exit. Sep 5 09:50:22.211950 systemd[1]: Started sshd@5-147.75.90.131:22-139.178.89.65:35964.service - OpenSSH per-connection server daemon (139.178.89.65:35964). Sep 5 09:50:22.213053 systemd-logind[1435]: Removed session 6. Sep 5 09:50:22.266613 sshd[1857]: Accepted publickey for core from 139.178.89.65 port 35964 ssh2: RSA SHA256:viQcM3T4EuxqlQU5+hMta+lvR6NH/c2V5YTON/8MGTQ Sep 5 09:50:22.267742 sshd[1857]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Sep 5 09:50:22.271583 systemd-logind[1435]: New session 7 of user core. Sep 5 09:50:22.290607 systemd[1]: Started session-7.scope - Session 7 of User core. Sep 5 09:50:22.342594 sshd[1857]: pam_unix(sshd:session): session closed for user core Sep 5 09:50:22.344007 systemd[1]: sshd@5-147.75.90.131:22-139.178.89.65:35964.service: Deactivated successfully. Sep 5 09:50:22.344837 systemd[1]: session-7.scope: Deactivated successfully. Sep 5 09:50:22.345525 systemd-logind[1435]: Session 7 logged out. Waiting for processes to exit. Sep 5 09:50:22.346161 systemd-logind[1435]: Removed session 7. Sep 5 09:50:32.354489 systemd[1]: Started sshd@6-147.75.90.131:22-139.178.89.65:50482.service - OpenSSH per-connection server daemon (139.178.89.65:50482). Sep 5 09:50:32.384727 sshd[1864]: Accepted publickey for core from 139.178.89.65 port 50482 ssh2: RSA SHA256:viQcM3T4EuxqlQU5+hMta+lvR6NH/c2V5YTON/8MGTQ Sep 5 09:50:32.385351 sshd[1864]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Sep 5 09:50:32.387852 systemd-logind[1435]: New session 8 of user core. Sep 5 09:50:32.402567 systemd[1]: Started session-8.scope - Session 8 of User core. Sep 5 09:50:32.452850 sshd[1864]: pam_unix(sshd:session): session closed for user core Sep 5 09:50:32.461876 systemd[1]: sshd@6-147.75.90.131:22-139.178.89.65:50482.service: Deactivated successfully. Sep 5 09:50:32.462593 systemd[1]: session-8.scope: Deactivated successfully. Sep 5 09:50:32.463223 systemd-logind[1435]: Session 8 logged out. Waiting for processes to exit. Sep 5 09:50:32.463892 systemd[1]: Started sshd@7-147.75.90.131:22-139.178.89.65:50488.service - OpenSSH per-connection server daemon (139.178.89.65:50488). Sep 5 09:50:32.464264 systemd-logind[1435]: Removed session 8. Sep 5 09:50:32.492465 sshd[1871]: Accepted publickey for core from 139.178.89.65 port 50488 ssh2: RSA SHA256:viQcM3T4EuxqlQU5+hMta+lvR6NH/c2V5YTON/8MGTQ Sep 5 09:50:32.493143 sshd[1871]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Sep 5 09:50:32.495900 systemd-logind[1435]: New session 9 of user core. Sep 5 09:50:32.506556 systemd[1]: Started session-9.scope - Session 9 of User core. Sep 5 09:50:32.556915 sshd[1871]: pam_unix(sshd:session): session closed for user core Sep 5 09:50:32.558224 systemd[1]: sshd@7-147.75.90.131:22-139.178.89.65:50488.service: Deactivated successfully. Sep 5 09:50:32.559061 systemd[1]: session-9.scope: Deactivated successfully. Sep 5 09:50:32.559807 systemd-logind[1435]: Session 9 logged out. Waiting for processes to exit. Sep 5 09:50:32.560386 systemd-logind[1435]: Removed session 9. Sep 5 09:50:33.405279 systemd-timesyncd[1372]: Contacted time server [2607:f298:5:101d:f816:3eff:fefd:8817]:123 (2.flatcar.pool.ntp.org). Sep 5 09:50:33.405464 systemd-timesyncd[1372]: Initial clock synchronization to Thu 2024-09-05 09:50:33.762995 UTC. Sep 5 09:50:38.802996 systemd[1]: Started sshd@8-147.75.90.131:22-218.92.0.118:32650.service - OpenSSH per-connection server daemon (218.92.0.118:32650). Sep 5 09:50:40.067720 sshd[1881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Sep 5 09:50:42.689276 sshd[1879]: PAM: Permission denied for root from 218.92.0.118 Sep 5 09:50:42.808729 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.808Z","caller":"v2discovery/discovery.go:371","msg":"found peer from discovery server","discovery-url":"https://discovery.etcd.io","peer":"4b80b63e0ceb5682"} Sep 5 09:50:42.808729 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.808Z","caller":"v2discovery/discovery.go:378","msg":"found all needed peers from discovery server","discovery-url":"https://discovery.etcd.io","found-peers":3} Sep 5 09:50:42.813604 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.811Z","caller":"etcdserver/raft.go:448","msg":"starting local member","local-member-id":"cb86d319780e4df2","cluster-id":"db147e49e9590aaa"} Sep 5 09:50:42.813604 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.811Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"cb86d319780e4df2 switched to configuration voters=()"} Sep 5 09:50:42.813604 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.811Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"cb86d319780e4df2 became follower at term 0"} Sep 5 09:50:42.813604 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.811Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft cb86d319780e4df2 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Sep 5 09:50:42.813604 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.811Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"cb86d319780e4df2 became follower at term 1"} Sep 5 09:50:42.813604 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.811Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"cb86d319780e4df2 switched to configuration voters=(5440548727484536450)"} Sep 5 09:50:42.813604 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.811Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"cb86d319780e4df2 switched to configuration voters=(5440548727484536450 14599820894433952154)"} Sep 5 09:50:42.813604 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.811Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"cb86d319780e4df2 switched to configuration voters=(5440548727484536450 14599820894433952154 14665641342920445426)"} Sep 5 09:50:42.813604 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:50:42.812Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Sep 5 09:50:42.813604 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.812Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Sep 5 09:50:42.813604 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.813Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Sep 5 09:50:42.813969 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.813Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"4b80b63e0ceb5682"} Sep 5 09:50:42.813969 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.813Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"cb86d319780e4df2","remote-peer-id":"4b80b63e0ceb5682"} Sep 5 09:50:42.814118 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.814Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"cb86d319780e4df2","remote-peer-id":"4b80b63e0ceb5682"} Sep 5 09:50:42.814308 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.814Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"cb86d319780e4df2","remote-peer-id":"4b80b63e0ceb5682"} Sep 5 09:50:42.814739 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.814Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"4b80b63e0ceb5682"} Sep 5 09:50:42.814786 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.814Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"cb86d319780e4df2","remote-peer-id":"4b80b63e0ceb5682","remote-peer-urls":["http://10.67.80.85:2380"]} Sep 5 09:50:42.814786 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.814Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"cb86d319780e4df2","remote-peer-id":"4b80b63e0ceb5682"} Sep 5 09:50:42.814786 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.814Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"cb86d319780e4df2","remote-peer-id":"4b80b63e0ceb5682"} Sep 5 09:50:42.814786 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.814Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"ca9cfbc0150fc19a"} Sep 5 09:50:42.814786 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.814Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"cb86d319780e4df2","remote-peer-id":"ca9cfbc0150fc19a"} Sep 5 09:50:42.814974 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.814Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"cb86d319780e4df2","remote-peer-id":"ca9cfbc0150fc19a"} Sep 5 09:50:42.815525 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.815Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"cb86d319780e4df2","remote-peer-id":"ca9cfbc0150fc19a"} Sep 5 09:50:42.815525 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.815Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"ca9cfbc0150fc19a"} Sep 5 09:50:42.815525 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.815Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"cb86d319780e4df2","remote-peer-id":"ca9cfbc0150fc19a"} Sep 5 09:50:42.815525 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.815Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"cb86d319780e4df2","remote-peer-id":"ca9cfbc0150fc19a","remote-peer-urls":["http://10.67.80.25:2380"]} Sep 5 09:50:42.815525 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.815Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"cb86d319780e4df2","local-server-version":"3.5.0","cluster-version":"to_be_decided"} Sep 5 09:50:42.815525 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.815Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"cb86d319780e4df2","remote-peer-id":"ca9cfbc0150fc19a"} Sep 5 09:50:42.815801 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.815Z","caller":"etcdserver/server.go:744","msg":"starting initial election tick advance","election-ticks":10} Sep 5 09:50:42.815925 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.815Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"cb86d319780e4df2 switched to configuration voters=(5440548727484536450 14599820894433952154 14665641342920445426)"} Sep 5 09:50:42.815983 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.815Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"db147e49e9590aaa","local-member-id":"cb86d319780e4df2","added-peer-id":"4b80b63e0ceb5682","added-peer-peer-urls":["http://10.67.80.85:2380"]} Sep 5 09:50:42.816019 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.815Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"cb86d319780e4df2 switched to configuration voters=(5440548727484536450 14599820894433952154 14665641342920445426)"} Sep 5 09:50:42.816052 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.816Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"db147e49e9590aaa","local-member-id":"cb86d319780e4df2","added-peer-id":"ca9cfbc0150fc19a","added-peer-peer-urls":["http://10.67.80.25:2380"]} Sep 5 09:50:42.816088 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.816Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"cb86d319780e4df2 switched to configuration voters=(5440548727484536450 14599820894433952154 14665641342920445426)"} Sep 5 09:50:42.816088 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.816Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"db147e49e9590aaa","local-member-id":"cb86d319780e4df2","added-peer-id":"cb86d319780e4df2","added-peer-peer-urls":["http://10.67.80.105:2380"]} Sep 5 09:50:42.816175 systemd[1]: Started sshd@9-147.75.90.131:22-139.178.89.65:47856.service - OpenSSH per-connection server daemon (139.178.89.65:47856). Sep 5 09:50:42.816635 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.816Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"cb86d319780e4df2","initial-advertise-peer-urls":["http://10.67.80.105:2380"],"listen-peer-urls":["http://10.67.80.105:2380"],"advertise-client-urls":["http://10.67.80.105:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Sep 5 09:50:42.816668 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.816Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"10.67.80.105:2380"} Sep 5 09:50:42.816668 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.816Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"10.67.80.105:2380"} Sep 5 09:50:42.817488 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.817Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"cb86d319780e4df2","to":"ca9cfbc0150fc19a","stream-type":"stream MsgApp v2"} Sep 5 09:50:42.817488 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.817Z","caller":"rafthttp/peer_status.go:53","msg":"peer became active","peer-id":"ca9cfbc0150fc19a"} Sep 5 09:50:42.817488 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.817Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"cb86d319780e4df2","remote-peer-id":"ca9cfbc0150fc19a"} Sep 5 09:50:42.817758 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.817Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"cb86d319780e4df2","to":"ca9cfbc0150fc19a","stream-type":"stream Message"} Sep 5 09:50:42.817758 