Apr 13 20:51:51.954822 kernel: Linux version 5.10.107-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 9.3.0-r1 p3) 9.3.0, GNU ld (Gentoo 2.36.1 p5) 2.36.1) #1 SMP Tue Mar 22 19:39:53 -00 2022 Apr 13 20:51:51.954865 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=15990f5bb88d618f1948b7e8a720f1d5b95900cfecbef00df890bd0a136b39aa Apr 13 20:51:51.954874 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Apr 13 20:51:51.954880 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Apr 13 20:51:51.954886 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Apr 13 20:51:51.954891 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Apr 13 20:51:51.954898 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Apr 13 20:51:51.954904 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Apr 13 20:51:51.954913 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Apr 13 20:51:51.954919 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Apr 13 20:51:51.954925 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Apr 13 20:51:51.954930 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Apr 13 20:51:51.954936 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Apr 13 20:51:51.954942 kernel: BIOS-provided physical RAM map: Apr 13 20:51:51.954950 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Apr 13 20:51:51.954959 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Apr 13 20:51:51.954965 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Apr 13 20:51:51.954971 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable Apr 13 20:51:51.954978 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved Apr 13 20:51:51.954984 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Apr 13 20:51:51.954991 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Apr 13 20:51:51.954998 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Apr 13 20:51:51.955433 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Apr 13 20:51:51.955467 kernel: NX (Execute Disable) protection: active Apr 13 20:51:51.955475 kernel: SMBIOS 2.8 present. Apr 13 20:51:51.955482 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Apr 13 20:51:51.955540 kernel: Hypervisor detected: KVM Apr 13 20:51:51.955546 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Apr 13 20:51:51.955553 kernel: kvm-clock: cpu 0, msr 606ba001, primary cpu clock Apr 13 20:51:51.955560 kernel: kvm-clock: using sched offset of 13392005050 cycles Apr 13 20:51:51.955568 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Apr 13 20:51:51.955576 kernel: tsc: Detected 2793.438 MHz processor Apr 13 20:51:51.955583 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Apr 13 20:51:51.955590 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Apr 13 20:51:51.955598 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x10000000000 Apr 13 20:51:51.955605 kernel: MTRR default type: write-back Apr 13 20:51:51.955624 kernel: MTRR fixed ranges enabled: Apr 13 20:51:51.955631 kernel: 00000-9FFFF write-back Apr 13 20:51:51.955638 kernel: A0000-BFFFF uncachable Apr 13 20:51:51.955646 kernel: C0000-FFFFF write-protect Apr 13 20:51:51.955657 kernel: MTRR variable ranges enabled: Apr 13 20:51:51.955664 kernel: 0 base 0000C0000000 mask 3FFFC0000000 uncachable Apr 13 20:51:51.955671 kernel: 1 disabled Apr 13 20:51:51.955678 kernel: 2 disabled Apr 13 20:51:51.955685 kernel: 3 disabled Apr 13 20:51:51.955695 kernel: 4 disabled Apr 13 20:51:51.955702 kernel: 5 disabled Apr 13 20:51:51.955710 kernel: 6 disabled Apr 13 20:51:51.955717 kernel: 7 disabled Apr 13 20:51:51.955725 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Apr 13 20:51:51.955732 kernel: Using GB pages for direct mapping Apr 13 20:51:51.955754 kernel: ACPI: Early table checksum verification disabled Apr 13 20:51:51.955762 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) Apr 13 20:51:51.955770 kernel: ACPI: RSDT 0x000000009CFE241A 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 13 20:51:51.955779 kernel: ACPI: FACP 0x000000009CFE21FA 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Apr 13 20:51:51.955787 kernel: ACPI: DSDT 0x000000009CFE0040 0021BA (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 13 20:51:51.955795 kernel: ACPI: FACS 0x000000009CFE0000 000040 Apr 13 20:51:51.955803 kernel: ACPI: APIC 0x000000009CFE22EE 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 13 20:51:51.955811 kernel: ACPI: HPET 0x000000009CFE237E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 13 20:51:51.955818 kernel: ACPI: MCFG 0x000000009CFE23B6 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 13 20:51:51.955826 kernel: ACPI: WAET 0x000000009CFE23F2 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 13 20:51:51.955833 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21fa-0x9cfe22ed] Apr 13 20:51:51.955843 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21f9] Apr 13 20:51:51.955850 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Apr 13 20:51:51.955858 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22ee-0x9cfe237d] Apr 13 20:51:51.955865 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe237e-0x9cfe23b5] Apr 13 20:51:51.955873 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23b6-0x9cfe23f1] Apr 13 20:51:51.955881 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23f2-0x9cfe2419] Apr 13 20:51:51.955888 kernel: ACPI: Local APIC address 0xfee00000 Apr 13 20:51:51.956061 kernel: No NUMA configuration found Apr 13 20:51:51.956069 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] Apr 13 20:51:51.956079 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] Apr 13 20:51:51.956090 kernel: Zone ranges: Apr 13 20:51:51.956097 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Apr 13 20:51:51.956103 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] Apr 13 20:51:51.956111 kernel: Normal empty Apr 13 20:51:51.956119 kernel: Movable zone start for each node Apr 13 20:51:51.956127 kernel: Early memory node ranges Apr 13 20:51:51.956135 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Apr 13 20:51:51.956142 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] Apr 13 20:51:51.956149 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] Apr 13 20:51:51.956157 kernel: On node 0 totalpages: 642938 Apr 13 20:51:51.956164 kernel: DMA zone: 64 pages used for memmap Apr 13 20:51:51.956171 kernel: DMA zone: 21 pages reserved Apr 13 20:51:51.956178 kernel: DMA zone: 3998 pages, LIFO batch:0 Apr 13 20:51:51.956184 kernel: DMA32 zone: 9984 pages used for memmap Apr 13 20:51:51.956191 kernel: DMA32 zone: 638940 pages, LIFO batch:63 Apr 13 20:51:51.956198 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Apr 13 20:51:51.956205 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Apr 13 20:51:51.956213 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges Apr 13 20:51:51.956226 kernel: ACPI: PM-Timer IO Port: 0x608 Apr 13 20:51:51.956235 kernel: ACPI: Local APIC address 0xfee00000 Apr 13 20:51:51.956241 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Apr 13 20:51:51.956252 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Apr 13 20:51:51.956259 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Apr 13 20:51:51.956265 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Apr 13 20:51:51.956272 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Apr 13 20:51:51.956280 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Apr 13 20:51:51.956287 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Apr 13 20:51:51.956295 kernel: ACPI: IRQ0 used by override. Apr 13 20:51:51.956305 kernel: ACPI: IRQ5 used by override. Apr 13 20:51:51.956587 kernel: ACPI: IRQ9 used by override. Apr 13 20:51:51.956595 kernel: ACPI: IRQ10 used by override. Apr 13 20:51:51.956602 kernel: ACPI: IRQ11 used by override. Apr 13 20:51:51.956608 kernel: Using ACPI (MADT) for SMP configuration information Apr 13 20:51:51.956615 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Apr 13 20:51:51.956623 kernel: TSC deadline timer available Apr 13 20:51:51.956637 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Apr 13 20:51:51.956645 kernel: kvm-guest: KVM setup pv remote TLB flush Apr 13 20:51:51.956652 kernel: kvm-guest: setup PV sched yield Apr 13 20:51:51.956664 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Apr 13 20:51:51.956673 kernel: Booting paravirtualized kernel on KVM Apr 13 20:51:51.956683 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Apr 13 20:51:51.956692 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Apr 13 20:51:51.956701 kernel: percpu: Embedded 58 pages/cpu s199704 r8192 d29672 u524288 Apr 13 20:51:51.956708 kernel: pcpu-alloc: s199704 r8192 d29672 u524288 alloc=1*2097152 Apr 13 20:51:51.956862 kernel: pcpu-alloc: [0] 0 1 2 3 Apr 13 20:51:51.956870 kernel: kvm-guest: KVM setup async PF for cpu 0 Apr 13 20:51:51.956936 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c580 Apr 13 20:51:51.957092 kernel: kvm-guest: PV spinlocks enabled Apr 13 20:51:51.957103 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Apr 13 20:51:51.957113 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632869 Apr 13 20:51:51.957119 kernel: Policy zone: DMA32 Apr 13 20:51:51.957127 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=15990f5bb88d618f1948b7e8a720f1d5b95900cfecbef00df890bd0a136b39aa Apr 13 20:51:51.957135 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 13 20:51:51.957145 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 13 20:51:51.957152 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 13 20:51:51.957160 kernel: Memory: 2448560K/2571752K available (10246K kernel code, 2239K rwdata, 11640K rodata, 42228K init, 1436K bss, 122988K reserved, 0K cma-reserved) Apr 13 20:51:51.957167 kernel: random: get_random_u64 called from __kmem_cache_create+0x26/0x400 with crng_init=0 Apr 13 20:51:51.957174 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Apr 13 20:51:51.957181 kernel: ftrace: allocating 34378 entries in 135 pages Apr 13 20:51:51.957188 kernel: ftrace: allocated 135 pages with 4 groups Apr 13 20:51:51.957195 kernel: rcu: Hierarchical RCU implementation. Apr 13 20:51:51.957204 kernel: rcu: RCU event tracing is enabled. Apr 13 20:51:51.957214 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Apr 13 20:51:51.957223 kernel: Rude variant of Tasks RCU enabled. Apr 13 20:51:51.957231 kernel: Tracing variant of Tasks RCU enabled. Apr 13 20:51:51.957240 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 13 20:51:51.957246 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Apr 13 20:51:51.957255 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Apr 13 20:51:51.957262 kernel: Console: colour VGA+ 80x25 Apr 13 20:51:51.957269 kernel: printk: console [ttyS0] enabled Apr 13 20:51:51.957277 kernel: ACPI: Core revision 20200925 Apr 13 20:51:51.957284 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Apr 13 20:51:51.957293 kernel: APIC: Switch to symmetric I/O mode setup Apr 13 20:51:51.957301 kernel: x2apic enabled Apr 13 20:51:51.962611 kernel: Switched APIC routing to physical x2apic. Apr 13 20:51:51.962726 kernel: kvm-guest: setup PV IPIs Apr 13 20:51:51.962736 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Apr 13 20:51:51.962747 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x284409db922, max_idle_ns: 440795228871 ns Apr 13 20:51:51.962756 kernel: Calibrating delay loop (skipped) preset value.. 5586.87 BogoMIPS (lpj=2793438) Apr 13 20:51:51.962765 kernel: pid_max: default: 32768 minimum: 301 Apr 13 20:51:51.962775 kernel: LSM: Security Framework initializing Apr 13 20:51:51.967246 kernel: SELinux: Initializing. Apr 13 20:51:51.967257 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 13 20:51:51.967266 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 13 20:51:51.967276 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Apr 13 20:51:51.967284 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Apr 13 20:51:51.967832 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Apr 13 20:51:51.967841 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Apr 13 20:51:51.967849 kernel: Spectre V2 : Mitigation: Retpolines Apr 13 20:51:51.967857 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Apr 13 20:51:51.968078 kernel: Speculative Store Bypass: Vulnerable Apr 13 20:51:51.968087 kernel: Freeing SMP alternatives memory: 28K Apr 13 20:51:51.968095 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8370C CPU @ 2.80GHz (family: 0x6, model: 0x6a, stepping: 0x6) Apr 13 20:51:51.968104 kernel: Performance Events: unsupported p6 CPU model 106 no PMU driver, software events only. Apr 13 20:51:51.968112 kernel: rcu: Hierarchical SRCU implementation. Apr 13 20:51:51.968190 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Apr 13 20:51:51.968199 kernel: smp: Bringing up secondary CPUs ... Apr 13 20:51:51.968207 kernel: x86: Booting SMP configuration: Apr 13 20:51:51.968216 kernel: .... node #0, CPUs: #1 Apr 13 20:51:51.968223 kernel: kvm-clock: cpu 1, msr 606ba041, secondary cpu clock Apr 13 20:51:51.968231 kernel: kvm-guest: KVM setup async PF for cpu 1 Apr 13 20:51:51.968238 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c580 Apr 13 20:51:51.968246 kernel: #2 Apr 13 20:51:51.968253 kernel: kvm-clock: cpu 2, msr 606ba081, secondary cpu clock Apr 13 20:51:51.968261 kernel: kvm-guest: KVM setup async PF for cpu 2 Apr 13 20:51:51.968270 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c580 Apr 13 20:51:51.968277 kernel: #3 Apr 13 20:51:51.968284 kernel: kvm-clock: cpu 3, msr 606ba0c1, secondary cpu clock Apr 13 20:51:51.968290 kernel: kvm-guest: KVM setup async PF for cpu 3 Apr 13 20:51:51.968297 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c580 Apr 13 20:51:51.968304 kernel: smp: Brought up 1 node, 4 CPUs Apr 13 20:51:51.968591 kernel: smpboot: Max logical packages: 1 Apr 13 20:51:51.968599 kernel: smpboot: Total of 4 processors activated (22347.50 BogoMIPS) Apr 13 20:51:51.968605 kernel: devtmpfs: initialized Apr 13 20:51:51.968612 kernel: x86/mm: Memory block size: 128MB Apr 13 20:51:51.968622 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 13 20:51:51.968628 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Apr 13 20:51:51.968635 kernel: pinctrl core: initialized pinctrl subsystem Apr 13 20:51:51.968642 kernel: NET: Registered protocol family 16 Apr 13 20:51:51.968648 kernel: audit: initializing netlink subsys (disabled) Apr 13 20:51:51.968655 kernel: audit: type=2000 audit(1776113506.449:1): state=initialized audit_enabled=0 res=1 Apr 13 20:51:51.968662 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 13 20:51:51.968669 kernel: thermal_sys: Registered thermal governor 'user_space' Apr 13 20:51:51.968676 kernel: cpuidle: using governor menu Apr 13 20:51:51.968684 kernel: ACPI: bus type PCI registered Apr 13 20:51:51.968691 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 13 20:51:51.968698 kernel: dca service started, version 1.12.1 Apr 13 20:51:51.968704 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Apr 13 20:51:51.968711 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Apr 13 20:51:51.968718 kernel: PCI: Using configuration type 1 for base access Apr 13 20:51:51.968724 kernel: Kprobes globally optimized Apr 13 20:51:51.968731 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 13 20:51:51.968738 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 13 20:51:51.968747 kernel: ACPI: Added _OSI(Module Device) Apr 13 20:51:51.968753 kernel: ACPI: Added _OSI(Processor Device) Apr 13 20:51:51.968760 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 13 20:51:51.968767 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 13 20:51:51.968773 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 13 20:51:51.968780 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 13 20:51:51.968787 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 13 20:51:51.968794 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Apr 13 20:51:51.968800 kernel: ACPI: Interpreter enabled Apr 13 20:51:51.968807 kernel: ACPI: (supports S0 S3 S5) Apr 13 20:51:51.968816 kernel: ACPI: Using IOAPIC for interrupt routing Apr 13 20:51:51.968823 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Apr 13 20:51:51.968829 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Apr 13 20:51:51.968836 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Apr 13 20:51:51.992999 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 13 20:51:51.993112 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Apr 13 20:51:51.993181 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Apr 13 20:51:51.993210 kernel: PCI host bridge to bus 0000:00 Apr 13 20:51:51.994002 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Apr 13 20:51:51.994087 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Apr 13 20:51:51.994805 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Apr 13 20:51:51.994881 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Apr 13 20:51:51.994944 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Apr 13 20:51:51.995006 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] Apr 13 20:51:51.996971 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Apr 13 20:51:51.998650 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Apr 13 20:51:52.000741 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Apr 13 20:51:52.000893 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Apr 13 20:51:52.000966 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Apr 13 20:51:52.001077 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Apr 13 20:51:52.001234 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Apr 13 20:51:52.001342 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] Apr 13 20:51:52.001417 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Apr 13 20:51:52.001505 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Apr 13 20:51:52.001604 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Apr 13 20:51:52.001670 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] Apr 13 20:51:52.001732 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Apr 13 20:51:52.001792 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Apr 13 20:51:52.001901 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Apr 13 20:51:52.001964 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] Apr 13 20:51:52.002032 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Apr 13 20:51:52.002111 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Apr 13 20:51:52.002187 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Apr 13 20:51:52.002280 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Apr 13 20:51:52.003057 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Apr 13 20:51:52.003227 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Apr 13 20:51:52.003300 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] Apr 13 20:51:52.003414 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] Apr 13 20:51:52.003553 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Apr 13 20:51:52.003623 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Apr 13 20:51:52.003633 kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 5 *10 11) Apr 13 20:51:52.003641 kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs 5 *10 11) Apr 13 20:51:52.003662 kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 5 10 *11) Apr 13 20:51:52.003670 kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs 5 10 *11) Apr 13 20:51:52.003678 kernel: ACPI: PCI Interrupt Link [LNKE] (IRQs 5 *10 11) Apr 13 20:51:52.003685 kernel: ACPI: PCI Interrupt Link [LNKF] (IRQs 5 *10 11) Apr 13 20:51:52.003693 kernel: ACPI: PCI Interrupt Link [LNKG] (IRQs 5 10 *11) Apr 13 20:51:52.003701 kernel: ACPI: PCI Interrupt Link [LNKH] (IRQs 5 10 *11) Apr 13 20:51:52.003709 kernel: ACPI: PCI Interrupt Link [GSIA] (IRQs *16) Apr 13 20:51:52.003716 kernel: ACPI: PCI Interrupt Link [GSIB] (IRQs *17) Apr 13 20:51:52.003723 kernel: ACPI: PCI Interrupt Link [GSIC] (IRQs *18) Apr 13 20:51:52.003730 kernel: ACPI: PCI Interrupt Link [GSID] (IRQs *19) Apr 13 20:51:52.003740 kernel: ACPI: PCI Interrupt Link [GSIE] (IRQs *20) Apr 13 20:51:52.003747 kernel: ACPI: PCI Interrupt Link [GSIF] (IRQs *21) Apr 13 20:51:52.003755 kernel: ACPI: PCI Interrupt Link [GSIG] (IRQs *22) Apr 13 20:51:52.003762 kernel: ACPI: PCI Interrupt Link [GSIH] (IRQs *23) Apr 13 20:51:52.003769 kernel: iommu: Default domain type: Translated Apr 13 20:51:52.003836 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Apr 13 20:51:52.003901 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Apr 13 20:51:52.003966 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Apr 13 20:51:52.003978 kernel: vgaarb: loaded Apr 13 20:51:52.003987 kernel: PCI: Using ACPI for IRQ routing Apr 13 20:51:52.003995 kernel: PCI: pci_cache_line_size set to 64 bytes Apr 13 20:51:52.004004 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Apr 13 20:51:52.004011 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] Apr 13 20:51:52.004019 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Apr 13 20:51:52.004027 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Apr 13 20:51:52.004035 kernel: clocksource: Switched to clocksource kvm-clock Apr 13 20:51:52.004043 kernel: VFS: Disk quotas dquot_6.6.0 Apr 13 20:51:52.004051 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 13 20:51:52.004060 kernel: pnp: PnP ACPI init Apr 13 20:51:52.004162 kernel: pnp 00:00: Plug and Play ACPI device, IDs PNP0303 (active) Apr 13 20:51:52.004248 kernel: pnp 00:01: Plug and Play ACPI device, IDs PNP0f13 (active) Apr 13 20:51:52.004935 kernel: pnp 00:02: Plug and Play ACPI device, IDs PNP0400 (active) Apr 13 20:51:52.005111 kernel: pnp 00:03: Plug and Play ACPI device, IDs PNP0501 (active) Apr 13 20:51:52.005225 kernel: pnp 00:04: Plug and Play ACPI device, IDs PNP0b00 (active) Apr 13 20:51:52.006475 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Apr 13 20:51:52.006566 kernel: system 00:05: Plug and Play ACPI device, IDs PNP0c01 (active) Apr 13 20:51:52.006579 kernel: pnp: PnP ACPI: found 6 devices Apr 13 20:51:52.006588 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Apr 13 20:51:52.006597 kernel: NET: Registered protocol family 2 Apr 13 20:51:52.006605 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 13 20:51:52.006614 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Apr 13 20:51:52.006634 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Apr 13 20:51:52.006643 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Apr 