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.817Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"cb86d319780e4df2","remote-peer-id":"ca9cfbc0150fc19a"} Sep 5 09:50:42.818826 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.818Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"cb86d319780e4df2","remote-peer-id":"ca9cfbc0150fc19a"} Sep 5 09:50:42.818826 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:42.818Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"cb86d319780e4df2","remote-peer-id":"ca9cfbc0150fc19a"} Sep 5 09:50:42.844828 sshd[1888]: Accepted publickey for core from 139.178.89.65 port 47856 ssh2: RSA SHA256:viQcM3T4EuxqlQU5+hMta+lvR6NH/c2V5YTON/8MGTQ Sep 5 09:50:42.845494 sshd[1888]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Sep 5 09:50:42.848306 systemd-logind[1435]: New session 10 of user core. Sep 5 09:50:42.860663 systemd[1]: Started session-10.scope - Session 10 of User core. Sep 5 09:50:42.911548 sshd[1888]: pam_unix(sshd:session): session closed for user core Sep 5 09:50:42.926994 systemd[1]: sshd@9-147.75.90.131:22-139.178.89.65:47856.service: Deactivated successfully. Sep 5 09:50:42.927828 systemd[1]: session-10.scope: Deactivated successfully. Sep 5 09:50:42.928665 systemd-logind[1435]: Session 10 logged out. Waiting for processes to exit. Sep 5 09:50:42.929330 systemd[1]: Started sshd@10-147.75.90.131:22-139.178.89.65:47870.service - OpenSSH per-connection server daemon (139.178.89.65:47870). Sep 5 09:50:42.929937 systemd-logind[1435]: Removed session 10. Sep 5 09:50:42.959376 sshd[1896]: Accepted publickey for core from 139.178.89.65 port 47870 ssh2: RSA SHA256:viQcM3T4EuxqlQU5+hMta+lvR6NH/c2V5YTON/8MGTQ Sep 5 09:50:42.960014 sshd[1896]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Sep 5 09:50:42.962354 systemd-logind[1435]: New session 11 of user core. Sep 5 09:50:42.976783 systemd[1]: Started session-11.scope - Session 11 of User core. Sep 5 09:50:43.021138 sshd[1890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Sep 5 09:50:43.030108 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:43.029Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"cb86d319780e4df2","to":"4b80b63e0ceb5682","stream-type":"stream Message"} Sep 5 09:50:43.030108 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:43.029Z","caller":"rafthttp/peer_status.go:53","msg":"peer became active","peer-id":"4b80b63e0ceb5682"} Sep 5 09:50:43.030108 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:43.029Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"cb86d319780e4df2","remote-peer-id":"4b80b63e0ceb5682"} Sep 5 09:50:43.030108 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:43.029Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"cb86d319780e4df2","to":"4b80b63e0ceb5682","stream-type":"stream MsgApp v2"} Sep 5 09:50:43.030108 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:43.029Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"cb86d319780e4df2","remote-peer-id":"4b80b63e0ceb5682"} Sep 5 09:50:43.030852 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:43.030Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"cb86d319780e4df2","remote-peer-id":"4b80b63e0ceb5682"} Sep 5 09:50:43.030852 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:43.030Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"cb86d319780e4df2","remote-peer-id":"4b80b63e0ceb5682"} Sep 5 09:50:43.039002 sshd[1896]: pam_unix(sshd:session): session closed for user core Sep 5 09:50:43.040285 systemd[1]: sshd@10-147.75.90.131:22-139.178.89.65:47870.service: Deactivated successfully. Sep 5 09:50:43.041123 systemd[1]: session-11.scope: Deactivated successfully. Sep 5 09:50:43.041818 systemd-logind[1435]: Session 11 logged out. Waiting for processes to exit. Sep 5 09:50:43.042312 systemd-logind[1435]: Removed session 11. Sep 5 09:50:43.070624 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:43.069Z","caller":"etcdserver/server.go:767","msg":"initialized peer connections; fast-forwarding election ticks","local-member-id":"cb86d319780e4df2","forward-ticks":8,"forward-duration":"800ms","election-ticks":10,"election-timeout":"1s","active-remote-members":2} Sep 5 09:50:43.179979 update_engine[1440]: I0905 09:50:43.179855 1440 update_attempter.cc:509] Updating boot flags... Sep 5 09:50:43.214621 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:43.214Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"cb86d319780e4df2 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for ca9cfbc0150fc19a [logterm: 1, index: 3] at term 1"} Sep 5 09:50:43.215910 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:43.215Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"cb86d319780e4df2 [term: 1] received a MsgVote message with higher term from ca9cfbc0150fc19a [term: 2]"} Sep 5 09:50:43.215910 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:43.215Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"cb86d319780e4df2 became follower at term 2"} Sep 5 09:50:43.215910 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:43.215Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"cb86d319780e4df2 [logterm: 1, index: 3, vote: 0] cast MsgVote for ca9cfbc0150fc19a [logterm: 1, index: 3] at term 2"} Sep 5 09:50:43.216555 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:43.216Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: cb86d319780e4df2 elected leader ca9cfbc0150fc19a at term 2"} Sep 5 09:50:43.219340 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:43.219Z","caller":"membership/cluster.go:531","msg":"set initial cluster version","cluster-id":"db147e49e9590aaa","local-member-id":"cb86d319780e4df2","cluster-version":"3.5"} Sep 5 09:50:43.219340 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:43.219Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} Sep 5 09:50:43.219469 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:43.219Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"cb86d319780e4df2","local-member-attributes":"{Name:a4bac18ead4c4a6d9abc172153874536 ClientURLs:[http://10.67.80.105:2379]}","request-path":"/0/members/cb86d319780e4df2/attributes","cluster-id":"db147e49e9590aaa","publish-timeout":"7s"} Sep 5 09:50:43.219469 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:43.219Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Sep 5 09:50:43.219469 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:43.219Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Sep 5 09:50:43.219570 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:43.219Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Sep 5 09:50:43.219544 systemd[1]: Started etcd-member.service - etcd (System Application Container). Sep 5 09:50:43.219716 systemd[1]: Reached target multi-user.target - Multi-User System. Sep 5 09:50:43.219953 etcd-wrapper[1705]: {"level":"info","ts":"2024-09-05T09:50:43.219Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Sep 5 09:50:43.220376 systemd[1]: Startup finished in 2.702s (kernel) + 7.020s (initrd) + 50.317s (userspace) = 1min 41ms. Sep 5 09:50:43.221306 kernel: BTRFS warning: duplicate device /dev/sda3 devid 1 generation 37 scanned by (udev-worker) (1912) Sep 5 09:50:45.341260 sshd[1879]: PAM: Permission denied for root from 218.92.0.118 Sep 5 09:50:45.673172 sshd[1919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Sep 5 09:50:47.405863 sshd[1879]: PAM: Permission denied for root from 218.92.0.118 Sep 5 09:50:47.570716 sshd[1879]: Received disconnect from 218.92.0.118 port 32650:11: [preauth] Sep 5 09:50:47.570716 sshd[1879]: Disconnected from authenticating user root 218.92.0.118 port 32650 [preauth] Sep 5 09:50:47.574416 systemd[1]: sshd@8-147.75.90.131:22-218.92.0.118:32650.service: Deactivated successfully. Sep 5 09:50:47.745669 systemd[1]: Started sshd@11-147.75.90.131:22-218.92.0.118:22817.service - OpenSSH per-connection server daemon (218.92.0.118:22817). Sep 5 09:50:48.927178 sshd[1925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Sep 5 09:50:50.747752 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:50:50.747Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"cb86d319780e4df2","remote-peer-id":"4b80b63e0ceb5682","error":"EOF"} Sep 5 09:50:50.747752 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:50:50.747Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"cb86d319780e4df2","remote-peer-id":"4b80b63e0ceb5682","error":"EOF"} Sep 5 09:50:50.748978 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:50:50.748Z","caller":"rafthttp/peer_status.go:66","msg":"peer became inactive (message send to peer failed)","peer-id":"4b80b63e0ceb5682","error":"failed to dial 4b80b63e0ceb5682 on stream Message (read tcp 10.67.80.105:58574->10.67.80.85:2380: read: connection reset by peer)"} Sep 5 09:50:51.072010 sshd[1923]: PAM: Permission denied for root from 218.92.0.118 Sep 5 09:50:51.385350 sshd[1926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Sep 5 09:50:53.145578 systemd[1]: Started sshd@12-147.75.90.131:22-139.178.89.65:49364.service - OpenSSH per-connection server daemon (139.178.89.65:49364). Sep 5 09:50:53.173180 sshd[1928]: Accepted publickey for core from 139.178.89.65 port 49364 ssh2: RSA SHA256:viQcM3T4EuxqlQU5+hMta+lvR6NH/c2V5YTON/8MGTQ Sep 5 09:50:53.173816 sshd[1928]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Sep 5 09:50:53.176194 systemd-logind[1435]: New session 12 of user core. Sep 5 09:50:53.188599 systemd[1]: Started session-12.scope - Session 12 of User core. Sep 5 09:50:53.240565 sshd[1928]: pam_unix(sshd:session): session closed for user core Sep 5 09:50:53.259027 systemd[1]: sshd@12-147.75.90.131:22-139.178.89.65:49364.service: Deactivated successfully. Sep 5 09:50:53.259863 systemd[1]: session-12.scope: Deactivated successfully. Sep 5 09:50:53.260672 systemd-logind[1435]: Session 12 logged out. Waiting for processes to exit. Sep 5 09:50:53.261341 systemd[1]: Started sshd@13-147.75.90.131:22-139.178.89.65:49366.service - OpenSSH per-connection server daemon (139.178.89.65:49366). Sep 5 09:50:53.262005 systemd-logind[1435]: Removed session 12. Sep 5 09:50:53.290733 sshd[1935]: Accepted publickey for core from 139.178.89.65 port 49366 ssh2: RSA SHA256:viQcM3T4EuxqlQU5+hMta+lvR6NH/c2V5YTON/8MGTQ Sep 5 09:50:53.291419 sshd[1935]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Sep 5 09:50:53.293967 systemd-logind[1435]: New session 13 of user core. Sep 5 09:50:53.307530 systemd[1]: Started session-13.scope - Session 13 of User core. Sep 5 09:50:53.356890 sshd[1935]: pam_unix(sshd:session): session closed for user core Sep 5 09:50:53.374147 systemd[1]: sshd@13-147.75.90.131:22-139.178.89.65:49366.service: Deactivated successfully. Sep 5 09:50:53.377901 systemd[1]: session-13.scope: Deactivated successfully. Sep 5 09:50:53.381327 systemd-logind[1435]: Session 13 logged out. Waiting for processes to exit. Sep 5 09:50:53.392706 systemd[1]: Started sshd@14-147.75.90.131:22-139.178.89.65:49372.service - OpenSSH per-connection server daemon (139.178.89.65:49372). Sep 5 09:50:53.393319 systemd-logind[1435]: Removed session 13. Sep 5 09:50:53.418061 sshd[1942]: Accepted publickey for core from 139.178.89.65 port 49372 ssh2: RSA SHA256:viQcM3T4EuxqlQU5+hMta+lvR6NH/c2V5YTON/8MGTQ Sep 5 09:50:53.418701 sshd[1942]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Sep 5 09:50:53.420941 systemd-logind[1435]: New session 14 of user core. Sep 5 09:50:53.428731 systemd[1]: Started session-14.scope - Session 14 of User core. Sep 5 09:50:53.498581 sshd[1942]: pam_unix(sshd:session): session closed for user core Sep 5 09:50:53.518156 systemd[1]: sshd@14-147.75.90.131:22-139.178.89.65:49372.service: Deactivated successfully. Sep 5 09:50:53.521908 systemd[1]: session-14.scope: Deactivated successfully. Sep 5 09:50:53.525376 systemd-logind[1435]: Session 14 logged out. Waiting for processes to exit. Sep 5 09:50:53.541076 systemd[1]: Started sshd@15-147.75.90.131:22-139.178.89.65:49376.service - OpenSSH per-connection server daemon (139.178.89.65:49376). Sep 5 09:50:53.543537 systemd-logind[1435]: Removed session 14. Sep 5 09:50:53.592320 sshd[1950]: Accepted publickey for core from 139.178.89.65 port 49376 ssh2: RSA SHA256:viQcM3T4EuxqlQU5+hMta+lvR6NH/c2V5YTON/8MGTQ Sep 5 09:50:53.592967 sshd[1950]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Sep 5 09:50:53.595291 systemd-logind[1435]: New session 15 of user core. Sep 5 09:50:53.604575 systemd[1]: Started session-15.scope - Session 15 of User core. Sep 5 09:50:53.660319 sudo[1953]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Sep 5 09:50:53.660465 sudo[1953]: pam_unix(sudo:session): session opened for user root(uid=0) by core(uid=500) Sep 5 09:50:53.671915 sudo[1953]: pam_unix(sudo:session): session closed for user root Sep 5 09:50:53.672750 sshd[1950]: pam_unix(sshd:session): session closed for user core Sep 5 09:50:53.692210 systemd[1]: sshd@15-147.75.90.131:22-139.178.89.65:49376.service: Deactivated successfully. Sep 5 09:50:53.695903 systemd[1]: session-15.scope: Deactivated successfully. Sep 5 09:50:53.699442 systemd-logind[1435]: Session 15 logged out. Waiting for processes to exit. Sep 5 09:50:53.715056 systemd[1]: Started sshd@16-147.75.90.131:22-139.178.89.65:49382.service - OpenSSH per-connection server daemon (139.178.89.65:49382). Sep 5 09:50:53.717233 systemd-logind[1435]: Removed session 15. Sep 5 09:50:53.812716 sshd[1958]: Accepted publickey for core from 139.178.89.65 port 49382 ssh2: RSA SHA256:viQcM3T4EuxqlQU5+hMta+lvR6NH/c2V5YTON/8MGTQ Sep 5 09:50:53.813643 sshd[1958]: pam_unix(sshd:session): session opened for user core(uid=500) by core(uid=0) Sep 5 09:50:53.816832 systemd-logind[1435]: New session 16 of user core. Sep 5 09:50:53.829706 systemd[1]: Started session-16.scope - Session 16 of User core. Sep 5 09:50:53.899406 sudo[1964]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Sep 5 09:50:53.900219 sudo[1964]: pam_unix(sudo:session): session opened for user root(uid=0) by core(uid=500) Sep 5 09:50:53.908845 sudo[1964]: pam_unix(sudo:session): session closed for user root Sep 5 09:50:53.923186 sudo[1963]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Sep 5 09:50:53.924066 sudo[1963]: pam_unix(sudo:session): session opened for user root(uid=0) by core(uid=500) Sep 5 09:50:53.939718 sshd[1923]: PAM: Permission denied for root from 218.92.0.118 Sep 5 09:50:53.961061 systemd[1]: Stopping audit-rules.service - Load Security Auditing Rules... Sep 5 09:50:53.964588 auditctl[1967]: No rules Sep 5 09:50:53.965551 systemd[1]: audit-rules.service: Deactivated successfully. Sep 5 09:50:53.966071 systemd[1]: Stopped audit-rules.service - Load Security Auditing Rules. Sep 5 09:50:53.971784 systemd[1]: Starting audit-rules.service - Load Security Auditing Rules... Sep 5 09:50:54.018186 augenrules[1985]: No rules Sep 5 09:50:54.019136 systemd[1]: Finished audit-rules.service - Load Security Auditing Rules. Sep 5 09:50:54.020449 sudo[1963]: pam_unix(sudo:session): session closed for user root Sep 5 09:50:54.022304 sshd[1958]: pam_unix(sshd:session): session closed for user core Sep 5 09:50:54.025477 systemd[1]: sshd@16-147.75.90.131:22-139.178.89.65:49382.service: Deactivated successfully. Sep 5 09:50:54.027567 systemd[1]: session-16.scope: Deactivated successfully. Sep 5 09:50:54.029246 systemd-logind[1435]: Session 16 logged out. Waiting for processes to exit. Sep 5 09:50:54.030765 systemd-logind[1435]: Removed session 16. Sep 5 09:50:54.252645 sshd[1992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Sep 5 09:50:56.148749 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:50:56.148Z","caller":"rafthttp/stream.go:194","msg":"lost TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"cb86d319780e4df2","remote-peer-id":"4b80b63e0ceb5682"} Sep 5 09:50:56.148749 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:50:56.148Z","caller":"rafthttp/stream.go:194","msg":"lost TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"cb86d319780e4df2","remote-peer-id":"4b80b63e0ceb5682"} Sep 5 09:50:56.888565 sshd[1923]: PAM: Permission denied for root from 218.92.0.118 Sep 5 09:50:57.043819 sshd[1923]: Received disconnect from 218.92.0.118 port 22817:11: [preauth] Sep 5 09:50:57.043819 sshd[1923]: Disconnected from authenticating user root 218.92.0.118 port 22817 [preauth] Sep 5 09:50:57.047203 systemd[1]: sshd@11-147.75.90.131:22-218.92.0.118:22817.service: Deactivated successfully. Sep 5 09:50:57.214562 systemd[1]: Started sshd@17-147.75.90.131:22-218.92.0.118:13582.service - OpenSSH per-connection server daemon (218.92.0.118:13582). Sep 5 09:50:58.388199 sshd[1998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Sep 5 09:50:59.904755 sshd[1996]: PAM: Permission denied for root from 218.92.0.118 Sep 5 09:51:00.214540 sshd[1999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Sep 5 09:51:02.007376 sshd[1996]: PAM: Permission denied for root from 218.92.0.118 Sep 5 09:51:02.690952 sshd[2000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.118 user=root Sep 5 09:51:05.090928 sshd[1996]: PAM: Permission denied for root from 218.92.0.118 Sep 5 09:51:05.247764 sshd[1996]: Received disconnect from 218.92.0.118 port 13582:11: [preauth] Sep 5 09:51:05.247764 sshd[1996]: Disconnected from authenticating user root 218.92.0.118 port 13582 [preauth] Sep 5 09:51:05.251155 systemd[1]: sshd@17-147.75.90.131:22-218.92.0.118:13582.service: Deactivated successfully. Sep 5 09:51:10.770094 systemd[1]: Started sshd@18-147.75.90.131:22-106.75.241.35:34388.service - OpenSSH per-connection server daemon (106.75.241.35:34388). Sep 5 09:51:17.816146 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:51:17.815Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:51:17.816146 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:51:17.815Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:51:22.816742 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:51:22.815Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:51:22.816742 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:51:22.816Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:51:27.817126 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:51:27.816Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:51:27.817126 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:51:27.816Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:51:32.817258 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:51:32.816Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:51:32.817258 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:51:32.816Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:51:37.817859 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:51:37.817Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:51:37.817859 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:51:37.817Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:51:42.818674 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:51:42.818Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:51:42.818674 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:51:42.818Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:51:47.819591 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:51:47.818Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:51:47.819591 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:51:47.819Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:51:52.820623 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:51:52.820Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:51:52.820623 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:51:52.820Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:51:57.821192 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:51:57.820Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:51:57.821192 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:51:57.820Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:52:02.821342 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:52:02.820Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:52:02.821342 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:52:02.820Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:52:07.821728 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:52:07.821Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:52:07.821728 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:52:07.821Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:52:12.822175 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:52:12.821Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:52:12.822175 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:52:12.821Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:52:17.822680 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:52:17.822Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:52:17.822680 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:52:17.822Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:52:22.823149 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:52:22.822Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:52:22.823149 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:52:22.822Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:52:27.823653 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:52:27.823Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:52:27.823653 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:52:27.823Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:52:32.824529 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:52:32.823Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:52:32.824529 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:52:32.824Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:52:37.824733 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:52:37.824Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:52:37.824733 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:52:37.824Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:52:42.824990 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:52:42.824Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:52:42.824990 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:52:42.824Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:52:47.825652 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:52:47.825Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:52:47.825652 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:52:47.825Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:52:51.280233 update_engine[1440]: I0905 09:52:51.280115 1440 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Sep 5 09:52:51.280233 update_engine[1440]: I0905 09:52:51.280197 1440 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Sep 5 09:52:51.281210 update_engine[1440]: I0905 09:52:51.280702 1440 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Sep 5 09:52:51.281887 update_engine[1440]: I0905 09:52:51.281809 1440 omaha_request_params.cc:62] Current group set to beta Sep 5 09:52:51.282085 update_engine[1440]: I0905 09:52:51.282037 1440 update_attempter.cc:499] Already updated boot flags. Skipping. Sep 5 09:52:51.282085 update_engine[1440]: I0905 09:52:51.282054 1440 update_attempter.cc:643] Scheduling an action processor start. Sep 5 09:52:51.282085 update_engine[1440]: I0905 09:52:51.282084 1440 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Sep 5 09:52:51.282363 update_engine[1440]: I0905 09:52:51.282159 1440 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Sep 5 09:52:51.282363 update_engine[1440]: I0905 09:52:51.282335 1440 omaha_request_action.cc:271] Posting an Omaha request to disabled Sep 5 09:52:51.282363 update_engine[1440]: I0905 09:52:51.282356 1440 omaha_request_action.cc:272] Request: <?xml version="1.0" encoding="UTF-8"?