13 20:51:52.006652 kernel: TCP: Hash tables configured (established 32768 bind 32768) Apr 13 20:51:52.006661 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 13 20:51:52.006670 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 13 20:51:52.006678 kernel: NET: Registered protocol family 1 Apr 13 20:51:52.006687 kernel: NET: Registered protocol family 44 Apr 13 20:51:52.006765 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Apr 13 20:51:52.006826 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Apr 13 20:51:52.006885 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Apr 13 20:51:52.006940 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Apr 13 20:51:52.006996 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Apr 13 20:51:52.007052 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] Apr 13 20:51:52.007119 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Apr 13 20:51:52.007129 kernel: PCI: CLS 0 bytes, default 64 Apr 13 20:51:52.007136 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Apr 13 20:51:52.007143 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x284409db922, max_idle_ns: 440795228871 ns Apr 13 20:51:52.007150 kernel: Initialise system trusted keyrings Apr 13 20:51:52.007160 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Apr 13 20:51:52.007167 kernel: Key type asymmetric registered Apr 13 20:51:52.007174 kernel: Asymmetric key parser 'x509' registered Apr 13 20:51:52.007181 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 251) Apr 13 20:51:52.007187 kernel: io scheduler mq-deadline registered Apr 13 20:51:52.007194 kernel: io scheduler kyber registered Apr 13 20:51:52.007200 kernel: io scheduler bfq registered Apr 13 20:51:52.007207 kernel: intel_idle: Please enable MWAIT in BIOS SETUP Apr 13 20:51:52.007214 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Apr 13 20:51:52.007617 kernel: PCI Interrupt Link [GSIG] enabled at IRQ 22 Apr 13 20:51:52.007627 kernel: PCI Interrupt Link [GSIH] enabled at IRQ 23 Apr 13 20:51:52.007635 kernel: PCI Interrupt Link [GSIE] enabled at IRQ 20 Apr 13 20:51:52.007643 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 13 20:51:52.007651 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Apr 13 20:51:52.007659 kernel: random: fast init done Apr 13 20:51:52.007667 kernel: random: crng init done Apr 13 20:51:52.007675 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 13 20:51:52.007684 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 13 20:51:52.007741 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Apr 13 20:51:52.007750 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Apr 13 20:51:52.007759 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Apr 13 20:51:52.008005 kernel: rtc_cmos 00:04: RTC can wake from S4 Apr 13 20:51:52.008018 kernel: hpet: Lost 1 RTC interrupts Apr 13 20:51:52.008026 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Apr 13 20:51:52.008088 kernel: rtc_cmos 00:04: registered as rtc0 Apr 13 20:51:52.008151 kernel: rtc_cmos 00:04: setting system clock to 2026-04-13T20:51:50 UTC (1776113510) Apr 13 20:51:52.008212 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Apr 13 20:51:52.008225 kernel: intel_pstate: CPU model not supported Apr 13 20:51:52.008234 kernel: NET: Registered protocol family 10 Apr 13 20:51:52.008242 kernel: Segment Routing with IPv6 Apr 13 20:51:52.008250 kernel: NET: Registered protocol family 17 Apr 13 20:51:52.008257 kernel: Key type dns_resolver registered Apr 13 20:51:52.008266 kernel: IPI shorthand broadcast: enabled Apr 13 20:51:52.008274 kernel: sched_clock: Marking stable (3531870225, 912368343)->(5012697499, -568458931) Apr 13 20:51:52.008283 kernel: registered taskstats version 1 Apr 13 20:51:52.008292 kernel: Loading compiled-in X.509 certificates Apr 13 20:51:52.008360 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.10.107-flatcar: 5866c780451a04cc08b278527846e2b48fb1aa10' Apr 13 20:51:52.008371 kernel: Key type ._fscrypt registered Apr 13 20:51:52.008379 kernel: Key type .fscrypt registered Apr 13 20:51:52.008388 kernel: Key type fscrypt-provisioning registered Apr 13 20:51:52.008395 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 13 20:51:52.008403 kernel: ima: Allocated hash algorithm: sha1 Apr 13 20:51:52.008410 kernel: ima: No architecture policies found Apr 13 20:51:52.008418 kernel: Freeing unused kernel image (initmem) memory: 42228K Apr 13 20:51:52.008426 kernel: Write protecting the kernel read-only data: 24576k Apr 13 20:51:52.008434 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Apr 13 20:51:52.008441 kernel: Freeing unused kernel image (rodata/data gap) memory: 648K Apr 13 20:51:52.008702 kernel: Run /init as init process Apr 13 20:51:52.008714 kernel: with arguments: Apr 13 20:51:52.008783 kernel: /init Apr 13 20:51:52.008792 kernel: with environment: Apr 13 20:51:52.008800 kernel: HOME=/ Apr 13 20:51:52.008809 kernel: TERM=linux Apr 13 20:51:52.008818 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 13 20:51:52.008844 systemd[1]: systemd 249 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 13 20:51:52.008856 systemd[1]: Detected virtualization kvm. Apr 13 20:51:52.008865 systemd[1]: Detected architecture x86-64. Apr 13 20:51:52.008876 systemd[1]: Running in initial RAM disk. Apr 13 20:51:52.008884 systemd[1]: No hostname configured, using default hostname. Apr 13 20:51:52.008892 systemd[1]: Hostname set to . Apr 13 20:51:52.008901 systemd[1]: Initializing machine ID from VM UUID. Apr 13 20:51:52.008911 systemd[1]: Queued start job for default target Initrd Default Target. Apr 13 20:51:52.008920 systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Apr 13 20:51:52.008929 systemd[1]: Reached target Local Encrypted Volumes. Apr 13 20:51:52.008937 systemd[1]: Reached target Path Units. Apr 13 20:51:52.008954 systemd[1]: Reached target Slice Units. Apr 13 20:51:52.008962 systemd[1]: Reached target Swaps. Apr 13 20:51:52.008971 systemd[1]: Reached target Timer Units. Apr 13 20:51:52.008981 systemd[1]: Listening on Open-iSCSI iscsid Socket. Apr 13 20:51:52.008990 systemd[1]: Listening on Open-iSCSI iscsiuio Socket. Apr 13 20:51:52.008999 systemd[1]: Listening on Journal Audit Socket. Apr 13 20:51:52.009007 systemd[1]: Listening on Journal Socket (/dev/log). Apr 13 20:51:52.009016 systemd[1]: Listening on Journal Socket. Apr 13 20:51:52.009027 systemd[1]: Listening on Network Service Netlink Socket. Apr 13 20:51:52.009037 systemd[1]: Listening on udev Control Socket. Apr 13 20:51:52.009046 systemd[1]: Listening on udev Kernel Socket. Apr 13 20:51:52.009055 systemd[1]: Reached target Socket Units. Apr 13 20:51:52.009063 systemd[1]: Starting Create List of Static Device Nodes... Apr 13 20:51:52.009072 systemd[1]: Finished Network Cleanup. Apr 13 20:51:52.009083 systemd[1]: Started Hardware RNG Entropy Gatherer Daemon. Apr 13 20:51:52.009092 systemd[1]: Starting Journal Service... Apr 13 20:51:52.009101 systemd[1]: Condition check resulted in Load Kernel Modules being skipped. Apr 13 20:51:52.009110 systemd[1]: Starting Apply Kernel Variables... Apr 13 20:51:52.009121 systemd[1]: Starting Setup Virtual Console... Apr 13 20:51:52.009131 systemd[1]: Finished Create List of Static Device Nodes. Apr 13 20:51:52.009172 systemd-journald[192]: Journal started Apr 13 20:51:52.009397 systemd-journald[192]: Runtime Journal (/run/log/journal/19b7d661aae64408ad201f8494c741a6) is 6.0M, max 48.7M, 42.6M free. Apr 13 20:51:52.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:52.230774 kernel: audit: type=1130 audit(1776113512.218:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:52.231122 systemd[1]: Started Journal Service. Apr 13 20:51:52.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:52.237838 systemd[1]: Finished Apply Kernel Variables. Apr 13 20:51:52.285992 kernel: audit: type=1130 audit(1776113512.234:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:52.286029 kernel: audit: type=1130 audit(1776113512.244:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:52.286040 kernel: audit: type=1130 audit(1776113512.263:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:52.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:52.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:52.246004 systemd[1]: Finished Setup Virtual Console. Apr 13 20:51:52.303894 kernel: audit: type=1130 audit(1776113512.290:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:52.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:52.267979 systemd[1]: Starting dracut ask for additional cmdline parameters... Apr 13 20:51:52.277888 systemd[1]: Starting Create Static Device Nodes in /dev... Apr 13 20:51:52.290262 systemd[1]: Finished Create Static Device Nodes in /dev. Apr 13 20:51:52.345162 systemd[1]: Finished dracut ask for additional cmdline parameters. Apr 13 20:51:52.391138 kernel: audit: type=1130 audit(1776113512.361:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:52.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:52.380602 systemd[1]: Starting dracut cmdline hook... Apr 13 20:51:52.411487 dracut-cmdline[208]: dracut-dracut-053 Apr 13 20:51:52.424094 dracut-cmdline[208]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=15990f5bb88d618f1948b7e8a720f1d5b95900cfecbef00df890bd0a136b39aa Apr 13 20:51:52.803796 kernel: SCSI subsystem initialized Apr 13 20:51:52.822565 kernel: Loading iSCSI transport class v2.0-870. Apr 13 20:51:52.886945 kernel: iscsi: registered transport (tcp) Apr 13 20:51:52.936753 kernel: iscsi: registered transport (qla4xxx) Apr 13 20:51:52.937445 kernel: QLogic iSCSI HBA Driver Apr 13 20:51:52.991490 systemd[1]: Finished dracut cmdline hook. Apr 13 20:51:53.008398 kernel: audit: type=1130 audit(1776113512.993:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:52.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:53.001760 systemd[1]: Starting dracut pre-udev hook... Apr 13 20:51:53.081650 kernel: device-mapper: uevent: version 1.0.3 Apr 13 20:51:53.088981 kernel: device-mapper: ioctl: 4.43.0-ioctl (2020-10-01) initialised: dm-devel@redhat.com Apr 13 20:51:53.232024 kernel: raid6: avx512x4 gen() 21751 MB/s Apr 13 20:51:53.250673 kernel: raid6: avx512x4 xor() 6464 MB/s Apr 13 20:51:53.321194 kernel: raid6: avx512x2 gen() 9055 MB/s Apr 13 20:51:53.339699 kernel: raid6: avx512x2 xor() 12790 MB/s Apr 13 20:51:53.361556 kernel: raid6: avx512x1 gen() 20333 MB/s Apr 13 20:51:53.380604 kernel: raid6: avx512x1 xor() 11923 MB/s Apr 13 20:51:53.400067 kernel: raid6: avx2x4 gen() 16504 MB/s Apr 13 20:51:53.420682 kernel: raid6: avx2x4 xor() 5671 MB/s Apr 13 20:51:53.438616 kernel: raid6: avx2x2 gen() 12733 MB/s Apr 13 20:51:53.472711 kernel: raid6: avx2x2 xor() 8397 MB/s Apr 13 20:51:53.502583 kernel: raid6: avx2x1 gen() 3219 MB/s Apr 13 20:51:53.522210 kernel: raid6: avx2x1 xor() 5507 MB/s Apr 13 20:51:53.540592 kernel: raid6: sse2x4 gen() 5743 MB/s Apr 13 20:51:53.559606 kernel: raid6: sse2x4 xor() 3784 MB/s Apr 13 20:51:53.580052 kernel: raid6: sse2x2 gen() 6178 MB/s Apr 13 20:51:53.599405 kernel: raid6: sse2x2 xor() 3774 MB/s Apr 13 20:51:53.617593 kernel: raid6: sse2x1 gen() 3679 MB/s Apr 13 20:51:53.640181 kernel: raid6: sse2x1 xor() 3577 MB/s Apr 13 20:51:53.640418 kernel: raid6: using algorithm avx512x4 gen() 21751 MB/s Apr 13 20:51:53.640432 kernel: raid6: .... xor() 6464 MB/s, rmw enabled Apr 13 20:51:53.643387 kernel: raid6: using avx512x2 recovery algorithm Apr 13 20:51:53.718502 kernel: xor: automatically using best checksumming function avx Apr 13 20:51:54.049592 kernel: Btrfs loaded, crc32c=crc32c-intel Apr 13 20:51:54.134942 systemd[1]: Finished dracut pre-udev hook. Apr 13 20:51:54.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:54.152000 audit: BPF prog-id=6 op=LOAD Apr 13 20:51:54.182055 kernel: audit: type=1130 audit(1776113514.142:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:54.182650 kernel: audit: type=1334 audit(1776113514.152:10): prog-id=6 op=LOAD Apr 13 20:51:54.182663 kernel: audit: type=1334 audit(1776113514.158:11): prog-id=7 op=LOAD Apr 13 20:51:54.158000 audit: BPF prog-id=7 op=LOAD Apr 13 20:51:54.185000 audit: BPF prog-id=8 op=LOAD Apr 13 20:51:54.187657 systemd[1]: Starting Rule-based Manager for Device Events and Files... Apr 13 20:51:54.189566 kernel: audit: type=1334 audit(1776113514.185:12): prog-id=8 op=LOAD Apr 13 20:51:54.277987 systemd-udevd[330]: /usr/lib64/udev/rules.d/50-udev-default.rules:42 Unknown group 'sgx', ignoring Apr 13 20:51:54.291411 systemd[1]: Started Rule-based Manager for Device Events and Files. Apr 13 20:51:54.306769 kernel: audit: type=1130 audit(1776113514.294:13): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:54.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:54.301265 systemd[1]: Starting dracut pre-trigger hook... Apr 13 20:51:54.323442 systemd[1]: Starting Network Configuration... Apr 13 20:51:54.329859 kernel: audit: type=1334 audit(1776113514.320:14): prog-id=9 op=LOAD Apr 13 20:51:54.320000 audit: BPF prog-id=9 op=LOAD Apr 13 20:51:54.348001 dracut-pre-trigger[331]: rd.md=0: removing MD RAID activation Apr 13 20:51:54.420047 systemd-networkd[343]: lo: Link UP Apr 13 20:51:54.420073 systemd-networkd[343]: lo: Gained carrier Apr 13 20:51:54.426537 systemd-networkd[343]: Enumeration completed Apr 13 20:51:54.426736 systemd[1]: Started Network Configuration. Apr 13 20:51:54.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:54.450000 audit: BPF prog-id=10 op=LOAD Apr 13 20:51:54.453300 systemd[1]: Starting Network Name Resolution... Apr 13 20:51:54.492694 kernel: audit: type=1130 audit(1776113514.436:15): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:54.492721 kernel: audit: type=1334 audit(1776113514.450:16): prog-id=10 op=LOAD Apr 13 20:51:54.533192 systemd[1]: Finished dracut pre-trigger hook. Apr 13 20:51:54.566798 kernel: audit: type=1130 audit(1776113514.540:17): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:54.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:54.546593 systemd[1]: Starting Coldplug All udev Devices... Apr 13 20:51:54.637133 systemd-udevd[330]: /usr/lib64/udev/rules.d/50-udev-default.rules:42 Unknown group 'sgx', ignoring Apr 13 20:51:54.654253 systemd-resolved[364]: Positive Trust Anchors: Apr 13 20:51:54.654354 systemd-resolved[364]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 13 20:51:54.654385 systemd-resolved[364]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 13 20:51:54.655675 systemd-resolved[364]: Defaulting to hostname 'linux'. Apr 13 20:51:54.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:54.663231 systemd[1]: Started Network Name Resolution. Apr 13 20:51:54.679442 systemd[1]: Reached target Network. Apr 13 20:51:54.683706 systemd[1]: Reached target Host and Network Name Lookups. Apr 13 20:51:54.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:54.685450 systemd[1]: Starting iSCSI UserSpace I/O driver... Apr 13 20:51:54.705057 systemd[1]: Started iSCSI UserSpace I/O driver. Apr 13 20:51:54.716101 systemd[1]: Starting Open-iSCSI... Apr 13 20:51:54.727355 iscsid[394]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 13 20:51:54.727355 iscsid[394]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 13 20:51:54.727355 iscsid[394]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 13 20:51:54.727355 iscsid[394]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 13 20:51:54.727355 iscsid[394]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 13 20:51:54.727355 iscsid[394]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 13 20:51:54.755291 systemd[1]: Started Open-iSCSI. Apr 13 20:51:54.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:54.803551 systemd[1]: Finished Coldplug All udev Devices. Apr 13 20:51:54.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:54.814532 systemd[1]: Starting dracut initqueue hook... Apr 13 20:51:54.844081 kernel: cryptd: max_cpu_qlen set to 1000 Apr 13 20:51:54.879010 kernel: virtio_blk virtio1: [vda] 9289728 512-byte logical blocks (4.76 GB/4.43 GiB) Apr 13 20:51:54.879524 kernel: libata version 3.00 loaded. Apr 13 20:51:54.879548 kernel: vda: detected capacity change from 0 to 4756340736 Apr 13 20:51:54.888057 kernel: AVX2 version of gcm_enc/dec engaged. Apr 13 20:51:54.888214 kernel: AES CTR mode by8 optimization enabled Apr 13 20:51:54.892465 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 13 20:51:54.898799 kernel: ahci 0000:00:1f.2: version 3.0 Apr 13 20:51:54.899179 kernel: PCI Interrupt Link [GSIA] enabled at IRQ 16 Apr 13 20:51:54.912153 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Apr 13 20:51:54.912360 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Apr 13 20:51:54.920827 kernel: scsi host0: ahci Apr 13 20:51:54.924418 kernel: scsi host1: ahci Apr 13 20:51:54.927675 kernel: scsi host2: ahci Apr 13 20:51:54.928098 kernel: scsi host3: ahci Apr 13 20:51:54.934096 kernel: scsi host4: ahci Apr 13 20:51:54.939409 kernel: scsi host5: ahci Apr 13 20:51:54.948454 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 Apr 13 20:51:54.949506 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 Apr 13 20:51:54.949521 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 Apr 13 20:51:54.978331 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 Apr 13 20:51:54.978417 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 Apr 13 20:51:54.982988 systemd-udevd[379]: Using default interface naming scheme 'v249'. Apr 13 20:51:54.990551 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 Apr 13 20:51:55.107573 systemd-networkd[343]: eth0: Link UP Apr 13 20:51:55.409445 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/vda6 scanned by systemd-udevd (380) Apr 13 20:51:55.410113 kernel: ata1: SATA link down (SStatus 0 SControl 300) Apr 13 20:51:55.410191 kernel: ata2: SATA link down (SStatus 0 SControl 300) Apr 13 20:51:55.410201 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Apr 13 20:51:55.410212 kernel: ata4: SATA link down (SStatus 0 SControl 300) Apr 13 20:51:55.410221 kernel: ata5: SATA link down (SStatus 0 SControl 300) Apr 13 20:51:55.410232 kernel: ata6: SATA link down (SStatus 0 SControl 300) Apr 13 20:51:55.410242 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Apr 13 20:51:55.410252 kernel: ata3.00: applying bridge limits Apr 13 20:51:55.410296 kernel: ata3.00: configured for UDMA/100 Apr 13 20:51:55.410305 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Apr 13 20:51:55.207234 systemd[1]: Found device /dev/disk/by-partlabel/USR-A. Apr 13 20:51:55.421183 systemd[1]: Found device /dev/disk/by-partuuid/7130c94a-213a-4e5a-8e26-6cce9662f132. Apr 13 20:51:55.438384 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Apr 13 20:51:55.439940 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Apr 13 20:51:55.440223 systemd[1]: Found device /dev/disk/by-label/ROOT. Apr 13 20:51:55.479436 systemd[1]: Found device /dev/disk/by-label/OEM. Apr 13 20:51:55.497786 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Apr 13 20:51:55.498427 systemd[1]: Found device /dev/disk/by-label/EFI-SYSTEM. Apr 13 20:51:55.505041 systemd[1]: Reached target Initrd Root Device. Apr 13 20:51:55.524833 systemd[1]: Starting Generate new UUID for disk GPT if necessary... Apr 13 20:51:55.609453 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 13 20:51:55.790878 kernel: hrtimer: interrupt took 23544994 ns Apr 13 20:51:55.955427 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 13 20:51:55.956259 systemd-networkd[343]: eth0: Gained carrier Apr 13 20:51:55.968948 systemd-networkd[343]: eth0: DHCPv4 address 10.0.0.3/16 via 10.0.0.1 Apr 13 20:51:56.518687 systemd[1]: Finished dracut initqueue hook. Apr 13 20:51:56.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:56.522539 systemd[1]: Reached target Preparation for Remote File Systems. Apr 13 20:51:56.527198 systemd[1]: Reached target Remote Encrypted Volumes. Apr 13 20:51:56.532922 systemd[1]: Reached target Remote File Systems. Apr 13 20:51:56.549471 systemd[1]: Starting dracut pre-mount hook... Apr 13 20:51:56.632187 systemd[1]: Finished dracut pre-mount hook. Apr 13 20:51:56.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:56.652275 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 13 20:51:56.655237 disk-uuid[467]: The operation has completed successfully. Apr 13 20:51:56.816703 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 13 20:51:56.818410 systemd[1]: Finished Generate new UUID for disk GPT if necessary. Apr 13 20:51:56.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:56.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:56.849371 systemd[1]: Starting Ignition (setup)... Apr 13 20:51:57.040099 kernel: BTRFS info (device vda6): disk space caching is enabled Apr 13 20:51:57.040381 kernel: BTRFS info (device vda6): has skinny extents Apr 13 20:51:57.215484 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 13 20:51:57.316400 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 13 20:51:57.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:57.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:57.316599 systemd[1]: Finished Ignition (setup). Apr 13 20:51:57.326549 systemd[1]: Starting Ignition (disks)... Apr 13 20:51:57.489413 ignition[509]: Ignition v0.36.1-15-gde4e6cc9 Apr 13 20:51:57.489445 ignition[509]: Stage: disks Apr 13 20:51:57.489457 ignition[509]: reading system config file "/usr/lib/ignition/base.ign" Apr 13 20:51:57.493078 ignition[509]: no config at "/usr/lib/ignition/base.ign" Apr 13 20:51:57.493292 ignition[509]: parsed url from cmdline: "" Apr 13 20:51:57.493296 ignition[509]: no config URL provided Apr 13 20:51:57.493304 ignition[509]: reading system config file "/usr/lib/ignition/user.ign" Apr 13 20:51:57.493495 ignition[509]: no config at "/usr/lib/ignition/user.ign" Apr 13 20:51:57.493582 ignition[509]: op(1): [started] loading QEMU firmware config module Apr 13 20:51:57.493588 ignition[509]: op(1): executing: "modprobe" "qemu_fw_cfg" Apr 13 20:51:57.502336 ignition[509]: op(1): [finished] loading QEMU firmware config module Apr 13 20:51:57.696208 systemd-networkd[343]: eth0: Gained IPv6LL Apr 13 20:51:57.745762 ignition[509]: parsing config with SHA512: c5b09a02d9c0e1f73cbe0769cfdb4f6ebe1869871ceecc00b868d7ea0a3c7486d9873c9ac762f617da47009e66baf054f9c23b322fc0233da25add7f273be083 Apr 13 20:51:57.752639 ignition[509]: warning at line 1, column 42 Config has unrecognized key: tls Apr 13 20:51:57.771470 ignition[509]: disks: disks passed Apr 13 20:51:57.771476 ignition[509]: Ignition finished successfully Apr 13 20:51:57.789060 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 13 20:51:57.790153 systemd[1]: Finished Ignition (disks). Apr 13 20:51:57.