> Sep 5 09:52:51.282363 update_engine[1440]: <request protocol="3.0" version="update_engine-0.4.10" updaterversion="update_engine-0.4.10" installsource="scheduler" ismachine="1"> Sep 5 09:52:51.282363 update_engine[1440]: <os version="Chateau" platform="CoreOS" sp="4054.1.0_x86_64"></os> Sep 5 09:52:51.282363 update_engine[1440]: <app appid="{e96281a6-d1af-4bde-9a0a-97b76e56dc57}" version="4054.1.0" track="beta" bootid="{50d2ace5-a58a-40f3-b0d9-bd4b2b46876a}" oem="packet" oemversion="0.2.2-r2" alephversion="4054.1.0" machineid="a4bac18ead4c4a6d9abc172153874536" machinealias="" lang="en-US" board="amd64-usr" hardware_class="" delta_okay="false" > Sep 5 09:52:51.282363 update_engine[1440]: <ping active="1"></ping> Sep 5 09:52:51.282363 update_engine[1440]: <updatecheck></updatecheck> Sep 5 09:52:51.282363 update_engine[1440]: <event eventtype="3" eventresult="2" previousversion="0.0.0.0"></event> Sep 5 09:52:51.282363 update_engine[1440]: </app> Sep 5 09:52:51.282363 update_engine[1440]: </request> Sep 5 09:52:51.282363 update_engine[1440]: I0905 09:52:51.282367 1440 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 5 09:52:51.283321 locksmithd[1477]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Sep 5 09:52:51.285475 update_engine[1440]: I0905 09:52:51.285439 1440 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 5 09:52:51.285658 update_engine[1440]: I0905 09:52:51.285622 1440 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Sep 5 09:52:51.303006 update_engine[1440]: E0905 09:52:51.302917 1440 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 5 09:52:51.303192 update_engine[1440]: I0905 09:52:51.303061 1440 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Sep 5 09:52:52.826526 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:52:52.825Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:52:52.826526 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:52:52.826Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:52:57.827346 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:52:57.826Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:52:57.827346 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:52:57.826Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:53:01.189511 update_engine[1440]: I0905 09:53:01.189389 1440 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 5 09:53:01.190373 update_engine[1440]: I0905 09:53:01.189899 1440 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 5 09:53:01.190509 update_engine[1440]: I0905 09:53:01.190385 1440 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Sep 5 09:53:01.191135 update_engine[1440]: E0905 09:53:01.191048 1440 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 5 09:53:01.191333 update_engine[1440]: I0905 09:53:01.191164 1440 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Sep 5 09:53:02.827549 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:53:02.826Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:53:02.827549 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:53:02.827Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:53:07.442563 systemd[1]: Started sshd@19-147.75.90.131:22-106.75.241.35:49340.service - OpenSSH per-connection server daemon (106.75.241.35:49340). Sep 5 09:53:07.828669 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:53:07.827Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:53:07.828669 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:53:07.828Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:53:08.560481 sshd[2010]: Connection reset by 106.75.241.35 port 49340 [preauth] Sep 5 09:53:08.562478 systemd[1]: sshd@19-147.75.90.131:22-106.75.241.35:49340.service: Deactivated successfully. Sep 5 09:53:10.779060 systemd[1]: sshd@18-147.75.90.131:22-106.75.241.35:34388.service: Deactivated successfully. Sep 5 09:53:11.190773 update_engine[1440]: I0905 09:53:11.190650 1440 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 5 09:53:11.191632 update_engine[1440]: I0905 09:53:11.191171 1440 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 5 09:53:11.191749 update_engine[1440]: I0905 09:53:11.191675 1440 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Sep 5 09:53:11.192512 update_engine[1440]: E0905 09:53:11.192405 1440 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 5 09:53:11.192696 update_engine[1440]: I0905 09:53:11.192523 1440 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Sep 5 09:53:12.829539 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:53:12.828Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:53:12.829539 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:53:12.828Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:53:17.830163 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:53:17.829Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:53:17.830163 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:53:17.829Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:53:21.190078 update_engine[1440]: I0905 09:53:21.189955 1440 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 5 09:53:21.190934 update_engine[1440]: I0905 09:53:21.190527 1440 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 5 09:53:21.191056 update_engine[1440]: I0905 09:53:21.190972 1440 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Sep 5 09:53:21.191790 update_engine[1440]: E0905 09:53:21.191704 1440 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 5 09:53:21.192000 update_engine[1440]: I0905 09:53:21.191817 1440 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Sep 5 09:53:21.192000 update_engine[1440]: I0905 09:53:21.191834 1440 omaha_request_action.cc:617] Omaha request response: Sep 5 09:53:21.192000 update_engine[1440]: E0905 09:53:21.191990 1440 omaha_request_action.cc:636] Omaha request network transfer failed. Sep 5 09:53:21.192277 update_engine[1440]: I0905 09:53:21.192030 1440 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Sep 5 09:53:21.192277 update_engine[1440]: I0905 09:53:21.192040 1440 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Sep 5 09:53:21.192277 update_engine[1440]: I0905 09:53:21.192049 1440 update_attempter.cc:306] Processing Done. Sep 5 09:53:21.192277 update_engine[1440]: E0905 09:53:21.192076 1440 update_attempter.cc:619] Update failed. Sep 5 09:53:21.192277 update_engine[1440]: I0905 09:53:21.192086 1440 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Sep 5 09:53:21.192277 update_engine[1440]: I0905 09:53:21.192094 1440 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Sep 5 09:53:21.192277 update_engine[1440]: I0905 09:53:21.192103 1440 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Sep 5 09:53:21.192277 update_engine[1440]: I0905 09:53:21.192252 1440 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Sep 5 09:53:21.192932 update_engine[1440]: I0905 09:53:21.192335 1440 omaha_request_action.cc:271] Posting an Omaha request to disabled Sep 5 09:53:21.192932 update_engine[1440]: I0905 09:53:21.192349 1440 omaha_request_action.cc:272] Request: <?xml version="1.0" encoding="UTF-8"?> Sep 5 09:53:21.192932 update_engine[1440]: <request protocol="3.0" version="update_engine-0.4.10" updaterversion="update_engine-0.4.10" installsource="scheduler" ismachine="1"> Sep 5 09:53:21.192932 update_engine[1440]: <os version="Chateau" platform="CoreOS" sp="4054.1.0_x86_64"></os> Sep 5 09:53:21.192932 update_engine[1440]: <app appid="{e96281a6-d1af-4bde-9a0a-97b76e56dc57}" version="4054.1.0" track="beta" bootid="{50d2ace5-a58a-40f3-b0d9-bd4b2b46876a}" oem="packet" oemversion="0.2.2-r2" alephversion="4054.1.0" machineid="a4bac18ead4c4a6d9abc172153874536" machinealias="" lang="en-US" board="amd64-usr" hardware_class="" delta_okay="false" > Sep 5 09:53:21.192932 update_engine[1440]: <event eventtype="3" eventresult="0" errorcode="268437456"></event> Sep 5 09:53:21.192932 update_engine[1440]: </app> Sep 5 09:53:21.192932 update_engine[1440]: </request> Sep 5 09:53:21.192932 update_engine[1440]: I0905 09:53:21.192360 1440 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Sep 5 09:53:21.192932 update_engine[1440]: I0905 09:53:21.192754 1440 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Sep 5 09:53:21.193828 locksmithd[1477]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Sep 5 09:53:21.194487 update_engine[1440]: I0905 09:53:21.193140 1440 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Sep 5 09:53:21.194487 update_engine[1440]: E0905 09:53:21.193780 1440 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Sep 5 09:53:21.194487 update_engine[1440]: I0905 09:53:21.193886 1440 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Sep 5 09:53:21.194487 update_engine[1440]: I0905 09:53:21.193902 1440 omaha_request_action.cc:617] Omaha request response: Sep 5 09:53:21.194487 update_engine[1440]: I0905 09:53:21.193915 1440 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Sep 5 09:53:21.194487 update_engine[1440]: I0905 09:53:21.193923 1440 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Sep 5 09:53:21.194487 update_engine[1440]: I0905 09:53:21.193930 1440 update_attempter.cc:306] Processing Done. Sep 5 09:53:21.194487 update_engine[1440]: I0905 09:53:21.193940 1440 update_attempter.cc:310] Error event sent. Sep 5 09:53:21.194487 update_engine[1440]: I0905 09:53:21.193957 1440 update_check_scheduler.cc:74] Next update check in 41m34s Sep 5 09:53:21.195258 locksmithd[1477]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Sep 5 09:53:22.831103 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:53:22.830Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:53:22.831103 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:53:22.830Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:53:27.831731 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:53:27.831Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:53:27.831731 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:53:27.831Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:53:32.832348 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:53:32.831Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:53:32.832348 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:53:32.831Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:53:37.833103 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:53:37.832Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:53:37.833103 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:53:37.832Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:53:42.833899 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:53:42.833Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:53:42.833899 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:53:42.833Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:53:47.834775 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:53:47.834Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:53:47.834775 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:53:47.834Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:53:52.835916 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:53:52.835Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:53:52.835916 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:53:52.835Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:53:57.836967 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:53:57.836Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:53:57.836967 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:53:57.836Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:54:02.837901 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:54:02.837Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:54:02.837901 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:54:02.837Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:54:07.838798 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:54:07.838Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:54:07.838798 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:54:07.838Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:54:12.840071 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:54:12.839Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:54:12.840071 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:54:12.839Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:54:17.840225 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:54:17.839Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:54:17.840225 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:54:17.839Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:54:22.841024 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:54:22.840Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:54:22.841024 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:54:22.840Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:54:27.841526 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:54:27.840Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:54:27.841526 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:54:27.840Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:54:32.842456 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:54:32.841Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:54:32.842456 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:54:32.841Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:54:37.843533 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:54:37.842Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:54:37.843533 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:54:37.843Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:54:42.844656 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:54:42.844Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:54:42.844656 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:54:42.844Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:54:47.845655 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:54:47.845Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:54:47.845655 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:54:47.845Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:54:48.554498 systemd[1]: Started sshd@20-147.75.90.131:22-106.75.241.35:36064.service - OpenSSH per-connection server daemon (106.75.241.35:36064). Sep 5 09:54:52.846322 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:54:52.845Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:54:52.846322 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:54:52.845Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:54:53.591992 sshd[2018]: Received disconnect from 106.75.241.35 port 36064:11: Bye Bye [preauth] Sep 5 09:54:53.591992 sshd[2018]: Disconnected from authenticating user root 106.75.241.35 port 36064 [preauth] Sep 5 09:54:53.592936 systemd[1]: sshd@20-147.75.90.131:22-106.75.241.35:36064.service: Deactivated successfully. Sep 5 09:54:57.846791 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:54:57.846Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:54:57.846791 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:54:57.846Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:55:02.847818 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:55:02.847Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:55:02.847818 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:55:02.847Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:55:07.848918 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:55:07.848Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:55:07.848918 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:55:07.848Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:55:12.849972 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:55:12.849Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:55:12.849972 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:55:12.849Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:55:17.850567 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:55:17.849Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:55:17.850567 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:55:17.850Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:55:22.851405 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:55:22.850Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:55:22.851405 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:55:22.850Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:55:27.851968 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:55:27.851Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:55:27.851968 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:55:27.851Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:55:32.852332 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:55:32.851Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:55:32.852332 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:55:32.851Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:55:37.852765 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:55:37.852Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:55:37.852765 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:55:37.852Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:55:42.853901 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:55:42.853Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:55:42.853901 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:55:42.853Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:55:47.854358 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:55:47.853Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:55:47.854358 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:55:47.853Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:55:52.854964 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:55:52.854Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:55:52.854964 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:55:52.854Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:55:56.276573 systemd[1]: Started sshd@21-147.75.90.131:22-218.92.0.76:13181.service - OpenSSH per-connection server daemon (218.92.0.76:13181). Sep 5 09:55:57.379097 sshd[2029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Sep 5 09:55:57.855745 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:55:57.855Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:55:57.855745 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:55:57.855Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:55:59.277462 sshd[2027]: PAM: Permission denied for root from 218.92.0.76 Sep 5 09:55:59.567064 sshd[2030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Sep 5 09:56:02.072673 sshd[2027]: PAM: Permission denied for root from 218.92.0.76 Sep 5 09:56:02.380364 sshd[2031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Sep 5 09:56:02.856518 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:56:02.855Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:56:02.856518 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:56:02.856Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:56:03.962447 sshd[2027]: PAM: Permission denied for root from 218.92.0.76 Sep 5 09:56:04.105328 sshd[2027]: Received disconnect from 218.92.0.76 port 13181:11: [preauth] Sep 5 09:56:04.105328 sshd[2027]: Disconnected from authenticating user root 218.92.0.76 port 13181 [preauth] Sep 5 09:56:04.108728 systemd[1]: sshd@21-147.75.90.131:22-218.92.0.76:13181.service: Deactivated successfully. Sep 5 09:56:04.272786 systemd[1]: Started sshd@22-147.75.90.131:22-218.92.0.76:56457.service - OpenSSH per-connection server daemon (218.92.0.76:56457). Sep 5 09:56:05.408586 sshd[2038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Sep 5 09:56:07.071255 sshd[2036]: PAM: Permission denied for root from 218.92.0.76 Sep 5 09:56:07.370939 sshd[2039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Sep 5 09:56:07.856877 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:56:07.856Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:56:07.856877 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:56:07.856Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:56:09.308749 sshd[2036]: PAM: Permission denied for root from 218.92.0.76 Sep 5 09:56:09.608279 sshd[2040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Sep 5 09:56:11.486603 sshd[2036]: PAM: Permission denied for root from 218.92.0.76 Sep 5 09:56:11.635231 sshd[2036]: Received disconnect from 218.92.0.76 port 56457:11: [preauth] Sep 5 09:56:11.635231 sshd[2036]: Disconnected from authenticating user root 218.92.0.76 port 56457 [preauth] Sep 5 09:56:11.638667 systemd[1]: sshd@22-147.75.90.131:22-218.92.0.76:56457.service: Deactivated successfully. Sep 5 09:56:11.811609 systemd[1]: Started sshd@23-147.75.90.131:22-218.92.0.76:49270.service - OpenSSH per-connection server daemon (218.92.0.76:49270). Sep 5 09:56:12.858270 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:56:12.857Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:56:12.858270 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:56:12.857Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:56:12.912362 sshd[2048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Sep 5 09:56:15.202218 sshd[2046]: PAM: Permission denied for root from 218.92.0.76 Sep 5 09:56:15.493438 sshd[2049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Sep 5 09:56:17.195611 sshd[2046]: PAM: Permission denied for root from 218.92.0.76 Sep 5 09:56:17.486856 sshd[2050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Sep 5 09:56:17.859176 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:56:17.858Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:56:17.859176 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:56:17.858Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:56:19.465258 sshd[2046]: PAM: Permission denied for root from 218.92.0.76 Sep 5 09:56:19.610037 sshd[2046]: Received disconnect from 218.92.0.76 port 49270:11: [preauth] Sep 5 09:56:19.610037 sshd[2046]: Disconnected from authenticating user root 218.92.0.76 port 49270 [preauth] Sep 5 09:56:19.613517 systemd[1]: sshd@23-147.75.90.131:22-218.92.0.76:49270.service: Deactivated successfully. Sep 5 09:56:22.860165 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:56:22.859Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:56:22.860165 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:56:22.859Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:56:27.861149 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:56:27.860Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:56:27.861149 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:56:27.860Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:56:32.862146 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:56:32.861Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:56:32.862146 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:56:32.861Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:56:37.862767 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:56:37.862Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:56:37.862767 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:56:37.862Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:56:42.863572 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:56:42.862Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:56:42.863572 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:56:42.863Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:56:46.522143 systemd[1]: Started sshd@24-147.75.90.131:22-218.92.0.107:13491.service - OpenSSH per-connection server daemon (218.92.0.107:13491). Sep 5 09:56:47.864471 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:56:47.863Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:56:47.864471 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:56:47.863Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:56:48.207990 sshd[2058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Sep 5 09:56:50.442022 sshd[2056]: PAM: Permission denied for root from 218.92.0.107 Sep 5 09:56:50.719779 sshd[2059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Sep 5 09:56:52.226587 sshd[2056]: PAM: Permission denied for root from 218.92.0.107 Sep 5 09:56:52.519953 sshd[2060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Sep 5 09:56:52.865458 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:56:52.864Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:56:52.865458 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:56:52.864Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:56:54.302489 sshd[2056]: PAM: Permission denied for root from 218.92.0.107 Sep 5 09:56:54.440681 sshd[2056]: Received disconnect from 218.92.0.107 port 13491:11: [preauth] Sep 5 09:56:54.440681 sshd[2056]: Disconnected from authenticating user root 218.92.0.107 port 13491 [preauth] Sep 5 09:56:54.444062 systemd[1]: sshd@24-147.75.90.131:22-218.92.0.107:13491.service: Deactivated successfully. Sep 5 09:56:54.592840 systemd[1]: Started sshd@25-147.75.90.131:22-218.92.0.107:11464.service - OpenSSH per-connection server daemon (218.92.0.107:11464). Sep 5 09:56:56.258717 sshd[2066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Sep 5 09:56:57.865865 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:56:57.865Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:56:57.865865 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:56:57.865Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:56:58.588932 sshd[2064]: PAM: Permission denied for root from 218.92.0.107 Sep 5 09:56:58.864156 sshd[2067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Sep 5 09:57:00.800911 sshd[2064]: PAM: Permission denied for root from 218.92.0.107 Sep 5 09:57:01.077011 sshd[2068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Sep 5 09:57:02.866606 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:57:02.865Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:57:02.866606 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:57:02.866Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:57:03.291606 sshd[2064]: PAM: Permission denied for root from 218.92.0.107 Sep 5 09:57:03.604804 sshd[2064]: Received disconnect from 218.92.0.107 port 11464:11: [preauth] Sep 5 09:57:03.604804 sshd[2064]: Disconnected from authenticating user root 218.92.0.107 port 11464 [preauth] Sep 5 09:57:03.605628 systemd[1]: sshd@25-147.75.90.131:22-218.92.0.107:11464.service: Deactivated successfully. Sep 5 09:57:03.836333 systemd[1]: Started sshd@26-147.75.90.131:22-218.92.0.107:11983.service - OpenSSH per-connection server daemon (218.92.0.107:11983). Sep 5 09:57:07.866911 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:57:07.866Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:57:07.866911 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:57:07.866Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:57:12.867938 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:57:12.867Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:57:12.867938 