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:57.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:57.816759 systemd[1]: Reached target Preparation for Local File Systems. Apr 13 20:51:57.836627 systemd[1]: Starting File System Check on /dev/disk/by-label/ROOT... Apr 13 20:51:57.855267 systemd[1]: Starting Verity Setup for /dev/mapper/usr... Apr 13 20:51:57.941698 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Apr 13 20:51:57.943011 systemd-fsck[523]: ROOT: clean, 556/553792 files, 37783/553472 blocks Apr 13 20:51:57.982108 systemd[1]: Finished File System Check on /dev/disk/by-label/ROOT. Apr 13 20:51:57.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:58.001097 systemd[1]: Mounting /sysroot... Apr 13 20:51:58.237384 systemd[1]: Found device /dev/mapper/usr. Apr 13 20:51:58.245180 systemd[1]: Starting File System Check on /dev/mapper/usr... Apr 13 20:51:58.255456 systemd[1]: Finished Verity Setup for /dev/mapper/usr. Apr 13 20:51:58.291115 kernel: kauditd_printk_skb: 13 callbacks suppressed Apr 13 20:51:58.291237 kernel: audit: type=1130 audit(1776113518.274:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:58.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:58.416471 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null) Apr 13 20:51:58.416691 kernel: ext4 filesystem being mounted at /sysroot supports timestamps until 2038 (0x7fffffff) Apr 13 20:51:58.418964 systemd[1]: Mounted /sysroot. Apr 13 20:51:58.421766 systemd[1]: Reached target Initrd Root File System. Apr 13 20:51:58.435470 systemd-fsck[538]: fsck.ext4: Operation not permitted while trying to open /dev/mapper/usr Apr 13 20:51:58.435470 systemd-fsck[538]: You must have r/w access to the filesystem or be root Apr 13 20:51:58.442590 systemd-fsck[533]: fsck failed with exit status 8. Apr 13 20:51:58.443281 systemd-fsck[533]: Ignoring error. Apr 13 20:51:58.453049 systemd[1]: Finished File System Check on /dev/mapper/usr. Apr 13 20:51:58.525637 kernel: audit: type=1130 audit(1776113518.457:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:58.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:58.464221 systemd[1]: Mounting /sysusr/usr... Apr 13 20:51:58.614349 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: (null) Apr 13 20:51:58.632487 systemd[1]: Mounted /sysusr/usr. Apr 13 20:51:58.632797 systemd[1]: Reached target Local File Systems. Apr 13 20:51:58.640098 systemd[1]: Reached target System Initialization. Apr 13 20:51:58.649275 systemd[1]: Reached target Basic System. Apr 13 20:51:58.694359 systemd[1]: Mounting /sysroot/usr... Apr 13 20:51:58.717627 systemd[1]: Mounted /sysroot/usr. Apr 13 20:51:58.740203 systemd[1]: Starting Root filesystem setup... Apr 13 20:51:59.731156 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 13 20:51:59.779587 kernel: audit: type=1130 audit(1776113519.736:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:59.779617 kernel: audit: type=1131 audit(1776113519.736:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:59.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:59.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:51:59.736076 systemd[1]: Finished Root filesystem setup. Apr 13 20:51:59.775180 systemd[1]: Starting Ignition (files)... Apr 13 20:51:59.787302 systemd[1]: Starting /sysroot/boot... Apr 13 20:51:59.812971 ignition[551]: Ignition v0.36.1-15-gde4e6cc9 Apr 13 20:51:59.813002 ignition[551]: Stage: files Apr 13 20:51:59.813015 ignition[551]: reading system config file "/usr/lib/ignition/base.ign" Apr 13 20:51:59.813118 ignition[551]: no config at "/usr/lib/ignition/base.ign" Apr 13 20:51:59.815978 ignition[551]: files: compiled without relabeling support, skipping Apr 13 20:52:00.095018 systemd[1]: Finished /sysroot/boot. Apr 13 20:52:00.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:00.122058 kernel: audit: type=1130 audit(1776113520.106:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:00.647781 ignition[551]: files: createUsers: op(1): [started] creating or modifying user "core" Apr 13 20:52:00.647824 ignition[551]: files: createUsers: op(1): executing: "/usr/sbin/usermod" "--root" "/sysroot" "core" Apr 13 20:52:00.679070 ignition[551]: files: createUsers: op(1): [finished] creating or modifying user "core" Apr 13 20:52:00.679099 ignition[551]: files: createUsers: op(2): [started] adding ssh keys to user "core" Apr 13 20:52:00.734190 ignition[551]: files: createUsers: op(2): [finished] adding ssh keys to user "core" Apr 13 20:52:00.734233 ignition[551]: files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/etc/flatcar/update.conf" Apr 13 20:52:00.740349 ignition[551]: files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/etc/flatcar/update.conf" Apr 13 20:52:00.740363 ignition[551]: files: op(4): [started] processing unit "format-var-lib-docker.service" Apr 13 20:52:00.740394 ignition[551]: files: op(4): op(5): [started] writing unit "format-var-lib-docker.service" at "etc/systemd/system/format-var-lib-docker.service" Apr 13 20:52:00.747198 ignition[551]: files: op(4): op(5): [finished] writing unit "format-var-lib-docker.service" at "etc/systemd/system/format-var-lib-docker.service" Apr 13 20:52:00.803982 systemd[1]: ignition-files.service: Deactivated successfully. Apr 13 20:52:00.841101 kernel: audit: type=1130 audit(1776113520.816:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:00.841133 kernel: audit: type=1131 audit(1776113520.818:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:00.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:00.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:00.747206 ignition[551]: files: op(4): [finished] processing unit "format-var-lib-docker.service" Apr 13 20:52:00.806870 systemd[1]: Finished Ignition (files). Apr 13 20:52:00.747212 ignition[551]: files: op(6): [started] enabling unit "format-var-lib-docker.service" Apr 13 20:52:00.821123 systemd[1]: Condition check resulted in Populate torcx store to satisfy profile being skipped. Apr 13 20:52:00.748795 ignition[551]: files: op(6): [finished] enabling unit "format-var-lib-docker.service" Apr 13 20:52:00.841895 systemd[1]: Starting Ignition (record completion)... Apr 13 20:52:00.748803 ignition[551]: files: op(7): [started] processing unit "var-lib-docker.mount" Apr 13 20:52:00.878410 systemd[1]: Starting Reload Configuration from the Real Root... Apr 13 20:52:00.748829 ignition[551]: files: op(7): op(8): [started] writing unit "var-lib-docker.mount" at "etc/systemd/system/var-lib-docker.mount" Apr 13 20:52:00.749126 ignition[551]: files: op(7): op(8): [finished] writing unit "var-lib-docker.mount" at "etc/systemd/system/var-lib-docker.mount" Apr 13 20:52:00.749132 ignition[551]: files: op(7): [finished] processing unit "var-lib-docker.mount" Apr 13 20:52:00.749137 ignition[551]: files: op(9): [started] enabling unit "var-lib-docker.mount" Apr 13 20:52:00.749163 ignition[551]: files: op(9): [finished] enabling unit "var-lib-docker.mount" Apr 13 20:52:00.749168 ignition[551]: files: op(a): [started] processing unit "coreos-metadata.service" Apr 13 20:52:00.953729 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 13 20:52:01.013859 kernel: audit: type=1130 audit(1776113520.985:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:01.013897 kernel: audit: type=1131 audit(1776113520.987:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:00.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:00.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:00.749221 ignition[551]: files: op(a): op(b): [started] writing unit "coreos-metadata.service" at "etc/systemd/system/coreos-metadata.service" Apr 13 20:52:00.973306 systemd[1]: Finished Ignition (record completion). Apr 13 20:52:00.749473 ignition[551]: files: op(a): op(b): [finished] writing unit "coreos-metadata.service" at "etc/systemd/system/coreos-metadata.service" Apr 13 20:52:01.002057 systemd[1]: Reloading. Apr 13 20:52:00.749478 ignition[551]: files: op(a): [finished] processing unit "coreos-metadata.service" Apr 13 20:52:00.749483 ignition[551]: files: op(c): [started] disabling unit "coreos-metadata.service" Apr 13 20:52:00.749505 ignition[551]: files: op(c): [finished] disabling unit "coreos-metadata.service" Apr 13 20:52:00.749511 ignition[551]: files: files passed Apr 13 20:52:00.749526 ignition[551]: Ignition finished successfully Apr 13 20:52:01.105475 kernel: audit: type=1334 audit(1776113521.095:40): prog-id=10 op=UNLOAD Apr 13 20:52:01.095000 audit: BPF prog-id=10 op=UNLOAD Apr 13 20:52:01.096000 audit: BPF prog-id=6 op=UNLOAD Apr 13 20:52:01.119000 audit: BPF prog-id=9 op=UNLOAD Apr 13 20:52:01.195000 audit: BPF prog-id=3 op=UNLOAD Apr 13 20:52:03.065000 audit: BPF prog-id=11 op=LOAD Apr 13 20:52:03.068000 audit: BPF prog-id=12 op=LOAD Apr 13 20:52:03.071000 audit: BPF prog-id=13 op=LOAD Apr 13 20:52:03.073000 audit: BPF prog-id=14 op=LOAD Apr 13 20:52:03.074000 audit: BPF prog-id=7 op=UNLOAD Apr 13 20:52:03.074000 audit: BPF prog-id=8 op=UNLOAD Apr 13 20:52:03.077000 audit: BPF prog-id=15 op=LOAD Apr 13 20:52:03.113000 audit: BPF prog-id=16 op=LOAD Apr 13 20:52:03.116000 audit: BPF prog-id=17 op=LOAD Apr 13 20:52:03.118000 audit: BPF prog-id=18 op=LOAD Apr 13 20:52:03.120000 audit: BPF prog-id=4 op=UNLOAD Apr 13 20:52:03.122000 audit: BPF prog-id=5 op=UNLOAD Apr 13 20:52:03.839019 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 13 20:52:03.841955 systemd[1]: Finished Reload Configuration from the Real Root. Apr 13 20:52:03.900051 kernel: kauditd_printk_skb: 15 callbacks suppressed Apr 13 20:52:03.900080 kernel: audit: type=1130 audit(1776113523.852:56): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:03.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:03.898137 systemd[1]: Reached target Initrd File Systems. Apr 13 20:52:03.921845 kernel: audit: type=1131 audit(1776113523.852:57): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:03.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:03.929946 systemd[1]: Reached target Initrd Default Target. Apr 13 20:52:03.942589 systemd[1]: Condition check resulted in dracut mount hook being skipped. Apr 13 20:52:03.955163 systemd[1]: Starting dracut pre-pivot and cleanup hook... Apr 13 20:52:04.211414 systemd[1]: Finished dracut pre-pivot and cleanup hook. Apr 13 20:52:04.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:04.233427 kernel: audit: type=1130 audit(1776113524.222:58): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:04.291094 systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Apr 13 20:52:04.384009 systemd[1]: Stopped target Host and Network Name Lookups. Apr 13 20:52:04.428293 kernel: audit: type=1131 audit(1776113524.390:59): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:04.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:04.385837 systemd[1]: Stopped target Remote Encrypted Volumes. Apr 13 20:52:04.386103 systemd[1]: Stopped target Timer Units. Apr 13 20:52:04.386369 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 13 20:52:04.386543 systemd[1]: Stopped dracut pre-pivot and cleanup hook. Apr 13 20:52:04.392796 systemd[1]: Stopped target Initrd Default Target. Apr 13 20:52:04.410428 systemd[1]: Stopped target Basic System. Apr 13 20:52:04.414896 systemd[1]: Stopped target Initrd Root Device. Apr 13 20:52:04.434446 systemd[1]: Stopped target Path Units. Apr 13 20:52:04.549785 kernel: audit: type=1131 audit(1776113524.531:60): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:04.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:04.444482 systemd[1]: Stopped target Remote File Systems. Apr 13 20:52:04.447455 systemd[1]: Stopped target Preparation for Remote File Systems. Apr 13 20:52:04.451266 systemd[1]: Stopped target Slice Units. Apr 13 20:52:04.502289 systemd[1]: Stopped target Socket Units. Apr 13 20:52:04.506480 systemd[1]: Stopped target System Initialization. Apr 13 20:52:04.622232 kernel: audit: type=1131 audit(1776113524.605:61): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:04.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:04.624553 iscsid[394]: iscsid shutting down. Apr 13 20:52:04.515410 systemd[1]: Stopped target Local File Systems. Apr 13 20:52:04.520584 systemd[1]: Stopped target Preparation for Local File Systems. Apr 13 20:52:04.524186 systemd[1]: Stopped target Swaps. Apr 13 20:52:04.701597 kernel: audit: type=1131 audit(1776113524.646:62): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:04.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:04.526413 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 13 20:52:04.719409 kernel: audit: type=1131 audit(1776113524.701:63): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:04.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:04.526737 systemd[1]: Stopped dracut pre-mount hook. Apr 13 20:52:04.743717 kernel: audit: type=1131 audit(1776113524.719:64): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:04.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:04.535818 systemd[1]: Stopped target Local Encrypted Volumes. Apr 13 20:52:04.552473 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 13 20:52:04.832121 kernel: audit: type=1131 audit(1776113524.820:65): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:04.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:04.581503 systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Apr 13 20:52:04.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:04.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:04.592548 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 13 20:52:04.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:04.594879 systemd[1]: Stopped dracut initqueue hook. Apr 13 20:52:04.618825 systemd[1]: Stopping Open-iSCSI... Apr 13 20:52:04.628929 systemd[1]: Stopping /sysroot/boot... Apr 13 20:52:04.638511 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 13 20:52:04.639825 systemd[1]: Stopped Coldplug All udev Devices. Apr 13 20:52:04.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:04.646596 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 13 20:52:04.884000 audit: BPF prog-id=11 op=UNLOAD Apr 13 20:52:04.646758 systemd[1]: Stopped dracut pre-trigger hook. Apr 13 20:52:04.711508 systemd[1]: iscsid.service: Deactivated successfully. Apr 13 20:52:04.713456 systemd[1]: Stopped Open-iSCSI. Apr 13 20:52:04.722402 systemd[1]: iscsid.socket: Deactivated successfully. Apr 13 20:52:04.722506 systemd[1]: Closed Open-iSCSI iscsid Socket. Apr 13 20:52:04.738793 systemd[1]: Stopping iSCSI UserSpace I/O driver... Apr 13 20:52:04.751129 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 13 20:52:04.751536 systemd[1]: Stopped iSCSI UserSpace I/O driver. Apr 13 20:52:04.824187 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 13 20:52:04.825757 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 13 20:52:04.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:04.827586 systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Apr 13 20:52:04.835926 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 13 20:52:04.836074 systemd[1]: Stopped /sysroot/boot. Apr 13 20:52:04.841840 systemd[1]: Stopped target Network. Apr 13 20:52:04.842669 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 13 20:52:05.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:04.842731 systemd[1]: Closed Open-iSCSI iscsiuio Socket. Apr 13 20:52:04.850680 systemd[1]: Stopping Network Name Resolution... Apr 13 20:52:04.864661 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 13 20:52:04.867270 systemd[1]: Stopped Network Name Resolution. Apr 13 20:52:05.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:04.884760 systemd[1]: Stopping Network Configuration... Apr 13 20:52:04.897724 systemd-networkd[343]: eth0: DHCP lease lost Apr 13 20:52:05.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:05.031000 audit: BPF prog-id=12 op=UNLOAD Apr 13 20:52:04.922209 systemd-networkd[343]: eth0: DHCPv6 lease lost Apr 13 20:52:05.037000 audit: BPF prog-id=15 op=UNLOAD Apr 13 20:52:04.930071 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 13 20:52:04.934495 systemd[1]: Stopped Network Configuration. Apr 13 20:52:05.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:04.946055 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 13 20:52:04.947446 systemd[1]: Closed Network Service Netlink Socket. Apr 13 20:52:05.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:04.998256 systemd[1]: Stopping Network Cleanup... Apr 13 20:52:05.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:05.000871 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 13 20:52:05.001032 systemd[1]: Stopped Apply Kernel Variables. Apr 13 20:52:05.002957 systemd[1]: Stopping Rule-based Manager for Device Events and Files... Apr 13 20:52:05.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:05.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:05.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:05.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=rngd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:05.015262 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 13 20:52:05.015566 systemd[1]: Stopped Rule-based Manager for Device Events and Files. Apr 13 20:52:05.028610 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 13 20:52:05.028760 systemd[1]: Stopped Network Cleanup. Apr 13 20:52:05.034132 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 13 20:52:05.034237 systemd[1]: Closed udev Control Socket. Apr 13 20:52:05.041599 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 13 20:52:05.042455 systemd[1]: Closed udev Kernel Socket. Apr 13 20:52:05.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:05.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:05.047080 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 13 20:52:05.047206 systemd[1]: Stopped dracut pre-udev hook. Apr 13 20:52:05.071992 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 13 20:52:05.117666 systemd[1]: Stopped dracut cmdline hook. Apr 13 20:52:05.127622 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 13 20:52:05.127850 systemd[1]: Stopped dracut ask for additional cmdline parameters. Apr 13 20:52:05.144776 systemd[1]: Starting Cleanup udev Database... Apr 13 20:52:05.150202 systemd[1]: Stopping Hardware RNG Entropy Gatherer Daemon... Apr 13 20:52:05.150421 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Apr 13 20:52:05.150490 systemd[1]: Stopped Create Static Device Nodes in /dev. Apr 13 20:52:05.152070 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 13 20:52:05.152140 systemd[1]: Stopped Create List of Static Device Nodes. Apr 13 20:52:05.154056 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 13 20:52:05.154123 systemd[1]: Stopped Setup Virtual Console. Apr 13 20:52:05.156628 systemd[1]: rngd.service: Deactivated successfully. Apr 13 20:52:05.157564 systemd[1]: Stopped Hardware RNG Entropy Gatherer Daemon. Apr 13 20:52:05.186637 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 13 20:52:05.189027 systemd[1]: Finished Cleanup udev Database. Apr 13 20:52:05.210122 systemd[1]: Reached target Switch Root. Apr 13 20:52:05.238965 systemd[1]: Starting Switch Root... Apr 13 20:52:05.330244 systemd[1]: Switching root. Apr 13 20:52:05.350000 audit: BPF prog-id=16 op=UNLOAD Apr 13 20:52:05.498463 systemd-journald[192]: Journal stopped Apr 13 20:53:31.406207 systemd-journald[192]: Received SIGTERM from PID 1 (systemd). Apr 13 20:53:31.406344 kernel: SELinux: policy capability network_peer_controls=1 Apr 13 20:53:31.406364 kernel: SELinux: policy capability open_perms=1 Apr 13 20:53:31.406387 kernel: SELinux: policy capability extended_socket_class=1 Apr 13 20:53:31.406399 kernel: SELinux: policy capability always_check_network=0 Apr 13 20:53:31.406410 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 13 20:53:31.406422 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 13 20:53:31.406447 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 13 20:53:31.406476 systemd[1]: Successfully loaded SELinux policy in 450.239ms. Apr 13 20:53:31.406503 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 397.648ms. Apr 13 20:53:31.406518 systemd[1]: systemd 249 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 13 20:53:31.406539 systemd[1]: Detected virtualization kvm. Apr 13 20:53:31.406550 systemd[1]: Detected architecture x86-64. Apr 13 20:53:31.406563 systemd[1]: Detected first boot. Apr 13 20:53:31.406574 systemd[1]: Initializing machine ID from VM UUID. Apr 13 20:53:31.406594 kernel: kauditd_printk_skb: 22 callbacks suppressed Apr 13 20:53:31.406620 kernel: audit: type=1400 audit(1776113529.128:88): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 13 20:53:31.406648 kernel: audit: type=1400 audit(1776113529.130:89): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 13 20:53:31.406671 kernel: audit: type=1334 audit(1776113529.142:90): prog-id=19 op=LOAD Apr 13 20:53:31.406681 kernel: audit: type=1334 audit(1776113529.143:91): prog-id=19 op=UNLOAD Apr 13 20:53:31.406693 kernel: audit: type=1334 audit(1776113529.166:92): prog-id=20 op=LOAD Apr 13 20:53:31.406703 kernel: audit: type=1334 audit(1776113529.166:93): prog-id=20 op=UNLOAD Apr 13 20:53:31.406714 kernel: audit: type=1400 audit(1776113529.919:94): avc: denied { associate } for pid=716 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 13 20:53:31.406726 systemd[1]: Populated /etc with preset unit settings. Apr 13 20:53:31.406739 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 13 20:53:31.406763 systemd[1]: initrd-switch-root.service: Current command vanished from the unit file, execution of the command list won't be resumed. Apr 13 20:53:31.406774 kernel: audit: type=1334 audit(1776113606.839:95): prog-id=21 op=LOAD Apr 13 20:53:31.406784 kernel: audit: type=1334 audit(1776113606.924:96): prog-id=22 op=LOAD Apr 13 20:53:31.406795 kernel: audit: type=1334 audit(1776113606.928:97): prog-id=23 op=LOAD Apr 13 20:53:31.406805 kernel: audit: type=1334 audit(1776113606.929:98): prog-id=17 op=UNLOAD Apr 13 20:53:31.406824 kernel: audit: type=1334 audit(1776113606.929:99): prog-id=18 op=UNLOAD Apr 13 20:53:31.406835 kernel: audit: type=1334 audit(1776113607.243:100): prog-id=24 op=LOAD Apr 13 20:53:31.406854 kernel: audit: type=1334 audit(1776113607.243:101): prog-id=21 