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:57:12.867Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:57:14.679228 systemd[1]: Started sshd@27-147.75.90.131:22-218.92.0.107:18136.service - OpenSSH per-connection server daemon (218.92.0.107:18136). Sep 5 09:57:17.869115 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:57:17.868Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:57:17.869115 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:57:17.868Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:57:22.869244 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:57:22.868Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:57:22.869244 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:57:22.868Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:57:25.100751 systemd[1]: Started sshd@28-147.75.90.131:22-218.92.0.107:29707.service - OpenSSH per-connection server daemon (218.92.0.107:29707). Sep 5 09:57:27.870127 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:57:27.869Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:57:27.870127 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:57:27.869Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:57:32.870538 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:57:32.869Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:57:32.870538 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:57:32.869Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:57:35.404883 systemd[1]: Started sshd@29-147.75.90.131:22-218.92.0.107:38916.service - OpenSSH per-connection server daemon (218.92.0.107:38916). Sep 5 09:57:37.034682 sshd[2081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Sep 5 09:57:37.871722 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:57:37.871Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:57:37.871722 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:57:37.871Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:57:38.857625 sshd[2079]: PAM: Permission denied for root from 218.92.0.107 Sep 5 09:57:39.129237 sshd[2082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Sep 5 09:57:40.891774 sshd[2079]: PAM: Permission denied for root from 218.92.0.107 Sep 5 09:57:41.162514 sshd[2083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Sep 5 09:57:42.872105 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:57:42.871Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:57:42.872105 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:57:42.871Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:57:43.337073 sshd[2079]: PAM: Permission denied for root from 218.92.0.107 Sep 5 09:57:43.471894 sshd[2079]: Received disconnect from 218.92.0.107 port 38916:11: [preauth] Sep 5 09:57:43.471894 sshd[2079]: Disconnected from authenticating user root 218.92.0.107 port 38916 [preauth] Sep 5 09:57:43.473908 systemd[1]: sshd@29-147.75.90.131:22-218.92.0.107:38916.service: Deactivated successfully. Sep 5 09:57:47.872987 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:57:47.872Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:57:47.872987 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:57:47.872Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:57:52.873696 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:57:52.873Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:57:52.873696 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:57:52.873Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:57:57.874668 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:57:57.874Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:57:57.874668 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:57:57.874Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:58:02.875739 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:58:02.875Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:58:02.875739 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:58:02.875Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:58:07.876341 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:58:07.875Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:58:07.876341 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:58:07.875Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:58:12.876190 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:58:12.875Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:58:12.876190 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:58:12.875Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:58:17.876609 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:58:17.875Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:58:17.876609 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:58:17.875Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:58:22.877413 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:58:22.876Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:58:22.877413 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:58:22.876Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:58:26.354303 systemd[1]: Started sshd@30-147.75.90.131:22-106.75.241.35:37740.service - OpenSSH per-connection server daemon (106.75.241.35:37740). Sep 5 09:58:27.878033 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:58:27.877Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:58:27.878033 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:58:27.877Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:58:32.878537 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:58:32.877Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:58:32.878537 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:58:32.878Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:58:37.878756 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:58:37.878Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:58:37.878756 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:58:37.878Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:58:42.879488 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:58:42.878Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:58:42.879488 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:58:42.878Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:58:47.879933 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:58:47.879Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:58:47.879933 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:58:47.879Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:58:52.880356 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:58:52.879Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:58:52.880356 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:58:52.879Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:58:57.880838 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:58:57.880Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:58:57.880838 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:58:57.880Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:59:02.881683 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:59:02.881Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:59:02.881683 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:59:02.881Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:59:03.846822 systemd[1]: sshd@26-147.75.90.131:22-218.92.0.107:11983.service: Deactivated successfully. Sep 5 09:59:07.882769 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:59:07.882Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:59:07.882769 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:59:07.882Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:59:12.883141 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:59:12.882Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:59:12.883141 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:59:12.882Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:59:14.688417 systemd[1]: sshd@27-147.75.90.131:22-218.92.0.107:18136.service: Deactivated successfully. Sep 5 09:59:17.883444 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:59:17.882Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:59:17.883444 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:59:17.882Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:59:22.884811 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:59:22.884Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:59:22.884811 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:59:22.884Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:59:25.110034 systemd[1]: sshd@28-147.75.90.131:22-218.92.0.107:29707.service: Deactivated successfully. Sep 5 09:59:27.885191 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:59:27.884Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:59:27.885191 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:59:27.884Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:59:32.886564 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:59:32.885Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:59:32.886564 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:59:32.886Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:59:37.887567 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:59:37.886Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:59:37.887567 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:59:37.886Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:59:42.887809 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:59:42.887Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:59:42.887809 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:59:42.887Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:59:47.888773 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:59:47.888Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:59:47.888773 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:59:47.888Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:59:52.888934 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:59:52.888Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:59:52.888934 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:59:52.888Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:59:57.889584 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:59:57.889Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 09:59:57.889584 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T09:59:57.889Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:00:02.890541 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:00:02.889Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:00:02.890541 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:00:02.890Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:00:07.891541 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:00:07.890Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:00:07.891541 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:00:07.890Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:00:12.892218 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:00:12.891Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:00:12.892218 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:00:12.891Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:00:17.277786 systemd[1]: Started sshd@31-147.75.90.131:22-106.75.241.35:52694.service - OpenSSH per-connection server daemon (106.75.241.35:52694). Sep 5 10:00:17.893055 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:00:17.892Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:00:17.893055 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:00:17.892Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:00:22.893382 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:00:22.892Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:00:22.893382 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:00:22.892Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:00:26.363718 systemd[1]: sshd@30-147.75.90.131:22-106.75.241.35:37740.service: Deactivated successfully. Sep 5 10:00:27.894004 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:00:27.893Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:00:27.894004 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:00:27.893Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:00:32.894661 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:00:32.894Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:00:32.894661 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:00:32.894Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:00:37.894949 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:00:37.894Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:00:37.894949 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:00:37.894Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:00:42.895431 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:00:42.894Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:00:42.895431 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:00:42.894Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:00:47.896456 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:00:47.895Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:00:47.896456 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:00:47.895Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:00:52.897425 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:00:52.896Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:00:52.897425 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:00:52.897Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:00:57.898583 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:00:57.898Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:00:57.898583 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:00:57.898Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:01:02.898940 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:01:02.898Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:01:02.898940 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:01:02.898Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:01:07.899461 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:01:07.898Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:01:07.899461 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:01:07.898Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:01:12.899764 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:01:12.899Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:01:12.899764 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:01:12.899Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:01:17.900442 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:01:17.899Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:01:17.900442 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:01:17.899Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:01:22.900781 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:01:22.900Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:01:22.900781 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:01:22.900Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:01:27.901013 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:01:27.900Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:01:27.901013 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:01:27.900Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:01:32.902180 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:01:32.901Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:01:32.902180 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:01:32.901Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:01:37.903080 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:01:37.902Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:01:37.903080 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:01:37.902Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:01:42.903269 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:01:42.902Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:01:42.903269 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:01:42.902Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:01:47.904234 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:01:47.903Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:01:47.904234 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:01:47.903Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:01:52.904946 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:01:52.904Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:01:52.904946 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:01:52.904Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:01:57.905546 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:01:57.904Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:01:57.905546 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:01:57.904Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:02:02.905883 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:02:02.905Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:02:02.905883 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:02:02.905Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:02:05.899836 systemd[1]: Started sshd@32-147.75.90.131:22-106.75.241.35:39412.service - OpenSSH per-connection server daemon (106.75.241.35:39412). Sep 5 10:02:07.907013 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:02:07.906Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:02:07.907013 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:02:07.906Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:02:11.323471 sshd[2104]: Invalid user ram from 106.75.241.35 port 39412 Sep 5 10:02:12.732595 sshd[2104]: Received disconnect from 106.75.241.35 port 39412:11: Bye Bye [preauth] Sep 5 10:02:12.732595 sshd[2104]: Disconnected from invalid user ram 106.75.241.35 port 39412 [preauth] Sep 5 10:02:12.735712 systemd[1]: sshd@32-147.75.90.131:22-106.75.241.35:39412.service: Deactivated successfully. Sep 5 10:02:12.907899 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:02:12.907Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:02:12.907899 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:02:12.907Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:02:17.285944 systemd[1]: sshd@31-147.75.90.131:22-106.75.241.35:52694.service: Deactivated successfully. Sep 5 10:02:17.908184 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:02:17.907Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:02:17.908184 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:02:17.907Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:02:22.909278 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:02:22.908Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:02:22.909278 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:02:22.908Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:02:27.909564 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:02:27.908Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:02:27.909564 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:02:27.908Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:02:32.910040 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:02:32.909Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:02:32.910040 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:02:32.909Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:02:37.910462 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:02:37.909Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:02:37.910462 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:02:37.909Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:02:42.910748 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:02:42.910Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:02:42.910748 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:02:42.910Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:02:47.911489 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:02:47.910Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:02:47.911489 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:02:47.910Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:02:52.911624 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:02:52.911Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:02:52.911624 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:02:52.911Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:02:57.911907 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:02:57.911Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:02:57.911907 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:02:57.911Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:03:02.912085 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:03:02.911Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:03:02.912085 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:03:02.911Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:03:07.913037 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:03:07.912Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:03:07.913037 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:03:07.912Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:03:12.913208 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:03:12.912Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:03:12.913208 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:03:12.912Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:03:17.913783 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:03:17.913Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:03:17.913783 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:03:17.913Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:03:22.914897 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:03:22.914Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:03:22.914897 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:03:22.914Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:03:27.915517 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:03:27.914Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:03:27.915517 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:03:27.914Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:03:32.916579 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:03:32.916Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:03:32.916579 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:03:32.916Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:03:37.916684 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:03:37.916Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:03:37.916684 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:03:37.916Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:03:42.917112 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:03:42.916Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:03:42.917112 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:03:42.916Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:03:47.917769 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:03:47.917Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:03:47.917769 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:03:47.917Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:03:52.918225 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:03:52.917Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:03:52.918225 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:03:52.917Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:03:57.918584 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:03:57.918Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:03:57.918584 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:03:57.917Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:04:02.919387 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:04:02.918Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:04:02.919387 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:04:02.918Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:04:07.920443 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:04:07.919Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:04:07.920443 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:04:07.919Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:04:12.920213 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:04:12.919Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:04:12.920213 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:04:12.919Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:04:17.920482 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:04:17.919Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:04:17.920482 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:04:17.920Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:04:22.921095 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:04:22.920Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:04:22.921095 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:04:22.920Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:04:27.921907 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:04:27.921Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:04:27.921907 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:04:27.921Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:04:32.922027 