op=UNLOAD Apr 13 20:53:31.406876 kernel: audit: type=1334 audit(1776113607.250:102): prog-id=25 op=LOAD Apr 13 20:53:31.406886 kernel: audit: type=1334 audit(1776113607.254:103): prog-id=26 op=LOAD Apr 13 20:53:31.406897 kernel: audit: type=1334 audit(1776113607.256:104): prog-id=22 op=UNLOAD Apr 13 20:53:31.406907 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 13 20:53:31.407999 systemd[1]: Stopped Switch Root. Apr 13 20:53:31.408020 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 13 20:53:31.408033 systemd[1]: Created slice Slice /system/addon-config. Apr 13 20:53:31.408053 systemd[1]: Created slice Slice /system/addon-run. Apr 13 20:53:31.408067 systemd[1]: Created slice Slice /system/getty. Apr 13 20:53:31.409777 systemd[1]: Created slice Slice /system/modprobe. Apr 13 20:53:31.409873 systemd[1]: Created slice Slice /system/serial-getty. Apr 13 20:53:31.409886 systemd[1]: Created slice Slice /system/system-cloudinit. Apr 13 20:53:31.409899 systemd[1]: Created slice Slice /system/systemd-fsck. Apr 13 20:53:31.409913 systemd[1]: Created slice User and Session Slice. Apr 13 20:53:31.409926 systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Apr 13 20:53:31.409938 systemd[1]: Started Forward Password Requests to Wall Directory Watch. Apr 13 20:53:31.409950 systemd[1]: Set up automount Boot partition Automount Point. Apr 13 20:53:31.409981 systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Apr 13 20:53:31.409993 systemd[1]: Stopped target Switch Root. Apr 13 20:53:31.410026 systemd[1]: Stopped target Initrd File Systems. Apr 13 20:53:31.410050 systemd[1]: Stopped target Initrd Root File System. Apr 13 20:53:31.410067 systemd[1]: Reached target Remote Encrypted Volumes. Apr 13 20:53:31.410079 systemd[1]: Reached target Remote File Systems. Apr 13 20:53:31.410101 systemd[1]: Reached target Slice Units. Apr 13 20:53:31.410113 systemd[1]: Reached target Swaps. Apr 13 20:53:31.410125 systemd[1]: Reached target Verify torcx succeeded. Apr 13 20:53:31.410137 systemd[1]: Reached target Local Verity Protected Volumes. Apr 13 20:53:31.410148 systemd[1]: Listening on Process Core Dump Socket. Apr 13 20:53:31.410172 systemd[1]: Listening on initctl Compatibility Named Pipe. Apr 13 20:53:31.410184 systemd[1]: Listening on Network Service Netlink Socket. Apr 13 20:53:31.410206 systemd[1]: Listening on udev Control Socket. Apr 13 20:53:31.410218 systemd[1]: Listening on udev Kernel Socket. Apr 13 20:53:31.410230 systemd[1]: Mounting Huge Pages File System... Apr 13 20:53:31.410241 systemd[1]: Mounting POSIX Message Queue File System... Apr 13 20:53:31.410252 systemd[1]: Mounting External Media Directory... Apr 13 20:53:31.410262 systemd[1]: Condition check resulted in /proc/xen being skipped. Apr 13 20:53:31.410273 systemd[1]: Mounting Kernel Debug File System... Apr 13 20:53:31.410285 systemd[1]: Mounting Kernel Trace File System... Apr 13 20:53:31.410354 systemd[1]: Mounting Temporary Directory /tmp... Apr 13 20:53:31.410367 systemd[1]: Starting Create missing system files... Apr 13 20:53:31.410406 systemd[1]: Starting Create List of Static Device Nodes... Apr 13 20:53:31.410418 systemd[1]: Starting Load Kernel Module configfs... Apr 13 20:53:31.410430 systemd[1]: Starting Load Kernel Module drm... Apr 13 20:53:31.410442 systemd[1]: Starting Load Kernel Module fuse... Apr 13 20:53:31.410453 systemd[1]: Condition check resulted in Create /etc/nsswitch.conf being skipped. Apr 13 20:53:31.410466 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 13 20:53:31.410478 systemd[1]: Stopped File System Check on Root Device. Apr 13 20:53:31.410504 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 13 20:53:31.410516 systemd[1]: Stopped systemd-fsck-usr.service. Apr 13 20:53:31.410528 systemd[1]: Stopped Journal Service. Apr 13 20:53:31.410539 kernel: fuse: init (API version 7.32) Apr 13 20:53:31.410551 systemd[1]: Starting Journal Service... Apr 13 20:53:31.410562 systemd[1]: Condition check resulted in Load Kernel Modules being skipped. Apr 13 20:53:31.410573 systemd[1]: Starting Remount Root and Kernel File Systems... Apr 13 20:53:31.410583 systemd[1]: Starting Apply Kernel Variables... Apr 13 20:53:31.410596 systemd[1]: Starting Coldplug All udev Devices... Apr 13 20:53:31.410608 systemd[1]: verity-setup.service: Deactivated successfully. Apr 13 20:53:31.410633 systemd[1]: Stopped verity-setup.service. Apr 13 20:53:31.410645 systemd[1]: Condition check resulted in Set fake PV driver version for XenServer being skipped. Apr 13 20:53:31.410656 systemd[1]: Mounted Huge Pages File System. Apr 13 20:53:31.410674 systemd-journald[771]: Journal started Apr 13 20:53:31.410736 systemd-journald[771]: Runtime Journal (/run/log/journal/19b7d661aae64408ad201f8494c741a6) is 6.0M, max 48.7M, 42.6M free. Apr 13 20:52:07.635000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 13 20:52:09.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 13 20:52:09.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 13 20:52:09.142000 audit: BPF prog-id=19 op=LOAD Apr 13 20:52:09.143000 audit: BPF prog-id=19 op=UNLOAD Apr 13 20:52:09.166000 audit: BPF prog-id=20 op=LOAD Apr 13 20:52:09.166000 audit: BPF prog-id=20 op=UNLOAD Apr 13 20:52:09.919000 audit[716]: AVC avc: denied { associate } for pid=716 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 13 20:53:26.839000 audit: BPF prog-id=21 op=LOAD Apr 13 20:53:26.924000 audit: BPF prog-id=22 op=LOAD Apr 13 20:53:26.928000 audit: BPF prog-id=23 op=LOAD Apr 13 20:53:26.929000 audit: BPF prog-id=17 op=UNLOAD Apr 13 20:53:26.929000 audit: BPF prog-id=18 op=UNLOAD Apr 13 20:53:27.243000 audit: BPF prog-id=24 op=LOAD Apr 13 20:53:27.243000 audit: BPF prog-id=21 op=UNLOAD Apr 13 20:53:27.250000 audit: BPF prog-id=25 op=LOAD Apr 13 20:53:27.254000 audit: BPF prog-id=26 op=LOAD Apr 13 20:53:27.256000 audit: BPF prog-id=22 op=UNLOAD Apr 13 20:53:27.256000 audit: BPF prog-id=23 op=UNLOAD Apr 13 20:53:27.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:27.638000 audit: BPF prog-id=24 op=UNLOAD Apr 13 20:53:27.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:27.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:31.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:31.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:31.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:31.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:31.147000 audit: BPF prog-id=27 op=LOAD Apr 13 20:53:31.153000 audit: BPF prog-id=28 op=LOAD Apr 13 20:53:31.156000 audit: BPF prog-id=29 op=LOAD Apr 13 20:53:31.178000 audit: BPF prog-id=25 op=UNLOAD Apr 13 20:53:31.178000 audit: BPF prog-id=26 op=UNLOAD Apr 13 20:53:31.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:31.419376 systemd[1]: Started Journal Service. Apr 13 20:53:31.401000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 13 20:53:26.773644 systemd[1]: Queued start job for default target Multi-User System. Apr 13 20:52:09.891894 /usr/lib64/systemd/system-generators/torcx-generator[716]: time="2026-04-13T20:52:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3033.2.4 /usr/share/oem/torcx/store /var/lib/torcx/store/3033.2.4 /var/lib/torcx/store]" Apr 13 20:53:27.542677 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 13 20:52:09.906026 /usr/lib64/systemd/system-generators/torcx-generator[716]: time="2026-04-13T20:52:09Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 13 20:52:09.906515 /usr/lib64/systemd/system-generators/torcx-generator[716]: time="2026-04-13T20:52:09Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 13 20:52:09.907559 /usr/lib64/systemd/system-generators/torcx-generator[716]: time="2026-04-13T20:52:09Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 13 20:52:09.907576 /usr/lib64/systemd/system-generators/torcx-generator[716]: time="2026-04-13T20:52:09Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 13 20:52:09.907621 /usr/lib64/systemd/system-generators/torcx-generator[716]: time="2026-04-13T20:52:09Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 13 20:52:09.909363 /usr/lib64/systemd/system-generators/torcx-generator[716]: time="2026-04-13T20:52:09Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 13 20:52:09.912826 /usr/lib64/systemd/system-generators/torcx-generator[716]: time="2026-04-13T20:52:09Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 13 20:53:31.422664 systemd[1]: Mounted POSIX Message Queue File System. Apr 13 20:52:09.912883 /usr/lib64/systemd/system-generators/torcx-generator[716]: time="2026-04-13T20:52:09Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 13 20:53:31.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:52:09.912912 /usr/lib64/systemd/system-generators/torcx-generator[716]: time="2026-04-13T20:52:09Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 13 20:52:09.914400 /usr/lib64/systemd/system-generators/torcx-generator[716]: time="2026-04-13T20:52:09Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 13 20:52:09.914444 /usr/lib64/systemd/system-generators/torcx-generator[716]: time="2026-04-13T20:52:09Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 13 20:52:09.914470 /usr/lib64/systemd/system-generators/torcx-generator[716]: time="2026-04-13T20:52:09Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3033.2.4: no such file or directory" path=/usr/share/oem/torcx/store/3033.2.4 Apr 13 20:52:09.914489 /usr/lib64/systemd/system-generators/torcx-generator[716]: time="2026-04-13T20:52:09Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 13 20:52:09.914511 /usr/lib64/systemd/system-generators/torcx-generator[716]: time="2026-04-13T20:52:09Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3033.2.4: no such file or directory" path=/var/lib/torcx/store/3033.2.4 Apr 13 20:52:09.914528 /usr/lib64/systemd/system-generators/torcx-generator[716]: time="2026-04-13T20:52:09Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 13 20:52:56.701010 /usr/lib64/systemd/system-generators/torcx-generator[716]: time="2026-04-13T20:52:56Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 13 20:52:56.724625 /usr/lib64/systemd/system-generators/torcx-generator[716]: time="2026-04-13T20:52:56Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 13 20:52:56.740531 /usr/lib64/systemd/system-generators/torcx-generator[716]: time="2026-04-13T20:52:56Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 13 20:52:56.790590 /usr/lib64/systemd/system-generators/torcx-generator[716]: time="2026-04-13T20:52:56Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 13 20:52:56.797750 /usr/lib64/systemd/system-generators/torcx-generator[716]: time="2026-04-13T20:52:56Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 13 20:52:56.813291 /usr/lib64/systemd/system-generators/torcx-generator[716]: time="2026-04-13T20:52:56Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 13 20:53:31.429545 systemd[1]: Mounted External Media Directory. Apr 13 20:53:31.437051 systemd[1]: Mounted Kernel Debug File System. Apr 13 20:53:31.447855 systemd[1]: Mounted Kernel Trace File System. Apr 13 20:53:31.456502 systemd[1]: Mounted Temporary Directory /tmp. Apr 13 20:53:31.471740 systemd[1]: Finished Create missing system files. Apr 13 20:53:31.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:31.478138 systemd[1]: Finished Create List of Static Device Nodes. Apr 13 20:53:31.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:31.509618 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 13 20:53:31.511990 systemd[1]: Finished Load Kernel Module configfs. Apr 13 20:53:31.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:31.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:31.517374 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 13 20:53:31.541399 systemd[1]: Finished Load Kernel Module drm. Apr 13 20:53:31.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:31.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:31.602411 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 13 20:53:31.634353 systemd[1]: Finished Load Kernel Module fuse. Apr 13 20:53:31.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:31.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:31.646861 systemd[1]: Finished Remount Root and Kernel File Systems. Apr 13 20:53:31.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:31.731186 systemd[1]: Finished Apply Kernel Variables. Apr 13 20:53:31.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:31.896764 systemd[1]: Mounting FUSE Control File System... Apr 13 20:53:31.907575 systemd[1]: Mounting Kernel Configuration File System... Apr 13 20:53:31.910401 systemd[1]: Condition check resulted in Remount Root File System being skipped. Apr 13 20:53:31.915297 systemd[1]: Starting Rebuild Hardware Database... Apr 13 20:53:31.932378 systemd[1]: Starting Flush Journal to Persistent Storage... Apr 13 20:53:31.936814 systemd[1]: Condition check resulted in Platform Persistent Storage Archival being skipped. Apr 13 20:53:31.940349 systemd[1]: Starting Load/Save Random Seed... Apr 13 20:53:31.955302 systemd-journald[771]: Time spent on flushing to /var/log/journal/19b7d661aae64408ad201f8494c741a6 is 35.195ms for 1046 entries. Apr 13 20:53:31.955302 systemd-journald[771]: System Journal (/var/log/journal/19b7d661aae64408ad201f8494c741a6) is 8.0M, max 203.0M, 195.0M free. Apr 13 20:53:32.088289 kernel: kauditd_printk_skb: 27 callbacks suppressed Apr 13 20:53:32.088447 kernel: audit: type=1130 audit(1776113612.017:132): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:32.088475 kernel: audit: type=1130 audit(1776113612.085:133): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:32.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:32.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:31.944556 systemd[1]: Starting Create System Users... Apr 13 20:53:31.951613 systemd[1]: Mounted FUSE Control File System. Apr 13 20:53:31.955649 systemd[1]: Mounted Kernel Configuration File System. Apr 13 20:53:32.015028 systemd[1]: Finished Load/Save Random Seed. Apr 13 20:53:32.019670 systemd[1]: Reached target First Boot Complete. Apr 13 20:53:32.051252 systemd-sysusers[783]: Creating group sgx with gid 999. Apr 13 20:53:32.055303 systemd-sysusers[783]: Creating group systemd-oom with gid 998. Apr 13 20:53:32.056216 systemd-sysusers[783]: Creating user systemd-oom (systemd Userspace OOM Killer) with uid 998 and gid 998. Apr 13 20:53:32.072984 systemd-sysusers[783]: Creating group systemd-timesync with gid 997. Apr 13 20:53:32.073739 systemd-sysusers[783]: Creating user systemd-timesync (systemd Time Synchronization) with uid 997 and gid 997. Apr 13 20:53:32.079229 systemd[1]: Finished Coldplug All udev Devices. Apr 13 20:53:32.121364 systemd[1]: Starting Wait for udev To Complete Device Initialization... Apr 13 20:53:32.130769 systemd[1]: Finished Flush Journal to Persistent Storage. Apr 13 20:53:32.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:32.138731 systemd-sysusers[783]: Creating group systemd-coredump with gid 996. Apr 13 20:53:32.150815 kernel: audit: type=1130 audit(1776113612.136:134): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:32.140537 systemd-sysusers[783]: Creating user systemd-coredump (systemd Core Dumper) with uid 996 and gid 996. Apr 13 20:53:32.279786 systemd[1]: Finished Create System Users. Apr 13 20:53:32.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:32.307900 kernel: audit: type=1130 audit(1776113612.290:135): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:32.334616 systemd[1]: Starting Create Static Device Nodes in /dev... Apr 13 20:53:32.733914 systemd[1]: Finished Create Static Device Nodes in /dev. Apr 13 20:53:32.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:32.772447 kernel: audit: type=1130 audit(1776113612.750:136): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:51.519454 systemd[1]: Finished Rebuild Hardware Database. Apr 13 20:53:51.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:51.544134 kernel: audit: type=1130 audit(1776113631.527:137): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:51.666000 audit: BPF prog-id=30 op=LOAD Apr 13 20:53:51.678289 kernel: audit: type=1334 audit(1776113631.666:138): prog-id=30 op=LOAD Apr 13 20:53:51.678479 kernel: audit: type=1334 audit(1776113631.671:139): prog-id=31 op=LOAD Apr 13 20:53:51.678499 kernel: audit: type=1334 audit(1776113631.675:140): prog-id=32 op=LOAD Apr 13 20:53:51.671000 audit: BPF prog-id=31 op=LOAD Apr 13 20:53:51.675000 audit: BPF prog-id=32 op=LOAD Apr 13 20:53:51.677000 audit: BPF prog-id=13 op=UNLOAD Apr 13 20:53:51.684065 kernel: audit: type=1334 audit(1776113631.677:141): prog-id=13 op=UNLOAD Apr 13 20:53:51.685110 kernel: audit: type=1334 audit(1776113631.677:142): prog-id=14 op=UNLOAD Apr 13 20:53:51.677000 audit: BPF prog-id=14 op=UNLOAD Apr 13 20:53:51.710244 systemd[1]: Starting Rule-based Manager for Device Events and Files... Apr 13 20:53:56.136888 systemd[1]: Started Rule-based Manager for Device Events and Files. Apr 13 20:53:56.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:56.180602 kernel: audit: type=1130 audit(1776113636.150:143): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:56.187000 audit: BPF prog-id=33 op=LOAD Apr 13 20:53:56.197560 kernel: audit: type=1334 audit(1776113636.187:144): prog-id=33 op=LOAD Apr 13 20:53:56.197444 systemd[1]: Starting Network Configuration... Apr 13 20:53:56.352872 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Apr 13 20:53:56.400100 kernel: ACPI: Power Button [PWRF] Apr 13 20:53:56.466603 systemd-udevd[802]: Using default interface naming scheme 'v249'. Apr 13 20:53:56.476406 systemd-networkd[795]: lo: Link UP Apr 13 20:53:56.478082 systemd-networkd[795]: lo: Gained carrier Apr 13 20:53:56.481664 systemd-networkd[795]: Enumeration completed Apr 13 20:53:56.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:56.487213 systemd[1]: Started Network Configuration. Apr 13 20:53:56.506636 kernel: audit: type=1130 audit(1776113636.492:145): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:56.613617 systemd-networkd[795]: eth0: Link UP Apr 13 20:53:56.628228 systemd-networkd[795]: eth0: Gained carrier Apr 13 20:53:56.618000 audit[794]: AVC avc: denied { confidentiality } for pid=794 comm="systemd-udevd" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 13 20:53:56.642172 kernel: audit: type=1400 audit(1776113636.618:146): avc: denied { confidentiality } for pid=794 comm="systemd-udevd" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 13 20:53:56.670668 systemd-networkd[795]: eth0: DHCPv4 address 10.0.0.3/16 via 10.0.0.1 Apr 13 20:53:56.714141 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Apr 13 20:53:56.717934 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Apr 13 20:53:56.724611 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Apr 13 20:53:56.732870 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Apr 13 20:53:57.252125 udevadm[787]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Apr 13 20:53:57.272053 kernel: mousedev: PS/2 mouse device common for all mice Apr 13 20:53:58.004256 systemd-networkd[795]: eth0: Gained IPv6LL Apr 13 20:53:58.008172 systemd[1]: Finished Wait for udev To Complete Device Initialization. Apr 13 20:53:58.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:58.033554 kernel: audit: type=1130 audit(1776113638.015:147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:53:58.137768 systemd[1]: Starting Activation of LVM2 logical volumes... Apr 13 20:54:00.096719 lvm[819]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 13 20:54:01.753088 systemd[1]: Finished Activation of LVM2 logical volumes. Apr 13 20:54:01.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:54:01.793168 systemd[1]: Reached target Local Encrypted Volumes. Apr 13 20:54:01.796700 kernel: audit: type=1130 audit(1776113641.786:148): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:54:02.117197 systemd[1]: Starting Activation of LVM2 logical volumes... Apr 13 20:54:02.432801 lvm[820]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 13 20:54:05.351036 systemd[1]: Finished Activation of LVM2 logical volumes. Apr 13 20:54:05.400858 kernel: audit: type=1130 audit(1776113645.380:149): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:54:05.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:54:05.400794 systemd[1]: Reached target Preparation for Local File Systems. Apr 13 20:54:05.431295 systemd[1]: Condition check resulted in Virtual Machine and Container Storage (Compatibility) being skipped. Apr 13 20:54:05.435349 systemd[1]: Reached target Containers. Apr 13 20:54:05.656165 systemd[1]: Starting File System Check on /dev/disk/by-label/OEM... Apr 13 20:54:08.112506 systemd[1]: Finished File System Check on /dev/disk/by-label/OEM. Apr 13 20:54:08.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:54:08.143451 kernel: audit: type=1130 audit(1776113648.126:150): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:54:08.425572 systemd[1]: Mounting /usr/share/oem... Apr 13 20:54:09.428102 kernel: BTRFS info (device vda6): disk space caching is enabled Apr 13 20:54:09.432944 kernel: BTRFS info (device vda6): has skinny extents Apr 13 20:54:09.615235 systemd[1]: Mounted /usr/share/oem. Apr 13 20:54:09.652995 systemd[1]: Reached target Local File Systems. Apr 13 20:54:10.074267 systemd[1]: Starting Rebuild Dynamic Linker Cache... Apr 13 20:54:10.124793 systemd[1]: Condition check resulted in Set Up Additional Binary Formats being skipped. Apr 13 20:54:10.131973 systemd[1]: Condition check resulted in Store a System Token in an EFI Variable being skipped. Apr 13 20:54:10.233162 systemd[1]: Starting Commit a transient machine-id on disk... Apr 13 20:54:10.248463 systemd[1]: Starting Create Volatile Files and Directories... Apr 13 20:54:10.352596 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 13 20:54:10.355185 systemd[1]: Finished Commit a transient machine-id on disk. Apr 13 20:54:10.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:54:10.390544 systemd-tmpfiles[846]: /usr/lib64/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 13 20:54:10.407162 kernel: audit: type=1130 audit(1776113650.387:151): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:54:10.532907 systemd-tmpfiles[846]: /usr/lib64/tmpfiles.d/systemd.conf:33: Duplicate line for path "/var/lib/systemd", ignoring. Apr 13 20:54:12.034664 systemd-tmpfiles[846]: Detected autofs mount point /boot during canonicalization of /boot. Apr 13 20:54:12.034708 systemd-tmpfiles[846]: Skipping /boot Apr 13 20:54:12.240684 systemd-tmpfiles[846]: Detected autofs mount point /boot during canonicalization of /boot. Apr 13 20:54:12.241862 systemd-tmpfiles[846]: Skipping /boot Apr 13 20:54:13.911084 systemd[1]: Finished Rebuild Dynamic Linker Cache. Apr 13 20:54:13.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:54:13.933105 kernel: audit: type=1130 audit(1776113653.918:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:54:24.997422 systemd[1]: Finished Create Volatile Files and Directories. Apr 13 20:54:25.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:54:25.021908 kernel: audit: type=1130 audit(1776113665.009:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:54:25.261096 systemd[1]: Starting Load Security Auditing Rules... Apr 13 20:54:25.308249 systemd[1]: Starting Clean up broken links in /etc/ssl/certs... Apr 13 20:54:25.348705 systemd[1]: Starting Rebuild Journal Catalog... Apr 13 20:54:25.356000 audit: BPF prog-id=34 op=LOAD Apr 13 20:54:25.380369 kernel: audit: type=1334 audit(1776113665.356:154): prog-id=34 op=LOAD Apr 13 20:54:25.385495 systemd[1]: Starting Network Name Resolution... Apr 13 20:54:25.396000 audit: BPF prog-id=35 op=LOAD Apr 13 20:54:25.404954 kernel: audit: type=1334 audit(1776113665.396:155): prog-id=35 op=LOAD Apr 13 20:54:25.411749 systemd[1]: Starting Network Time Synchronization... Apr 13 20:54:25.478190 systemd[1]: Starting Record System Boot/Shutdown in UTMP... Apr 13 20:54:25.490864 systemd[1]: Finished Clean up broken links in /etc/ssl/certs. Apr 13 20:54:25.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:54:25.499196 systemd[1]: Condition check resulted in Update CA bundle at /etc/ssl/certs/ca-certificates.crt being skipped. Apr 13 20:54:25.501156 systemd[1]: Finished Rebuild Journal Catalog. Apr 13 20:54:25.510975 kernel: audit: type=1130 audit(1776113665.493:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:54:25.511644 kernel: audit: type=1130 audit(1776113665.507:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:54:25.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:54:25.514000 audit[861]: SYSTEM_BOOT pid=861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib64/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 13 20:54:25.532208 kernel: audit: type=1127 audit(1776113665.514:158): pid=861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib64/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 13 20:54:25.600614 systemd[1]: Starting Update is Completed... Apr 13 20:54:25.612672 systemd[1]: Finished Record System Boot/Shutdown in UTMP. Apr 13 20:54:25.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:54:25.629809 kernel: audit: type=1130 audit(1776113665.616:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:54:25.649195 kernel: audit: type=1305 audit(1776113665.636:160): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 13 20:54:25.636000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 13 20:54:25.649786 augenrules[869]: No rules Apr 13 20:54:25.649984 systemd[1]: Finished Update is Completed. Apr 13 20:54:25.689254 systemd[1]: Finished Load Security Auditing Rules. Apr 13 20:54:26.209088 systemd-resolved[856]: Positive Trust Anchors: Apr 13 20:54:26.211146 systemd-resolved[856]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 13 20:54:26.211182 systemd-resolved[856]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 13 20:54:26.247556 systemd-resolved[856]: Defaulting to hostname 'linux'. Apr 13 20:54:26.351781 systemd[1]: Started Network Name Resolution. Apr 13 20:54:26.383041 systemd[1]: Reached target Network. Apr 13 20:54:26.388635 systemd[1]: Reached target Host and Network Name Lookups. Apr 13 20:54:26.592188 systemd[1]: Started Network Time Synchronization. Apr 13 20:54:26.613033 systemd[1]: Reached target System Initialization. Apr 13 20:54:27.114777 systemd-resolved[856]: Clock change detected. Flushing caches. Apr 13 20:54:27.117433 systemd-timesyncd[858]: Initial synchronization to time server 10.0.0.1:123 (10.0.0.1). Apr 13 20:54:27.122438 systemd[1]: Started Watch for update engine configuration changes. Apr 13 20:54:27.192348 systemd[1]: Started Watch for a cloud-config at /var/lib/flatcar-install/user_data. Apr 13 20:54:27.211948 systemd[1]: Started Daily Cleanup of Temporary Directories. Apr 13 20:54:27.231883 systemd[1]: Condition check resulted in Update Engine Stub Timer being skipped. Apr 13 20:54:27.232554 systemd[1]: Reached target Path Units. Apr 13 20:54:27.240516 systemd[1]: Reached target System Time Set. Apr 13 20:54:27.322611 systemd[1]: Started Daily Log Rotation. Apr 13 20:54:27.338684 systemd[1]: Started Weekly check for MD array's redundancy information.. Apr 13 20:54:27.366615 systemd[1]: Reached target Timer Units. Apr 13 20:54:27.400283 systemd[1]: Listening on D-Bus System Message Bus Socket. Apr 13 20:54:27.584210 systemd[1]: Starting Docker Socket for the API... Apr 13 20:54:27.918611 systemd[1]: Listening on OpenSSH Server Socket. Apr 13 20:54:27.984012 systemd[1]: Listening on Docker Socket for the API. Apr 13 20:54:28.020895 systemd[1]: Reached target Socket Units. Apr 13 20:54:28.029922 systemd[1]: Reached target Basic System. Apr 13 20:54:28.048059 systemd[1]: Condition check resulted in Configure Addon /usr/share/oem being skipped. Apr 13 20:54:28.053600 systemd[1]: Condition check resulted in Run Addon /usr/share/oem being skipped. Apr 13 20:54:28.211514 systemd[1]: Started D-Bus System Message Bus. Apr 13 20:54:28.300983 systemd[1]: Starting Extend Filesystems... Apr 13 20:54:28.306338 systemd[1]: Condition check resulted in Modifies /etc/environment for CoreOS being skipped. Apr 13 20:54:28.326733 systemd[1]: Starting format-var-lib-docker.service... Apr 13 20:54:28.417749 systemd[1]: Starting Generate /run/flatcar/motd... Apr 13 20:54:28.430431 systemd[1]: Starting Install an ssh key from /proc/cmdline... Apr 13 20:54:28.438419 extend-filesystems[879]: Found sr0 Apr 13 20:54:28.438419 extend-filesystems[879]: Found vda Apr 13 20:54:28.438419 extend-filesystems[879]: Found vda1 Apr 13 20:54:28.438419 extend-filesystems[879]: Found vda2 Apr 13 20:54:28.438419 extend-filesystems[879]: Found vda3 Apr 13 20:54:28.438419 extend-filesystems[879]: Found usr Apr 13 20:54:28.438419 extend-filesystems[879]: Found vda4 Apr 13 20:54:28.438419 extend-filesystems[879]: Found vda6 Apr 13 20:54:28.438419 extend-filesystems[879]: Found vda7 Apr 13 20:54:28.438419 extend-filesystems[879]: Found vda9 Apr 13 20:54:28.438419 extend-filesystems[879]: Checking size of /dev/vda9 Apr 13 20:54:28.447086 systemd[1]: Starting Generate sshd host keys... Apr 13 20:54:28.455507 systemd[1]: Condition check resulted in Load cloud-config from /usr/share/oem/cloud-config.yml being skipped. Apr 13 20:54:28.455627 systemd[1]: Reached target Load system-provided cloud configs. Apr 13 20:54:28.521731 systemd[1]: Starting User Login Management... Apr 13 20:54:28.524711 systemd[1]: Condition check resulted in TCG Core Services Daemon being skipped. Apr 13 20:54:28.527011 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 13 20:54:28.528952 systemd[1]: Starting Update Engine... Apr 13 20:54:28.531524 systemd[1]: Condition check resulted in Load cloud-config from url defined in /proc/cmdline being skipped. Apr 13 20:54:28.533978 systemd[1]: Reached target Load user-provided cloud configs. Apr 13 20:54:28.563712 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 13 20:54:28.565255 systemd[1]: Finished Install an ssh key from /proc/cmdline. Apr 13 20:54:28.590912 systemd[1]: motdgen.service: Deactivated successfully. Apr 13 20:54:28.591211 systemd[1]: Finished Generate /run/flatcar/motd. Apr 13 20:54:28.627037 extend-filesystems[879]: Old size kept for /dev/vda9 Apr 13 20:54:28.644404 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 13 20:54:28.648751 systemd[1]: Finished Extend Filesystems. Apr 13 20:54:28.827527 systemd-logind[892]: Watching system buttons on /dev/input/event1 (Power Button) Apr 13 20:54:28.834595 systemd-logind[892]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Apr 13 20:54:28.837164 systemd-logind[892]: New seat seat0. Apr 13 20:54:28.848940 mkfs.btrfs[898]: btrfs-progs v4.19 Apr 13 20:54:28.848940 mkfs.btrfs[898]: See http://btrfs.wiki.kernel.org for more information. Apr 13 20:54:28.848940 mkfs.btrfs[898]: Label: (null) Apr 13 20:54:28.848940 mkfs.btrfs[898]: UUID: 74d60032-2ba4-46bf-af81-c57cc5ca26e2 Apr 13 20:54:28.848940 mkfs.btrfs[898]: Node size: 16384 Apr 13 20:54:28.848940 mkfs.btrfs[898]: Sector size: 4096 Apr 13 20:54:28.848940 mkfs.btrfs[898]: Filesystem size: 25.00GiB Apr 13 20:54:28.848940 mkfs.btrfs[898]: Block group profiles: Apr 13 20:54:28.848940 mkfs.btrfs[898]: Data: single 8.00MiB Apr 13 20:54:28.848940 mkfs.btrfs[898]: Metadata: DUP 1.00GiB Apr 13 20:54:28.848940 mkfs.btrfs[898]: System: DUP 8.00MiB Apr 13 20:54:28.848940 mkfs.btrfs[898]: SSD detected: no Apr 13 20:54:28.848940 mkfs.btrfs[898]: Incompat features: extref, skinny-metadata Apr 13 20:54:28.848940 mkfs.btrfs[898]: Number of devices: 1 Apr 13 20:54:28.848940 mkfs.btrfs[898]: Devices: Apr 13 20:54:28.848940 mkfs.btrfs[898]: ID SIZE PATH Apr 13 20:54:28.848940 mkfs.btrfs[898]: 1 25.00GiB /var/lib/docker.btrfs Apr 13 20:54:28.850726 systemd[1]: format-var-lib-docker.service: Deactivated successfully. Apr 13 20:54:28.852653 systemd[1]: Finished format-var-lib-docker.service. Apr 13 20:54:28.900911 systemd[1]: Started User Login Management. Apr 13 20:54:29.095910 update_engine[896]: I0413 20:54:29.093371 896 main.cc:89] Flatcar Update Engine starting Apr 13 20:54:29.118028 systemd[1]: Started Update Engine. Apr 13 20:54:29.122171 update_engine[896]: I0413 20:54:29.118958 896 update_check_scheduler.cc:74] Next update check in 6m58s Apr 13 20:54:29.736638 sshd_keygen[897]: ssh-keygen: generating new host keys: RSA DSA ECDSA ED25519 Apr 13 20:54:29.744707 systemd[1]: Started Cluster reboot manager. Apr 13 20:54:29.931849 systemd[1]: Finished Generate sshd host keys. Apr 13 20:54:30.011731 systemd[1]: Starting Generate /run/issue... Apr 13 20:54:30.129396 systemd[1]: issuegen.service: Deactivated successfully. Apr 13 20:54:30.129778 systemd[1]: Finished Generate /run/issue. Apr 13 20:54:30.245268 systemd[1]: Starting Permit User Sessions... Apr 13 20:54:30.730025 systemd[1]: Finished Permit User Sessions. Apr 13 20:54:30.889615 systemd[1]: Started Getty on tty1. Apr 13 20:54:30.891682 locksmithd[918]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 13 20:54:31.179623 systemd[1]: Started Serial Getty on ttyS0. Apr 13 20:54:31.197736 systemd[1]: Reached target Login Prompts. Apr 13 20:54:31.215512 systemd[1]: Reached target Multi-User System. Apr 13 20:54:31.800720 systemd[1]: Starting Record Runlevel Change in UTMP... Apr 13 20:54:33.909647 systemd[1]: Created slice Slice /system/sshd. Apr 13 20:54:34.098761 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:38806). Apr 13 20:54:34.130310 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 13 20:54:34.149640 systemd[1]: Finished Record Runlevel Change in UTMP. Apr 13 20:54:34.183328 systemd[1]: Startup finished in 3.755s (kernel) + 16.284s (initrd) + 2min 26.651s (userspace) = 2min 46.690s. Apr 13 20:54:42.625260 sshd[941]: Accepted publickey for core from 10.0.0.1 port 38806 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 20:54:43.265559 sshd[941]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 20:54:47.178610 systemd[1]: Created slice User Slice of UID 500. Apr 13 20:54:47.247080 systemd[1]: Starting User Runtime Directory /run/user/500... Apr 13 20:54:47.391612 systemd-logind[892]: New session 1 of user core. Apr 13 20:54:48.502587 systemd[1]: Finished User Runtime Directory /run/user/500. Apr 13 20:54:48.956622 systemd[1]: Starting User Manager for UID 500... Apr 13 20:54:52.034136 systemd[944]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 13 20:55:14.532976 update_engine[896]: I0413 20:55:14.523200 896 update_attempter.cc:505] Updating boot flags... Apr 13 20:55:14.998707 systemd[944]: Queued start job for default target Main User Target. Apr 13 20:55:14.999315 systemd[944]: Reached target Paths. Apr 13 20:55:14.999332 systemd[944]: Reached target Sockets. Apr 13 20:55:14.999346 systemd[944]: Reached target Timers. Apr 13 20:55:14.999358 systemd[944]: Reached target Basic System. Apr 13 20:55:14.999428 systemd[944]: Reached target Main User Target. Apr 13 20:55:14.999446 systemd[944]: Startup finished in 20.142s. Apr 13 20:55:14.999571 systemd[1]: Started User Manager for UID 500. Apr 13 20:55:15.011605 systemd[1]: Started Session 1 of User core. Apr 13 20:55:17.283230 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:48234). Apr 13 20:55:21.253276 sshd[968]: Accepted publickey for core from 10.0.0.1 port 48234 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 20:55:21.417158 sshd[968]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 20:55:23.116740 systemd-logind[892]: New session 2 of user core. Apr 13 20:55:23.252101 systemd[1]: Started Session 2 of User core. Apr 13 20:55:26.825193 sshd[968]: pam_unix(sshd:session): session closed for user core Apr 13 20:55:27.128599 systemd[1]: sshd@1-10.0.0.3:22-10.0.0.1:48234.service: Deactivated successfully. Apr 13 20:55:27.136274 systemd[1]: sshd@1-10.0.0.3:22-10.0.0.1:48234.service: Consumed 2.054s CPU time. Apr 13 20:55:27.190706 systemd[1]: session-2.scope: Deactivated successfully. Apr 13 20:55:27.394432 systemd-logind[892]: Session 2 logged out. Waiting for processes to exit. Apr 13 20:55:27.493706 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:51778). Apr 13 20:55:27.515522 systemd-logind[892]: Removed session 2. Apr 13 20:55:30.526994 sshd[974]: Accepted publickey for core from 10.0.0.1 port 51778 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 20:55:30.752541 sshd[974]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 20:55:31.841658 systemd-logind[892]: New session 3 of user core. Apr 13 20:55:31.890592 systemd[1]: Started Session 3 of User core. Apr 13 20:55:35.206743 sshd[974]: pam_unix(sshd:session): session closed for user core Apr 13 20:55:35.543139 systemd[1]: sshd@2-10.0.0.3:22-10.0.0.1:51778.service: Deactivated successfully. Apr 13 20:55:35.557277 systemd[1]: sshd@2-10.0.0.3:22-10.0.0.1:51778.service: Consumed 1.635s CPU time. Apr 13 20:55:35.613272 systemd[1]: session-3.scope: Deactivated successfully. Apr 13 20:55:36.003640 systemd-logind[892]: Session 3 logged out. Waiting for processes to exit. Apr 13 20:55:36.619814 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:50472). Apr 13 20:55:36.654935 systemd-logind[892]: Removed session 3. Apr 13 20:55:45.502320 sshd[980]: Accepted publickey for core from 10.0.0.1 port 50472 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 20:55:46.154885 sshd[980]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 20:55:49.544746 systemd-logind[892]: New session 4 of user core. Apr 13 20:55:49.670783 systemd[1]: Started Session 4 of User core. Apr 13 20:55:57.614865 sshd[980]: pam_unix(sshd:session): session closed for user core Apr 13 20:55:57.677368 systemd[1]: sshd@3-10.0.0.3:22-10.0.0.1:50472.service: Deactivated successfully. Apr 13 20:55:57.682445 systemd[1]: sshd@3-10.0.0.3:22-10.0.0.1:50472.service: Consumed 3.412s CPU time. Apr 13 20:55:57.741328 systemd[1]: session-4.scope: Deactivated successfully. Apr 13 20:55:57.791762 systemd[1]: session-4.scope: Consumed 2.965s CPU time. Apr 13 20:55:57.847730 systemd-logind[892]: Session 4 logged out. Waiting for processes to exit. Apr 13 20:55:57.951438 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:47452). Apr 13 20:55:58.011134 systemd-logind[892]: Removed session 4. Apr 13 20:56:00.228659 sshd[986]: Accepted publickey for core from 10.0.0.1 port 47452 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 20:56:00.413886 sshd[986]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 20:56:01.156998 systemd-logind[892]: New session 5 of user core. Apr 13 20:56:01.219596 systemd[1]: Started Session 5 of User core. Apr 13 20:56:06.037628 sudo[989]: core : PWD=/home/core ; USER=root ; COMMAND=/sbin/setenforce 1 Apr 13 20:56:06.050508 sudo[989]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 13 20:56:06.512904 sudo[989]: pam_unix(sudo:session): session closed for user root Apr 13 20:56:06.544221 sshd[986]: pam_unix(sshd:session): session closed for user core Apr 13 20:56:07.153155 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:42820). Apr 13 20:56:07.335163 dbus-daemon[878]: [system] Reloaded configuration Apr 13 20:56:07.435358 systemd[1]: sshd@4-10.0.0.3:22-10.0.0.1:47452.service: Deactivated successfully. Apr 13 20:56:07.437629 systemd[1]: sshd@4-10.0.0.3:22-10.0.0.1:47452.service: Consumed 1.354s CPU time. Apr 13 20:56:07.442358 systemd[1]: session-5.scope: Deactivated successfully. Apr 13 20:56:07.450111 systemd[1]: session-5.scope: Consumed 1.837s CPU time. Apr 13 20:56:07.458583 systemd-logind[892]: Session 5 logged out. Waiting for processes to exit. Apr 13 20:56:07.505934 systemd-logind[892]: Removed session 5. Apr 13 20:56:07.515320 sshd[992]: Accepted publickey for core from 10.0.0.1 port 42820 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 20:56:07.639455 sshd[992]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 20:56:08.583179 systemd-logind[892]: New session 6 of user core. Apr 13 20:56:08.604658 systemd[1]: Started Session 6 of User core. Apr 13 20:56:10.554643 sudo[997]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 13 20:56:10.583754 sudo[997]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 13 20:56:11.070619 sudo[997]: pam_unix(sudo:session): session closed for user root Apr 13 20:56:11.908539 sudo[996]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/systemctl restart audit-rules Apr 13 20:56:11.909476 sudo[996]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 13 20:56:13.978695 systemd[1]: Stopping Load Security Auditing Rules... Apr 13 20:56:13.986000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 13 20:56:13.999579 kernel: audit: type=1305 audit(1776113773.986:161): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 13 20:56:14.000374 auditctl[1000]: No rules Apr 13 20:56:14.024631 systemd[1]: audit-rules.service: Deactivated successfully. Apr 13 20:56:14.041414 systemd[1]: Stopped Load Security Auditing Rules. Apr 13 20:56:14.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:56:14.064081 kernel: audit: type=1131 audit(1776113774.043:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:56:14.497733 systemd[1]: Starting Load Security Auditing Rules... Apr 13 20:56:17.653448 augenrules[1017]: No rules Apr 13 20:56:17.742777 systemd[1]: Finished Load Security Auditing Rules. Apr 13 20:56:17.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:56:17.786989 kernel: audit: type=1130 audit(1776113777.755:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:56:17.796947 sudo[996]: pam_unix(sudo:session): session closed for user root Apr 13 20:56:17.799000 audit[996]: USER_END pid=996 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 13 20:56:17.805000 audit[996]: CRED_DISP pid=996 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 13 20:56:17.823540 kernel: audit: type=1106 audit(1776113777.799:164): pid=996 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 13 20:56:17.832492 kernel: audit: type=1104 audit(1776113777.805:165): pid=996 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 13 20:56:17.906766 sshd[992]: pam_unix(sshd:session): session closed for user core Apr 13 20:56:17.995000 audit[992]: USER_END pid=992 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 20:56:17.995000 audit[992]: CRED_DISP pid=992 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 20:56:18.020593 kernel: audit: type=1106 audit(1776113777.995:166): pid=992 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 20:56:18.027147 kernel: audit: type=1104 audit(1776113777.995:167): pid=992 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 20:56:18.038080 systemd[1]: sshd@5-10.0.0.3:22-10.0.0.1:42820.service: Deactivated successfully. Apr 13 20:56:18.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.3:22-10.0.0.1:42820 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:56:18.055879 kernel: audit: type=1131 audit(1776113778.042:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.3:22-10.0.0.1:42820 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:56:18.099448 systemd[1]: session-6.scope: Deactivated successfully. Apr 13 20:56:18.125488 systemd[1]: session-6.scope: Consumed 2.232s CPU time. Apr 13 20:56:18.151329 systemd-logind[892]: Session 6 logged out. Waiting for processes to exit. Apr 13 20:56:18.