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:04:32.921Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:04:32.922027 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:04:32.921Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:04:37.922641 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:04:37.921Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:04:37.922641 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:04:37.922Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:04:42.922844 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:04:42.922Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:04:42.922844 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:04:42.922Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:04:47.923614 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:04:47.923Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:04:47.923614 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:04:47.923Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:04:52.924171 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:04:52.923Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:04:52.924171 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:04:52.923Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:04:57.360656 systemd[1]: Starting systemd-tmpfiles-clean.service - Cleanup of Temporary Directories... Sep 5 10:04:57.367891 systemd-tmpfiles[2112]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Sep 5 10:04:57.368153 systemd-tmpfiles[2112]: /usr/lib/tmpfiles.d/systemd-flatcar.conf:6: Duplicate line for path "/var/log/journal", ignoring. Sep 5 10:04:57.368604 systemd-tmpfiles[2112]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Sep 5 10:04:57.368766 systemd-tmpfiles[2112]: ACLs are not supported, ignoring. Sep 5 10:04:57.368800 systemd-tmpfiles[2112]: ACLs are not supported, ignoring. Sep 5 10:04:57.374309 systemd-tmpfiles[2112]: Detected autofs mount point /boot during canonicalization of boot. Sep 5 10:04:57.374313 systemd-tmpfiles[2112]: Skipping /boot Sep 5 10:04:57.376808 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Sep 5 10:04:57.376911 systemd[1]: Finished systemd-tmpfiles-clean.service - Cleanup of Temporary Directories. Sep 5 10:04:57.924445 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:04:57.923Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:04:57.924445 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:04:57.923Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:05:02.925259 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:05:02.924Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:05:02.925259 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:05:02.924Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:05:07.926552 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:05:07.925Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:05:07.926552 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:05:07.925Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:05:12.927247 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:05:12.926Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:05:12.927247 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:05:12.926Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:05:17.928471 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:05:17.927Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:05:17.928471 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:05:17.927Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:05:22.928982 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:05:22.928Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:05:22.928982 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:05:22.928Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:05:27.929177 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:05:27.928Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:05:27.929177 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:05:27.928Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:05:32.930283 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:05:32.929Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:05:32.930283 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:05:32.929Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:05:37.931001 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:05:37.930Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:05:37.931001 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:05:37.930Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:05:42.931952 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:05:42.931Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:05:42.931952 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:05:42.931Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:05:47.933033 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:05:47.932Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:05:47.933033 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:05:47.932Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:05:52.934451 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:05:52.933Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:05:52.934451 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:05:52.933Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:05:57.935482 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:05:57.934Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:05:57.935482 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:05:57.935Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:06:02.936192 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:06:02.935Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:06:02.936192 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:06:02.935Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:06:07.936816 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:06:07.936Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:06:07.936816 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:06:07.936Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:06:12.937129 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:06:12.936Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:06:12.937129 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:06:12.936Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:06:17.937779 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:06:17.937Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:06:17.937779 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:06:17.937Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:06:22.914691 systemd[1]: Started sshd@33-147.75.90.131:22-61.177.172.160:46845.service - OpenSSH per-connection server daemon (61.177.172.160:46845). Sep 5 10:06:22.937517 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:06:22.937Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:06:22.937517 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:06:22.937Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:06:27.938754 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:06:27.938Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:06:27.938754 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:06:27.938Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:06:32.939383 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:06:32.938Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:06:32.939383 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:06:32.938Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:06:37.940154 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:06:37.939Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:06:37.940154 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:06:37.939Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:06:42.940357 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:06:42.939Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:06:42.940357 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:06:42.939Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:06:47.941029 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:06:47.940Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:06:47.941029 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:06:47.940Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:06:52.941737 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:06:52.941Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:06:52.941737 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:06:52.941Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:06:57.942046 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:06:57.941Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:06:57.942046 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:06:57.941Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:07:02.942959 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:07:02.942Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:07:02.942959 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:07:02.942Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:07:07.726595 systemd[1]: Started sshd@34-147.75.90.131:22-1.83.124.4:23782.service - OpenSSH per-connection server daemon (1.83.124.4:23782). Sep 5 10:07:07.944028 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:07:07.943Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:07:07.944028 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:07:07.943Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:07:12.944651 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:07:12.944Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:07:12.944651 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:07:12.944Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:07:17.945190 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:07:17.944Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:07:17.945190 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:07:17.944Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:07:22.946472 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:07:22.945Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:07:22.946472 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:07:22.945Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:07:27.946874 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:07:27.946Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:07:27.946874 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:07:27.946Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:07:32.947307 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:07:32.946Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:07:32.947307 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:07:32.946Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:07:37.948205 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:07:37.947Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:07:37.948205 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:07:37.947Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:07:42.948766 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:07:42.948Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:07:42.948766 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:07:42.948Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:07:47.949518 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:07:47.948Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:07:47.949518 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:07:47.949Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:07:52.950677 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:07:52.950Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:07:52.950677 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:07:52.950Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:07:57.951935 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:07:57.951Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:07:57.951935 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:07:57.951Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: i/o timeout"} Sep 5 10:08:02.952603 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:08:02.952Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"4b80b63e0ceb5682","rtt":"278.963µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"} Sep 5 10:08:02.952603 etcd-wrapper[1705]: {"level":"warn","ts":"2024-09-05T10:08:02.952Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"4b80b63e0ceb5682","rtt":"272.353µs","error":"dial tcp 10.67.80.85:2380: connect: no route to host"}