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.3:22-10.0.0.1:58598 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:56:18.210362 kernel: audit: type=1130 audit(1776113778.194:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.3:22-10.0.0.1:58598 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 20:56:18.194972 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:58598). Apr 13 20:56:18.249100 systemd-logind[892]: Removed session 6. Apr 13 20:56:21.481000 audit[1023]: USER_ACCT pid=1023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 20:56:21.507778 kernel: audit: type=1101 audit(1776113781.481:170): pid=1023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 20:56:21.519475 sshd[1023]: Accepted publickey for core from 10.0.0.1 port 58598 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 20:56:21.533000 audit[1023]: CRED_ACQ pid=1023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 20:56:21.535042 sshd[1023]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 20:56:21.553375 kernel: audit: type=1103 audit(1776113781.533:171): pid=1023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 20:56:21.592268 kernel: audit: type=1006 audit(1776113781.533:172): pid=1023 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=7 res=1 Apr 13 20:56:24.599429 systemd-logind[892]: New session 7 of user core. Apr 13 20:56:24.686714 systemd[1]: Started Session 7 of User core. Apr 13 20:56:30.352000 audit[1023]: USER_START pid=1023 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 20:56:30.421496 kernel: audit: type=1105 audit(1776113790.352:173): pid=1023 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 20:56:30.835000 audit[1025]: CRED_ACQ pid=1025 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 20:56:30.852582 kernel: audit: type=1103 audit(1776113790.835:174): pid=1025 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 20:56:35.336000 audit[1026]: USER_ACCT pid=1026 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 13 20:56:35.415537 kernel: audit: type=1101 audit(1776113795.336:175): pid=1026 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 13 20:56:35.382064 sudo[1026]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/bash -c cat >/etc/coreos/update.conf.new </etc/coreos/update-payload-key.pub.pem < Apr 13 21:02:56.457223 update_engine[1150]: Apr 13 21:02:56.457223 update_engine[1150]: Apr 13 21:02:56.457223 update_engine[1150]: Apr 13 21:02:56.457223 update_engine[1150]: Apr 13 21:02:56.457223 update_engine[1150]: Apr 13 21:02:56.457223 update_engine[1150]: Apr 13 21:02:56.457223 update_engine[1150]: Apr 13 21:02:56.457223 update_engine[1150]: Apr 13 21:02:56.457223 update_engine[1150]: I0413 21:02:56.438117 1150 libcurl_http_fetcher.cc:48] Starting/Resuming transfer Apr 13 21:02:56.512195 sshd[1500]: pam_unix(sshd:session): session closed for user core Apr 13 21:02:56.518719 update_engine[1150]: I0413 21:02:56.518000 1150 libcurl_http_fetcher.cc:152] Setting up curl options for HTTP Apr 13 21:02:56.518719 update_engine[1150]: I0413 21:02:56.518657 1150 libcurl_http_fetcher.cc:435] Setting up timeout source: 1 seconds. Apr 13 21:02:56.634876 update_engine[1150]: I0413 21:02:56.634603 1150 libcurl_http_fetcher.cc:248] HTTP response code: 200 Apr 13 21:02:56.635351 update_engine[1150]: I0413 21:02:56.635272 1150 libcurl_http_fetcher.cc:305] Transfer completed (200), 791 bytes downloaded Apr 13 21:02:56.635351 update_engine[1150]: I0413 21:02:56.635290 1150 omaha_request_action.cc:619] Omaha request response: Apr 13 21:02:56.635351 update_engine[1150]: Apr 13 21:02:56.635351 update_engine[1150]: Apr 13 21:02:56.635351 update_engine[1150]: Apr 13 21:02:56.635351 update_engine[1150]: Apr 13 21:02:56.635351 update_engine[1150]: Apr 13 21:02:56.635351 update_engine[1150]: Apr 13 21:02:56.635351 update_engine[1150]: Apr 13 21:02:56.635351 update_engine[1150]: Apr 13 21:02:56.635351 update_engine[1150]: Apr 13 21:02:56.635351 update_engine[1150]: Apr 13 21:02:56.635351 update_engine[1150]: Apr 13 21:02:56.635351 update_engine[1150]: Apr 13 21:02:56.635351 update_engine[1150]: Apr 13 21:02:56.635351 update_engine[1150]: Apr 13 21:02:56.635351 update_engine[1150]: Apr 13 21:02:56.635351 update_engine[1150]: Apr 13 21:02:56.635351 update_engine[1150]: Apr 13 21:02:56.635351 update_engine[1150]: Apr 13 21:02:56.635351 update_engine[1150]: Apr 13 21:02:56.635351 update_engine[1150]: Apr 13 21:02:56.634000 audit[1500]: USER_END pid=1500 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:02:56.653228 kernel: audit: type=1106 audit(1776114176.634:548): pid=1500 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:02:56.657979 kernel: audit: type=1104 audit(1776114176.634:549): pid=1500 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:02:56.634000 audit[1500]: CRED_DISP pid=1500 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:02:56.725550 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:49630). Apr 13 21:02:56.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.3:22-10.0.0.1:49630 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:02:56.737225 update_engine[1150]: I0413 21:02:56.731765 1150 omaha_request_action.cc:447] Omaha Response manifest version = Apr 13 21:02:56.737225 update_engine[1150]: I0413 21:02:56.731921 1150 omaha_request_action.cc:470] Found 1 url(s) Apr 13 21:02:56.737225 update_engine[1150]: I0413 21:02:56.731936 1150 omaha_request_action.cc:506] Processing first of 1 package(s) Apr 13 21:02:56.737225 update_engine[1150]: I0413 21:02:56.731940 1150 omaha_request_action.cc:513] Omaha Response package name = update.gz Apr 13 21:02:56.737225 update_engine[1150]: I0413 21:02:56.731945 1150 omaha_request_action.cc:529] Url0: http://10.0.0.2:34567/packages/update.gz Apr 13 21:02:56.737225 update_engine[1150]: I0413 21:02:56.731951 1150 omaha_request_action.cc:541] Payload size = 507403528 bytes Apr 13 21:02:56.737225 update_engine[1150]: I0413 21:02:56.731963 1150 omaha_request_action.cc:565] Found 1 action(s). Processing the postinstall action. Apr 13 21:02:56.737225 update_engine[1150]: I0413 21:02:56.731977 1150 payload_state.cc:51] Resetting all persisted state as this is a new response Apr 13 21:02:56.737225 update_engine[1150]: I0413 21:02:56.731982 1150 payload_state.cc:360] Current Response Signature = Apr 13 21:02:56.737225 update_engine[1150]: NumURLs = 1 Apr 13 21:02:56.737225 update_engine[1150]: Url0 = http://10.0.0.2:34567/packages/update.gz Apr 13 21:02:56.737225 update_engine[1150]: Payload Size = 507403528 Apr 13 21:02:56.737225 update_engine[1150]: Payload Sha256 Hash = EavLG76K1QSxSOWEIFaClhdZVnpkdrvlK+26+IjCyh4= Apr 13 21:02:56.737225 update_engine[1150]: Is Delta Payload = 0 Apr 13 21:02:56.737225 update_engine[1150]: Max Failure Count Per Url = 10 Apr 13 21:02:56.737225 update_engine[1150]: Disable Payload Backoff = 1 Apr 13 21:02:56.737225 update_engine[1150]: I0413 21:02:56.732223 1150 payload_state.cc:381] Payload Attempt Number = 0 Apr 13 21:02:56.799917 kernel: audit: type=1130 audit(1776114176.731:550): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.3:22-10.0.0.1:49630 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:02:56.799954 kernel: audit: type=1131 audit(1776114176.742:551): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.3:22-10.0.0.1:40800 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:02:56.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.3:22-10.0.0.1:40800 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:02:56.800182 update_engine[1150]: I0413 21:02:56.739737 1150 payload_state.cc:404] Current URL Index = 0 Apr 13 21:02:56.800182 update_engine[1150]: I0413 21:02:56.740769 1150 payload_state.cc:425] Current URL (Url0)'s Failure Count = 0 Apr 13 21:02:56.800182 update_engine[1150]: I0413 21:02:56.742549 1150 payload_state.cc:287] Resetting backoff expiry time as payload backoff is disabled Apr 13 21:02:56.800182 update_engine[1150]: I0413 21:02:56.742689 1150 payload_state.cc:452] Backoff Expiry Time = 01/01/70 00:00:00 UTC Apr 13 21:02:56.800182 update_engine[1150]: I0413 21:02:56.742755 1150 payload_state.cc:203] Payload backoff logic is disabled. Can proceed with the download Apr 13 21:02:56.800182 update_engine[1150]: I0413 21:02:56.742946 1150 action_processor.cc:82] ActionProcessor::ActionComplete: finished OmahaRequestAction, starting OmahaResponseHandlerAction Apr 13 21:02:56.800182 update_engine[1150]: I0413 21:02:56.743034 1150 omaha_response_handler_action.cc:43] Using Url0 as the download url this time Apr 13 21:02:56.800182 update_engine[1150]: I0413 21:02:56.743078 1150 prefs.cc:51] update-state-next-operation not present in /var/lib/update_engine/prefs Apr 13 21:02:56.800182 update_engine[1150]: E0413 21:02:56.743083 1150 payload_processor.cc:488] prefs->GetInt64(kPrefsUpdateStateNextOperation, &next_operation) && next_operation != kUpdateStateOperationInvalid && next_operation > 0 failed. Apr 13 21:02:56.742507 systemd[1]: sshd@17-10.0.0.3:22-10.0.0.1:40800.service: Deactivated successfully. Apr 13 21:02:56.743162 systemd[1]: sshd@17-10.0.0.3:22-10.0.0.1:40800.service: Consumed 2.739s CPU time. Apr 13 21:02:56.750946 systemd[1]: session-18.scope: Deactivated successfully. Apr 13 21:02:56.761884 systemd[1]: session-18.scope: Consumed 10.195s CPU time. Apr 13 21:02:56.800266 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1150 (update_engine) Apr 13 21:02:56.800274 systemd-logind[1133]: Session 18 logged out. Waiting for processes to exit. Apr 13 21:02:56.858015 systemd[1]: Starting File System Check on /dev/disk/by-label/EFI-SYSTEM... Apr 13 21:02:56.927303 systemd-logind[1133]: Removed session 18. Apr 13 21:02:58.418000 audit[1505]: USER_ACCT pid=1505 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:02:58.439492 kernel: audit: type=1101 audit(1776114178.418:552): pid=1505 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:02:58.444758 sshd[1505]: Accepted publickey for core from 10.0.0.1 port 49630 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 21:02:58.490000 audit[1505]: CRED_ACQ pid=1505 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:02:58.503730 kernel: audit: type=1103 audit(1776114178.490:553): pid=1505 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:02:58.510880 kernel: audit: type=1006 audit(1776114178.502:554): pid=1505 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Apr 13 21:02:58.512521 sshd[1505]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 21:02:58.544882 systemd-fsck[1510]: fsck.fat 4.1 (2017-01-24) Apr 13 21:02:58.544882 systemd-fsck[1510]: /dev/vda1: 789 files, 107808/258078 clusters Apr 13 21:02:58.604647 systemd[1]: Finished File System Check on /dev/disk/by-label/EFI-SYSTEM. Apr 13 21:02:58.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:02:58.630361 kernel: audit: type=1130 audit(1776114178.615:555): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:02:58.670171 systemd[1]: Mounting Boot partition... Apr 13 21:02:58.748502 systemd-logind[1133]: New session 19 of user core. Apr 13 21:02:59.523648 systemd[1]: Mounted Boot partition. Apr 13 21:02:59.623998 update_engine[1150]: I0413 21:02:59.623773 1150 omaha_response_handler_action.cc:85] Using this install plan: Apr 13 21:02:59.623998 update_engine[1150]: I0413 21:02:59.623909 1150 install_plan.cc:53] InstallPlan: , new_update, url: http://10.0.0.2:34567/packages/update.gz, payload size: 507403528, payload hash: EavLG76K1QSxSOWEIFaClhdZVnpkdrvlK+26+IjCyh4=, partition_path: /dev/vda4, kernel_path: /boot/flatcar/vmlinuz-b, pcr_policy_path: /var/lib/update_engine/pcrs-b.zip, old_partition_path: /dev/vda3, old_kernel_path: /boot/flatcar/vmlinuz-a Apr 13 21:02:59.626599 update_engine[1150]: I0413 21:02:59.625762 1150 action_processor.cc:82] ActionProcessor::ActionComplete: finished OmahaResponseHandlerAction, starting FilesystemCopierAction Apr 13 21:02:59.723744 update_engine[1150]: I0413 21:02:59.723395 1150 filesystem_copier_action.cc:296] Filesystem size: 1073741824 Apr 13 21:02:59.778385 systemd[1]: Started Session 19 of User core. Apr 13 21:03:00.335000 audit[1505]: USER_START pid=1505 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:00.354978 kernel: audit: type=1105 audit(1776114180.335:556): pid=1505 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:00.511000 audit[1515]: CRED_ACQ pid=1515 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:00.530454 kernel: audit: type=1103 audit(1776114180.511:557): pid=1515 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:01.646892 sshd[1505]: pam_unix(sshd:session): session closed for user core Apr 13 21:03:01.846000 audit[1505]: USER_END pid=1505 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:01.878189 kernel: audit: type=1106 audit(1776114181.846:558): pid=1505 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:01.879080 kernel: audit: type=1104 audit(1776114181.869:559): pid=1505 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:01.869000 audit[1505]: CRED_DISP pid=1505 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:01.903100 systemd[1]: sshd@18-10.0.0.3:22-10.0.0.1:49630.service: Deactivated successfully. Apr 13 21:03:01.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.3:22-10.0.0.1:49630 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:03:01.939599 kernel: audit: type=1131 audit(1776114181.914:560): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.3:22-10.0.0.1:49630 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:03:01.971644 systemd[1]: session-19.scope: Deactivated successfully. Apr 13 21:03:02.035243 systemd-logind[1133]: Session 19 logged out. Waiting for processes to exit. Apr 13 21:03:02.246662 systemd-logind[1133]: Removed session 19. Apr 13 21:03:11.951879 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:52004). Apr 13 21:03:11.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.3:22-10.0.0.1:52004 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:03:11.976536 kernel: audit: type=1130 audit(1776114191.960:561): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.3:22-10.0.0.1:52004 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:03:13.727000 audit[1521]: USER_ACCT pid=1521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:13.738542 sshd[1521]: Accepted publickey for core from 10.0.0.1 port 52004 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 21:03:13.750902 kernel: audit: type=1101 audit(1776114193.727:562): pid=1521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:13.750000 audit[1521]: CRED_ACQ pid=1521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:13.752033 sshd[1521]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 21:03:13.793501 kernel: audit: type=1103 audit(1776114193.750:563): pid=1521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:13.800777 kernel: audit: type=1006 audit(1776114193.750:564): pid=1521 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Apr 13 21:03:14.059386 systemd-logind[1133]: New session 20 of user core. Apr 13 21:03:14.108735 systemd[1]: Started Session 20 of User core. Apr 13 21:03:14.759000 audit[1521]: USER_START pid=1521 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:14.811040 kernel: audit: type=1105 audit(1776114194.759:565): pid=1521 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:14.828000 audit[1523]: CRED_ACQ pid=1523 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:14.862981 kernel: audit: type=1103 audit(1776114194.828:566): pid=1523 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:15.703738 sshd[1521]: pam_unix(sshd:session): session closed for user core Apr 13 21:03:15.865000 audit[1521]: USER_END pid=1521 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:15.886014 kernel: audit: type=1106 audit(1776114195.865:567): pid=1521 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:15.888684 kernel: audit: type=1104 audit(1776114195.881:568): pid=1521 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:15.881000 audit[1521]: CRED_DISP pid=1521 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:16.049734 systemd[1]: sshd@19-10.0.0.3:22-10.0.0.1:52004.service: Deactivated successfully. Apr 13 21:03:16.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.3:22-10.0.0.1:52004 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:03:16.105929 kernel: audit: type=1131 audit(1776114196.080:569): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.3:22-10.0.0.1:52004 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:03:16.089661 systemd[1]: sshd@19-10.0.0.3:22-10.0.0.1:52004.service: Consumed 1.107s CPU time. Apr 13 21:03:16.116704 systemd[1]: session-20.scope: Deactivated successfully. Apr 13 21:03:16.164738 systemd-logind[1133]: Session 20 logged out. Waiting for processes to exit. Apr 13 21:03:16.241166 systemd-logind[1133]: Removed session 20. Apr 13 21:03:26.141708 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:50396). Apr 13 21:03:26.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.3:22-10.0.0.1:50396 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:03:26.177507 kernel: audit: type=1130 audit(1776114206.150:570): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.3:22-10.0.0.1:50396 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:03:27.910000 audit[1530]: USER_ACCT pid=1530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:27.918430 sshd[1530]: Accepted publickey for core from 10.0.0.1 port 50396 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 21:03:27.928019 kernel: audit: type=1101 audit(1776114207.910:571): pid=1530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:27.944000 audit[1530]: CRED_ACQ pid=1530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:27.962177 kernel: audit: type=1103 audit(1776114207.944:572): pid=1530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:27.978082 kernel: audit: type=1006 audit(1776114207.948:573): pid=1530 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Apr 13 21:03:27.978696 sshd[1530]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 21:03:28.331561 systemd-logind[1133]: New session 21 of user core. Apr 13 21:03:28.397493 systemd[1]: Started Session 21 of User core. Apr 13 21:03:29.145000 audit[1530]: USER_START pid=1530 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:29.185956 kernel: audit: type=1105 audit(1776114209.145:574): pid=1530 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:29.247000 audit[1532]: CRED_ACQ pid=1532 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:29.269494 kernel: audit: type=1103 audit(1776114209.247:575): pid=1532 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:30.158755 sshd[1530]: pam_unix(sshd:session): session closed for user core Apr 13 21:03:30.351000 audit[1530]: USER_END pid=1530 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:30.388675 kernel: audit: type=1106 audit(1776114210.351:576): pid=1530 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:30.406993 kernel: audit: type=1104 audit(1776114210.387:577): pid=1530 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:30.387000 audit[1530]: CRED_DISP pid=1530 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:30.448968 systemd[1]: sshd@20-10.0.0.3:22-10.0.0.1:50396.service: Deactivated successfully. Apr 13 21:03:30.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.3:22-10.0.0.1:50396 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:03:30.463428 systemd[1]: sshd@20-10.0.0.3:22-10.0.0.1:50396.service: Consumed 1.084s CPU time. Apr 13 21:03:30.502317 kernel: audit: type=1131 audit(1776114210.458:578): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.3:22-10.0.0.1:50396 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:03:30.503106 systemd[1]: session-21.scope: Deactivated successfully. Apr 13 21:03:30.552706 systemd-logind[1133]: Session 21 logged out. Waiting for processes to exit. Apr 13 21:03:30.554491 systemd-logind[1133]: Removed session 21. Apr 13 21:03:40.759731 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:38290). Apr 13 21:03:40.842466 kernel: audit: type=1130 audit(1776114220.759:579): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.3:22-10.0.0.1:38290 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:03:40.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.3:22-10.0.0.1:38290 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:03:43.044000 audit[1538]: USER_ACCT pid=1538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:43.051838 sshd[1538]: Accepted publickey for core from 10.0.0.1 port 38290 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 21:03:43.079911 kernel: audit: type=1101 audit(1776114223.044:580): pid=1538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:43.092000 audit[1538]: CRED_ACQ pid=1538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:43.114969 kernel: audit: type=1103 audit(1776114223.092:581): pid=1538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:43.117111 kernel: audit: type=1006 audit(1776114223.092:582): pid=1538 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Apr 13 21:03:43.120608 sshd[1538]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 21:03:43.922123 systemd-logind[1133]: New session 22 of user core. Apr 13 21:03:43.963478 systemd[1]: Started Session 22 of User core. Apr 13 21:03:45.253000 audit[1538]: USER_START pid=1538 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:45.323098 kernel: audit: type=1105 audit(1776114225.253:583): pid=1538 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:45.341000 audit[1540]: CRED_ACQ pid=1540 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:45.370051 kernel: audit: type=1103 audit(1776114225.341:584): pid=1540 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:47.037167 sshd[1538]: pam_unix(sshd:session): session closed for user core Apr 13 21:03:47.184000 audit[1538]: USER_END pid=1538 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:47.209275 kernel: audit: type=1106 audit(1776114227.184:585): pid=1538 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:47.224729 kernel: audit: type=1104 audit(1776114227.208:586): pid=1538 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:47.208000 audit[1538]: CRED_DISP pid=1538 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:03:47.306300 systemd[1]: sshd@21-10.0.0.3:22-10.0.0.1:38290.service: Deactivated successfully. Apr 13 21:03:47.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.3:22-10.0.0.1:38290 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:03:47.337102 kernel: audit: type=1131 audit(1776114227.318:587): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.3:22-10.0.0.1:38290 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:03:47.323074 systemd[1]: sshd@21-10.0.0.3:22-10.0.0.1:38290.service: Consumed 1.472s CPU time. Apr 13 21:03:47.339739 systemd[1]: session-22.scope: Deactivated successfully. Apr 13 21:03:47.346123 systemd[1]: session-22.scope: Consumed 1.212s CPU time. Apr 13 21:03:47.423649 systemd-logind[1133]: Session 22 logged out. Waiting for processes to exit. Apr 13 21:03:47.531195 systemd-logind[1133]: Removed session 22. Apr 13 21:03:57.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.3:22-10.0.0.1:34808 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:03:57.710709 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:34808). Apr 13 21:03:57.733787 kernel: audit: type=1130 audit(1776114237.718:588): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.3:22-10.0.0.1:34808 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:04:00.062000 audit[1545]: USER_ACCT pid=1545 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:00.117316 kernel: audit: type=1101 audit(1776114240.062:589): pid=1545 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:00.125508 sshd[1545]: Accepted publickey for core from 10.0.0.1 port 34808 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 21:04:00.171635 kernel: audit: type=1103 audit(1776114240.129:590): pid=1545 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:00.206074 kernel: audit: type=1006 audit(1776114240.150:591): pid=1545 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Apr 13 21:04:00.129000 audit[1545]: CRED_ACQ pid=1545 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:00.225637 sshd[1545]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 21:04:00.797869 systemd-logind[1133]: New session 23 of user core. Apr 13 21:04:00.831387 systemd[1]: Started Session 23 of User core. Apr 13 21:04:01.948000 audit[1545]: USER_START pid=1545 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:01.993958 kernel: audit: type=1105 audit(1776114241.948:592): pid=1545 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:02.049000 audit[1547]: CRED_ACQ pid=1547 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:02.137154 kernel: audit: type=1103 audit(1776114242.049:593): pid=1547 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:04.130649 sshd[1545]: pam_unix(sshd:session): session closed for user core Apr 13 21:04:04.322000 audit[1545]: USER_END pid=1545 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:04.348304 kernel: audit: type=1106 audit(1776114244.322:594): pid=1545 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:04.353518 kernel: audit: type=1104 audit(1776114244.347:595): pid=1545 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:04.347000 audit[1545]: CRED_DISP pid=1545 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:04.419185 systemd[1]: sshd@22-10.0.0.3:22-10.0.0.1:34808.service: Deactivated successfully. Apr 13 21:04:04.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.3:22-10.0.0.1:34808 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:04:04.424104 systemd[1]: sshd@22-10.0.0.3:22-10.0.0.1:34808.service: Consumed 1.451s CPU time. Apr 13 21:04:04.432639 kernel: audit: type=1131 audit(1776114244.418:596): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.3:22-10.0.0.1:34808 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:04:04.441779 systemd[1]: session-23.scope: Deactivated successfully. Apr 13 21:04:04.460427 systemd[1]: session-23.scope: Consumed 1.362s CPU time. Apr 13 21:04:04.478660 systemd-logind[1133]: Session 23 logged out. Waiting for processes to exit. Apr 13 21:04:04.541455 systemd-logind[1133]: Removed session 23. Apr 13 21:04:14.425153 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:48844). Apr 13 21:04:14.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.3:22-10.0.0.1:48844 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:04:14.439771 kernel: audit: type=1130 audit(1776114254.426:597): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.3:22-10.0.0.1:48844 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:04:16.430000 audit[1553]: USER_ACCT pid=1553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:16.448245 kernel: audit: type=1101 audit(1776114256.430:598): pid=1553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:16.448305 sshd[1553]: Accepted publickey for core from 10.0.0.1 port 48844 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 21:04:16.474000 audit[1553]: CRED_ACQ pid=1553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:16.519091 kernel: audit: type=1103 audit(1776114256.474:599): pid=1553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:16.519863 kernel: audit: type=1006 audit(1776114256.516:600): pid=1553 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Apr 13 21:04:16.605338 sshd[1553]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 21:04:17.140366 systemd-logind[1133]: New session 24 of user core. Apr 13 21:04:17.171348 systemd[1]: Started Session 24 of User core. Apr 13 21:04:18.226000 audit[1553]: USER_START pid=1553 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:18.243453 kernel: audit: type=1105 audit(1776114258.226:601): pid=1553 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:18.330000 audit[1555]: CRED_ACQ pid=1555 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:18.344951 kernel: audit: type=1103 audit(1776114258.330:602): pid=1555 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:21.633426 sshd[1553]: pam_unix(sshd:session): session closed for user core Apr 13 21:04:21.820000 audit[1553]: USER_END pid=1553 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:21.841665 kernel: audit: type=1106 audit(1776114261.820:603): pid=1553 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:21.848396 kernel: audit: type=1104 audit(1776114261.843:604): pid=1553 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:21.843000 audit[1553]: CRED_DISP pid=1553 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:22.147024 systemd[1]: sshd@23-10.0.0.3:22-10.0.0.1:48844.service: Deactivated successfully. Apr 13 21:04:23.208987 kernel: audit: type=1131 audit(1776114262.178:605): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.3:22-10.0.0.1:48844 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:04:22.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.3:22-10.0.0.1:48844 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:04:22.216174 systemd[1]: sshd@23-10.0.0.3:22-10.0.0.1:48844.service: Consumed 1.179s CPU time. Apr 13 21:04:22.342770 systemd[1]: session-24.scope: Deactivated successfully. Apr 13 21:04:23.176215 systemd[1]: session-24.scope: Consumed 2.132s CPU time. Apr 13 21:04:23.246505 systemd-logind[1133]: Session 24 logged out. Waiting for processes to exit. Apr 13 21:04:23.443580 systemd-logind[1133]: Removed session 24. Apr 13 21:04:32.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.3:22-10.0.0.1:48384 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:04:32.406244 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:48384). Apr 13 21:04:32.420631 kernel: audit: type=1130 audit(1776114272.407:606): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.3:22-10.0.0.1:48384 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:04:38.061000 audit[1562]: USER_ACCT pid=1562 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:38.104549 kernel: audit: type=1101 audit(1776114278.061:607): pid=1562 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:38.116039 sshd[1562]: Accepted publickey for core from 10.0.0.1 port 48384 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 21:04:38.116000 audit[1562]: CRED_ACQ pid=1562 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:38.129257 kernel: audit: type=1103 audit(1776114278.116:608): pid=1562 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:38.131430 kernel: audit: type=1006 audit(1776114278.122:609): pid=1562 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Apr 13 21:04:38.132266 sshd[1562]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 21:04:39.045656 systemd-logind[1133]: New session 25 of user core. Apr 13 21:04:39.106079 systemd[1]: Started Session 25 of User core. Apr 13 21:04:40.201000 audit[1562]: USER_START pid=1562 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:40.220199 kernel: audit: type=1105 audit(1776114280.201:610): pid=1562 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:40.357000 audit[1565]: CRED_ACQ pid=1565 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:40.397374 kernel: audit: type=1103 audit(1776114280.357:611): pid=1565 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:44.603226 sshd[1562]: pam_unix(sshd:session): session closed for user core Apr 13 21:04:44.798000 audit[1562]: USER_END pid=1562 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:44.812000 audit[1562]: CRED_DISP pid=1562 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:44.828053 kernel: audit: type=1106 audit(1776114284.798:612): pid=1562 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:44.832267 kernel: audit: type=1104 audit(1776114284.812:613): pid=1562 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:45.338538 systemd[1]: sshd@24-10.0.0.3:22-10.0.0.1:48384.service: Deactivated successfully. Apr 13 21:04:45.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.3:22-10.0.0.1:48384 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:04:45.424745 kernel: audit: type=1131 audit(1776114285.345:614): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.3:22-10.0.0.1:48384 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:04:45.351625 systemd[1]: sshd@24-10.0.0.3:22-10.0.0.1:48384.service: Consumed 2.560s CPU time. Apr 13 21:04:45.446140 systemd[1]: session-25.scope: Deactivated successfully. Apr 13 21:04:45.502402 systemd[1]: session-25.scope: Consumed 2.887s CPU time. Apr 13 21:04:45.595905 systemd-logind[1133]: Session 25 logged out. Waiting for processes to exit. Apr 13 21:04:45.840587 systemd-logind[1133]: Removed session 25. Apr 13 21:04:55.239322 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:38920). Apr 13 21:04:55.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.3:22-10.0.0.1:38920 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:04:55.287977 kernel: audit: type=1130 audit(1776114295.261:615): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.3:22-10.0.0.1:38920 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:04:58.507000 audit[1570]: USER_ACCT pid=1570 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:58.539544 kernel: audit: type=1101 audit(1776114298.507:616): pid=1570 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:58.557865 sshd[1570]: Accepted publickey for core from 10.0.0.1 port 38920 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 21:04:58.622482 kernel: audit: type=1103 audit(1776114298.606:617): pid=1570 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:58.622528 kernel: audit: type=1006 audit(1776114298.621:618): pid=1570 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Apr 13 21:04:58.606000 audit[1570]: CRED_ACQ pid=1570 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:04:58.631520 sshd[1570]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 21:04:59.260436 systemd-logind[1133]: New session 26 of user core. Apr 13 21:04:59.396208 systemd[1]: Started Session 26 of User core. Apr 13 21:05:00.313000 audit[1570]: USER_START pid=1570 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:00.336899 kernel: audit: type=1105 audit(1776114300.313:619): pid=1570 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:00.418000 audit[1572]: CRED_ACQ pid=1572 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:00.441938 kernel: audit: type=1103 audit(1776114300.418:620): pid=1572 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:03.633946 sshd[1570]: pam_unix(sshd:session): session closed for user core Apr 13 21:05:03.832000 audit[1570]: USER_END pid=1570 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:03.857144 kernel: audit: type=1106 audit(1776114303.832:621): pid=1570 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:03.899696 kernel: audit: type=1104 audit(1776114303.856:622): pid=1570 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:03.856000 audit[1570]: CRED_DISP pid=1570 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:03.933544 systemd[1]: sshd@25-10.0.0.3:22-10.0.0.1:38920.service: Deactivated successfully. Apr 13 21:05:03.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.3:22-10.0.0.1:38920 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:05:03.998683 systemd[1]: sshd@25-10.0.0.3:22-10.0.0.1:38920.service: Consumed 1.740s CPU time. Apr 13 21:05:04.015380 kernel: audit: type=1131 audit(1776114303.993:623): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.3:22-10.0.0.1:38920 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:05:04.085366 systemd[1]: session-26.scope: Deactivated successfully. Apr 13 21:05:04.131715 systemd[1]: session-26.scope: Consumed 1.962s CPU time. Apr 13 21:05:04.218927 systemd-logind[1133]: Session 26 logged out. Waiting for processes to exit. Apr 13 21:05:04.409277 systemd-logind[1133]: Removed session 26. Apr 13 21:05:14.416329 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:59468). Apr 13 21:05:14.438763 kernel: audit: type=1130 audit(1776114314.415:624): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.3:22-10.0.0.1:59468 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:05:14.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.3:22-10.0.0.1:59468 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:05:17.545000 audit[1577]: USER_ACCT pid=1577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:17.585540 kernel: audit: type=1101 audit(1776114317.545:625): pid=1577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:17.594302 sshd[1577]: Accepted publickey for core from 10.0.0.1 port 59468 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 21:05:17.601000 audit[1577]: CRED_ACQ pid=1577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:17.622148 kernel: audit: type=1103 audit(1776114317.601:626): pid=1577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:17.626196 kernel: audit: type=1006 audit(1776114317.603:627): pid=1577 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Apr 13 21:05:17.626380 sshd[1577]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 21:05:18.323598 systemd-logind[1133]: New session 27 of user core. Apr 13 21:05:18.393414 systemd[1]: Started Session 27 of User core. Apr 13 21:05:19.648000 audit[1577]: USER_START pid=1577 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:19.684552 kernel: audit: type=1105 audit(1776114319.648:628): pid=1577 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:19.812000 audit[1579]: CRED_ACQ pid=1579 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:19.836491 kernel: audit: type=1103 audit(1776114319.812:629): pid=1579 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:22.304395 sshd[1577]: pam_unix(sshd:session): session closed for user core Apr 13 21:05:22.552000 audit[1577]: USER_END pid=1577 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:22.630167 kernel: audit: type=1106 audit(1776114322.552:630): pid=1577 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:22.641482 kernel: audit: type=1104 audit(1776114322.623:631): pid=1577 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:22.623000 audit[1577]: CRED_DISP pid=1577 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:22.706241 systemd[1]: sshd@26-10.0.0.3:22-10.0.0.1:59468.service: Deactivated successfully. Apr 13 21:05:22.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.3:22-10.0.0.1:59468 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:05:22.857501 kernel: audit: type=1131 audit(1776114322.837:632): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.3:22-10.0.0.1:59468 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:05:22.840259 systemd[1]: sshd@26-10.0.0.3:22-10.0.0.1:59468.service: Consumed 1.665s CPU time. Apr 13 21:05:22.936914 systemd[1]: session-27.scope: Deactivated successfully. Apr 13 21:05:22.949644 systemd[1]: session-27.scope: Consumed 1.722s CPU time. Apr 13 21:05:23.062593 systemd-logind[1133]: Session 27 logged out. Waiting for processes to exit. Apr 13 21:05:23.207764 systemd-logind[1133]: Removed session 27. Apr 13 21:05:33.623097 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:36044). Apr 13 21:05:33.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.3:22-10.0.0.1:36044 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:05:33.641283 kernel: audit: type=1130 audit(1776114333.625:633): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.3:22-10.0.0.1:36044 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:05:36.969034 kernel: audit: type=1101 audit(1776114336.952:634): pid=1584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:36.952000 audit[1584]: USER_ACCT pid=1584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:36.989444 sshd[1584]: Accepted publickey for core from 10.0.0.1 port 36044 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 21:05:37.028597 kernel: audit: type=1103 audit(1776114336.988:635): pid=1584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:37.038760 kernel: audit: type=1006 audit(1776114337.009:636): pid=1584 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Apr 13 21:05:36.988000 audit[1584]: CRED_ACQ pid=1584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:37.045134 sshd[1584]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 21:05:37.624715 systemd-logind[1133]: New session 28 of user core. Apr 13 21:05:37.700579 systemd[1]: Started Session 28 of User core. Apr 13 21:05:38.489000 audit[1584]: USER_START pid=1584 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:38.512130 kernel: audit: type=1105 audit(1776114338.489:637): pid=1584 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:38.636000 audit[1586]: CRED_ACQ pid=1586 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:38.680170 kernel: audit: type=1103 audit(1776114338.636:638): pid=1586 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:40.839388 sshd[1584]: pam_unix(sshd:session): session closed for user core Apr 13 21:05:40.891000 audit[1584]: USER_END pid=1584 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:40.902000 audit[1584]: CRED_DISP pid=1584 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:40.933490 kernel: audit: type=1106 audit(1776114340.891:639): pid=1584 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:40.944254 kernel: audit: type=1104 audit(1776114340.902:640): pid=1584 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:41.039450 systemd[1]: sshd@27-10.0.0.3:22-10.0.0.1:36044.service: Deactivated successfully. Apr 13 21:05:41.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.3:22-10.0.0.1:36044 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:05:41.135419 kernel: audit: type=1131 audit(1776114341.077:641): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.3:22-10.0.0.1:36044 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:05:41.127370 systemd[1]: sshd@27-10.0.0.3:22-10.0.0.1:36044.service: Consumed 1.721s CPU time. Apr 13 21:05:41.152323 systemd[1]: session-28.scope: Deactivated successfully. Apr 13 21:05:41.198327 systemd[1]: session-28.scope: Consumed 1.558s CPU time. Apr 13 21:05:41.430439 systemd-logind[1133]: Session 28 logged out. Waiting for processes to exit. Apr 13 21:05:41.662980 systemd-logind[1133]: Removed session 28. Apr 13 21:05:51.614988 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:60856). Apr 13 21:05:51.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.3:22-10.0.0.1:60856 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:05:51.644142 kernel: audit: type=1130 audit(1776114351.629:642): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.3:22-10.0.0.1:60856 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:05:54.663000 audit[1591]: USER_ACCT pid=1591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:54.812362 kernel: audit: type=1101 audit(1776114354.663:643): pid=1591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:54.824008 sshd[1591]: Accepted publickey for core from 10.0.0.1 port 60856 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 21:05:54.930042 kernel: audit: type=1103 audit(1776114354.863:644): pid=1591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:54.930553 kernel: audit: type=1006 audit(1776114354.883:645): pid=1591 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Apr 13 21:05:54.863000 audit[1591]: CRED_ACQ pid=1591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:54.961470 sshd[1591]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 21:05:56.323537 systemd-logind[1133]: New session 29 of user core. Apr 13 21:05:56.443278 systemd[1]: Started Session 29 of User core. Apr 13 21:05:58.529000 audit[1591]: USER_START pid=1591 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:58.549671 kernel: audit: type=1105 audit(1776114358.529:646): pid=1591 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:58.840000 audit[1593]: CRED_ACQ pid=1593 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:05:58.889110 kernel: audit: type=1103 audit(1776114358.840:647): pid=1593 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:04.331039 sshd[1591]: pam_unix(sshd:session): session closed for user core Apr 13 21:06:04.540000 audit[1591]: USER_END pid=1591 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:04.561226 kernel: audit: type=1106 audit(1776114364.540:648): pid=1591 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:04.582000 audit[1591]: CRED_DISP pid=1591 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:04.600436 kernel: audit: type=1104 audit(1776114364.582:649): pid=1591 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:05.079104 systemd[1]: sshd@28-10.0.0.3:22-10.0.0.1:60856.service: Deactivated successfully. Apr 13 21:06:05.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.3:22-10.0.0.1:60856 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:06:05.139378 kernel: audit: type=1131 audit(1776114365.125:650): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.3:22-10.0.0.1:60856 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:06:05.134231 systemd[1]: sshd@28-10.0.0.3:22-10.0.0.1:60856.service: Consumed 1.980s CPU time. Apr 13 21:06:05.234101 systemd[1]: session-29.scope: Deactivated successfully. Apr 13 21:06:05.256980 systemd[1]: session-29.scope: Consumed 3.116s CPU time. Apr 13 21:06:05.328951 systemd-logind[1133]: Session 29 logged out. Waiting for processes to exit. Apr 13 21:06:05.613119 systemd-logind[1133]: Removed session 29. Apr 13 21:06:15.698085 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:40706). Apr 13 21:06:15.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.3:22-10.0.0.1:40706 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:06:15.720853 kernel: audit: type=1130 audit(1776114375.703:651): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.3:22-10.0.0.1:40706 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:06:22.246000 audit[1598]: USER_ACCT pid=1598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:22.313765 kernel: audit: type=1101 audit(1776114382.246:652): pid=1598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:22.332298 sshd[1598]: Accepted publickey for core from 10.0.0.1 port 40706 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 21:06:22.392000 audit[1598]: CRED_ACQ pid=1598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:22.423360 kernel: audit: type=1103 audit(1776114382.392:653): pid=1598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:22.428384 kernel: audit: type=1006 audit(1776114382.422:654): pid=1598 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 Apr 13 21:06:22.607361 sshd[1598]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 21:06:24.448591 systemd-logind[1133]: New session 30 of user core. Apr 13 21:06:24.686566 systemd[1]: Started Session 30 of User core. Apr 13 21:06:27.416000 audit[1598]: USER_START pid=1598 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:27.441151 kernel: audit: type=1105 audit(1776114387.416:655): pid=1598 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:27.798000 audit[1601]: CRED_ACQ pid=1601 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:27.820510 kernel: audit: type=1103 audit(1776114387.798:656): pid=1601 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:38.149685 sshd[1598]: pam_unix(sshd:session): session closed for user core Apr 13 21:06:38.889000 audit[1598]: USER_END pid=1598 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:38.908737 kernel: clocksource: timekeeping watchdog on CPU1: kvm-clock wd-wd read-back delay of 1349995ns Apr 13 21:06:38.922509 kernel: clocksource: wd-tsc-wd read-back delay of 552995ns, clock-skew test skipped! Apr 13 21:06:38.934422 kernel: audit: type=1106 audit(1776114398.889:657): pid=1598 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:38.943887 kernel: audit: type=1104 audit(1776114398.901:658): pid=1598 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:38.901000 audit[1598]: CRED_DISP pid=1598 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:39.299328 systemd[1]: sshd@29-10.0.0.3:22-10.0.0.1:40706.service: Deactivated successfully. Apr 13 21:06:39.400573 kernel: audit: type=1131 audit(1776114399.351:659): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.3:22-10.0.0.1:40706 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:06:39.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.3:22-10.0.0.1:40706 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:06:39.357284 systemd[1]: sshd@29-10.0.0.3:22-10.0.0.1:40706.service: Consumed 3.161s CPU time. Apr 13 21:06:39.426958 systemd[1]: session-30.scope: Deactivated successfully. Apr 13 21:06:39.452304 systemd[1]: session-30.scope: Consumed 6.532s CPU time. Apr 13 21:06:39.601459 systemd-logind[1133]: Session 30 logged out. Waiting for processes to exit. Apr 13 21:06:39.814105 systemd-logind[1133]: Removed session 30. Apr 13 21:06:48.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.0.0.3:22-10.0.0.1:51794 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:06:48.911626 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:51794). Apr 13 21:06:48.938481 kernel: audit: type=1130 audit(1776114408.911:660): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.0.0.3:22-10.0.0.1:51794 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:06:48.964576 systemd[1]: Starting Cleanup of Temporary Directories... Apr 13 21:06:49.227412 systemd-tmpfiles[1607]: /usr/lib64/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 13 21:06:49.284150 systemd-tmpfiles[1607]: /usr/lib64/tmpfiles.d/systemd.conf:33: Duplicate line for path "/var/lib/systemd", ignoring. Apr 13 21:06:49.410000 audit[1606]: USER_ACCT pid=1606 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:49.427418 kernel: audit: type=1101 audit(1776114409.410:661): pid=1606 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:49.427476 sshd[1606]: Accepted publickey for core from 10.0.0.1 port 51794 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 21:06:49.483136 kernel: audit: type=1103 audit(1776114409.431:662): pid=1606 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:49.494404 kernel: audit: type=1006 audit(1776114409.431:663): pid=1606 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=31 res=1 Apr 13 21:06:49.431000 audit[1606]: CRED_ACQ pid=1606 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:49.449113 sshd[1606]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 21:06:49.839519 systemd-logind[1133]: New session 31 of user core. Apr 13 21:06:49.850653 systemd[1]: Started Session 31 of User core. Apr 13 21:06:50.001592 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Apr 13 21:06:50.035567 systemd[1]: Finished Cleanup of Temporary Directories. Apr 13 21:06:50.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:06:50.180247 kernel: audit: type=1130 audit(1776114410.119:664): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:06:50.183499 kernel: audit: type=1131 audit(1776114410.121:665): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:06:50.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:06:50.946000 audit[1606]: USER_START pid=1606 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:51.002758 kernel: audit: type=1105 audit(1776114410.946:666): pid=1606 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:51.152000 audit[1609]: CRED_ACQ pid=1609 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:51.180602 kernel: audit: type=1103 audit(1776114411.152:667): pid=1609 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:53.248252 sshd[1606]: pam_unix(sshd:session): session closed for user core Apr 13 21:06:53.426000 audit[1606]: USER_END pid=1606 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:53.442439 kernel: audit: type=1106 audit(1776114413.426:668): pid=1606 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:53.464001 kernel: audit: type=1104 audit(1776114413.442:669): pid=1606 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:53.442000 audit[1606]: CRED_DISP pid=1606 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:06:53.791566 systemd[1]: sshd@30-10.0.0.3:22-10.0.0.1:51794.service: Deactivated successfully. Apr 13 21:06:53.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.0.0.3:22-10.0.0.1:51794 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:06:53.848587 systemd[1]: session-31.scope: Deactivated successfully. Apr 13 21:06:53.916323 systemd[1]: session-31.scope: Consumed 1.340s CPU time. Apr 13 21:06:54.135518 systemd-logind[1133]: Session 31 logged out. Waiting for processes to exit. Apr 13 21:06:54.250742 systemd-logind[1133]: Removed session 31. Apr 13 21:07:04.402671 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 13 21:07:04.403416 kernel: audit: type=1130 audit(1776114424.389:671): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-10.0.0.3:22-10.0.0.1:34454 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:07:04.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-10.0.0.3:22-10.0.0.1:34454 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:07:04.388698 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:34454). Apr 13 21:07:09.927000 audit[1614]: USER_ACCT pid=1614 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:07:09.997238 kernel: audit: type=1101 audit(1776114429.927:672): pid=1614 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:07:10.005186 sshd[1614]: Accepted publickey for core from 10.0.0.1 port 34454 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 21:07:10.016606 kernel: audit: type=1103 audit(1776114430.004:673): pid=1614 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:07:10.004000 audit[1614]: CRED_ACQ pid=1614 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:07:10.026946 kernel: audit: type=1006 audit(1776114430.015:674): pid=1614 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=32 res=1 Apr 13 21:07:10.134679 sshd[1614]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 21:07:12.193693 systemd-logind[1133]: New session 32 of user core. Apr 13 21:07:12.382523 systemd[1]: Started Session 32 of User core. Apr 13 21:07:14.896000 audit[1614]: USER_START pid=1614 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:07:14.929171 kernel: audit: type=1105 audit(1776114434.896:675): pid=1614 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:07:15.129000 audit[1616]: CRED_ACQ pid=1616 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:07:15.185216 kernel: audit: type=1103 audit(1776114435.129:676): pid=1616 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:07:20.586246 sshd[1614]: pam_unix(sshd:session): session closed for user core Apr 13 21:07:20.919000 audit[1614]: USER_END pid=1614 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:07:20.978127 kernel: audit: type=1106 audit(1776114440.919:677): pid=1614 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:07:21.011218 kernel: audit: type=1104 audit(1776114440.949:678): pid=1614 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:07:20.949000 audit[1614]: CRED_DISP pid=1614 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:07:21.450664 systemd[1]: sshd@31-10.0.0.3:22-10.0.0.1:34454.service: Deactivated successfully. Apr 13 21:07:21.545567 kernel: audit: type=1131 audit(1776114441.524:679): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-10.0.0.3:22-10.0.0.1:34454 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:07:21.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-10.0.0.3:22-10.0.0.1:34454 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:07:21.537695 systemd[1]: sshd@31-10.0.0.3:22-10.0.0.1:34454.service: Consumed 3.435s CPU time. Apr 13 21:07:21.715132 systemd[1]: session-32.scope: Deactivated successfully. Apr 13 21:07:21.754213 systemd[1]: session-32.scope: Consumed 3.406s CPU time. Apr 13 21:07:21.988427 systemd-logind[1133]: Session 32 logged out. Waiting for processes to exit. Apr 13 21:07:22.190357 systemd-logind[1133]: Removed session 32. Apr 13 21:07:31.549672 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:59018). Apr 13 21:07:31.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-10.0.0.3:22-10.0.0.1:59018 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:07:31.607097 kernel: audit: type=1130 audit(1776114451.593:680): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-10.0.0.3:22-10.0.0.1:59018 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:07:37.347000 audit[1622]: USER_ACCT pid=1622 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:07:37.354743 sshd[1622]: Accepted publickey for core from 10.0.0.1 port 59018 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 21:07:37.445738 kernel: audit: type=1101 audit(1776114457.347:681): pid=1622 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:07:37.523000 audit[1622]: CRED_ACQ pid=1622 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:07:37.544277 kernel: audit: type=1103 audit(1776114457.523:682): pid=1622 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:07:37.553357 kernel: audit: type=1006 audit(1776114457.545:683): pid=1622 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=33 res=1 Apr 13 21:07:37.720769 sshd[1622]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 21:07:39.512041 systemd-logind[1133]: New session 33 of user core. Apr 13 21:07:39.640484 systemd[1]: Started Session 33 of User core. Apr 13 21:07:41.395000 audit[1622]: USER_START pid=1622 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:07:41.420211 kernel: audit: type=1105 audit(1776114461.395:684): pid=1622 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:07:41.662000 audit[1624]: CRED_ACQ pid=1624 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:07:41.726445 kernel: audit: type=1103 audit(1776114461.662:685): pid=1624 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:07:46.003606 sshd[1622]: pam_unix(sshd:session): session closed for user core Apr 13 21:07:46.242000 audit[1622]: USER_END pid=1622 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:07:46.259609 kernel: audit: type=1106 audit(1776114466.242:686): pid=1622 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:07:46.302000 audit[1622]: CRED_DISP pid=1622 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:07:46.331227 kernel: audit: type=1104 audit(1776114466.302:687): pid=1622 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:07:46.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-10.0.0.3:22-10.0.0.1:59018 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:07:46.625995 kernel: audit: type=1131 audit(1776114466.612:688): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-10.0.0.3:22-10.0.0.1:59018 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:07:46.608491 systemd[1]: sshd@32-10.0.0.3:22-10.0.0.1:59018.service: Deactivated successfully. Apr 13 21:07:46.613302 systemd[1]: sshd@32-10.0.0.3:22-10.0.0.1:59018.service: Consumed 2.802s CPU time. Apr 13 21:07:46.623510 systemd[1]: session-33.scope: Deactivated successfully. Apr 13 21:07:46.628884 systemd[1]: session-33.scope: Consumed 2.945s CPU time. Apr 13 21:07:46.632456 systemd-logind[1133]: Session 33 logged out. Waiting for processes to exit. Apr 13 21:07:46.806624 systemd-logind[1133]: Removed session 33. Apr 13 21:07:57.216233 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:57074). Apr 13 21:07:57.254566 kernel: audit: type=1130 audit(1776114477.219:689): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-10.0.0.3:22-10.0.0.1:57074 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:07:57.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-10.0.0.3:22-10.0.0.1:57074 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:08:00.796000 audit[1630]: USER_ACCT pid=1630 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:00.816950 kernel: audit: type=1101 audit(1776114480.796:690): pid=1630 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:00.828181 sshd[1630]: Accepted publickey for core from 10.0.0.1 port 57074 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 21:08:00.852000 audit[1630]: CRED_ACQ pid=1630 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:00.906518 kernel: audit: type=1103 audit(1776114480.852:691): pid=1630 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:00.906586 kernel: audit: type=1006 audit(1776114480.858:692): pid=1630 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=34 res=1 Apr 13 21:08:00.949413 sshd[1630]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 21:08:02.784495 systemd-logind[1133]: New session 34 of user core. Apr 13 21:08:02.902736 systemd[1]: Started Session 34 of User core. Apr 13 21:08:04.918000 audit[1630]: USER_START pid=1630 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:04.947558 kernel: audit: type=1105 audit(1776114484.918:693): pid=1630 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:05.200000 audit[1632]: CRED_ACQ pid=1632 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:05.231635 kernel: audit: type=1103 audit(1776114485.200:694): pid=1632 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:09.733875 sshd[1630]: pam_unix(sshd:session): session closed for user core Apr 13 21:08:09.820000 audit[1630]: USER_END pid=1630 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:09.823000 audit[1630]: CRED_DISP pid=1630 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:09.859242 kernel: audit: type=1106 audit(1776114489.820:695): pid=1630 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:09.879478 kernel: audit: type=1104 audit(1776114489.823:696): pid=1630 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:09.952124 systemd[1]: sshd@33-10.0.0.3:22-10.0.0.1:57074.service: Deactivated successfully. Apr 13 21:08:10.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-10.0.0.3:22-10.0.0.1:57074 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:08:10.081567 kernel: audit: type=1131 audit(1776114490.029:697): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-10.0.0.3:22-10.0.0.1:57074 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:08:10.037985 systemd[1]: sshd@33-10.0.0.3:22-10.0.0.1:57074.service: Consumed 2.136s CPU time. Apr 13 21:08:10.237351 systemd[1]: session-34.scope: Deactivated successfully. Apr 13 21:08:10.275496 systemd[1]: session-34.scope: Consumed 2.798s CPU time. Apr 13 21:08:10.458636 systemd-logind[1133]: Session 34 logged out. Waiting for processes to exit. Apr 13 21:08:10.756224 systemd-logind[1133]: Removed session 34. Apr 13 21:08:20.554636 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:43516). Apr 13 21:08:20.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-10.0.0.3:22-10.0.0.1:43516 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:08:20.615041 kernel: audit: type=1130 audit(1776114500.599:698): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-10.0.0.3:22-10.0.0.1:43516 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:08:23.724000 audit[1637]: USER_ACCT pid=1637 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:23.791286 kernel: audit: type=1101 audit(1776114503.724:699): pid=1637 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:23.823619 sshd[1637]: Accepted publickey for core from 10.0.0.1 port 43516 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 21:08:23.887286 kernel: audit: type=1103 audit(1776114503.839:700): pid=1637 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:23.890669 kernel: audit: type=1006 audit(1776114503.888:701): pid=1637 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=35 res=1 Apr 13 21:08:23.839000 audit[1637]: CRED_ACQ pid=1637 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:23.938830 sshd[1637]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 21:08:25.425441 systemd-logind[1133]: New session 35 of user core. Apr 13 21:08:25.503360 systemd[1]: Started Session 35 of User core. Apr 13 21:08:27.180358 kernel: audit: type=1105 audit(1776114507.142:702): pid=1637 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:27.142000 audit[1637]: USER_START pid=1637 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:27.475000 audit[1639]: CRED_ACQ pid=1639 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:27.504035 kernel: audit: type=1103 audit(1776114507.475:703): pid=1639 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:31.018696 sshd[1637]: pam_unix(sshd:session): session closed for user core Apr 13 21:08:31.241000 audit[1637]: USER_END pid=1637 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:31.248000 audit[1637]: CRED_DISP pid=1637 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:31.309601 kernel: audit: type=1106 audit(1776114511.241:704): pid=1637 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:31.325770 kernel: audit: type=1104 audit(1776114511.248:705): pid=1637 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:31.379209 systemd[1]: sshd@34-10.0.0.3:22-10.0.0.1:43516.service: Deactivated successfully. Apr 13 21:08:31.415295 kernel: audit: type=1131 audit(1776114511.386:706): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-10.0.0.3:22-10.0.0.1:43516 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:08:31.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-10.0.0.3:22-10.0.0.1:43516 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:08:31.388254 systemd[1]: sshd@34-10.0.0.3:22-10.0.0.1:43516.service: Consumed 1.684s CPU time. Apr 13 21:08:31.416856 systemd[1]: session-35.scope: Deactivated successfully. Apr 13 21:08:31.428773 systemd[1]: session-35.scope: Consumed 2.466s CPU time. Apr 13 21:08:31.446630 systemd-logind[1133]: Session 35 logged out. Waiting for processes to exit. Apr 13 21:08:31.603260 systemd-logind[1133]: Removed session 35. Apr 13 21:08:35.521228 update_engine[1150]: I0413 21:08:35.517390 1150 prefs.cc:51] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Apr 13 21:08:35.603038 update_engine[1150]: I0413 21:08:35.523248 1150 prefs.cc:51] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Apr 13 21:08:42.230433 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:46826). Apr 13 21:08:42.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-10.0.0.3:22-10.0.0.1:46826 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:08:42.258534 kernel: audit: type=1130 audit(1776114522.235:707): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-10.0.0.3:22-10.0.0.1:46826 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:08:49.322000 audit[1646]: USER_ACCT pid=1646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:49.381381 kernel: audit: type=1101 audit(1776114529.322:708): pid=1646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:49.415518 sshd[1646]: Accepted publickey for core from 10.0.0.1 port 46826 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 21:08:49.552000 audit[1646]: CRED_ACQ pid=1646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:49.604511 kernel: audit: type=1103 audit(1776114529.552:709): pid=1646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:49.626260 kernel: audit: type=1006 audit(1776114529.591:710): pid=1646 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=36 res=1 Apr 13 21:08:49.647658 sshd[1646]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 21:08:51.454473 systemd-logind[1133]: New session 36 of user core. Apr 13 21:08:51.662389 systemd[1]: Started Session 36 of User core. Apr 13 21:08:53.977000 audit[1646]: USER_START pid=1646 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:54.001706 kernel: audit: type=1105 audit(1776114533.977:711): pid=1646 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:54.208000 audit[1648]: CRED_ACQ pid=1648 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:54.233187 kernel: audit: type=1103 audit(1776114534.208:712): pid=1648 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:58.909402 sshd[1646]: pam_unix(sshd:session): session closed for user core Apr 13 21:08:59.225000 audit[1646]: USER_END pid=1646 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:59.243643 kernel: audit: type=1106 audit(1776114539.225:713): pid=1646 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:59.258685 kernel: audit: type=1104 audit(1776114539.247:714): pid=1646 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:59.247000 audit[1646]: CRED_DISP pid=1646 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:08:59.619786 systemd[1]: sshd@35-10.0.0.3:22-10.0.0.1:46826.service: Deactivated successfully. Apr 13 21:08:59.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-10.0.0.3:22-10.0.0.1:46826 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:08:59.678823 kernel: audit: type=1131 audit(1776114539.657:715): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-10.0.0.3:22-10.0.0.1:46826 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:08:59.660409 systemd[1]: sshd@35-10.0.0.3:22-10.0.0.1:46826.service: Consumed 3.525s CPU time. Apr 13 21:08:59.696425 systemd[1]: session-36.scope: Deactivated successfully. Apr 13 21:08:59.729726 systemd[1]: session-36.scope: Consumed 3.104s CPU time. Apr 13 21:08:59.817821 systemd-logind[1133]: Session 36 logged out. Waiting for processes to exit. Apr 13 21:09:00.149312 systemd-logind[1133]: Removed session 36. Apr 13 21:09:09.540708 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:46320). Apr 13 21:09:09.634840 kernel: audit: type=1130 audit(1776114549.560:716): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-10.0.0.3:22-10.0.0.1:46320 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:09:09.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-10.0.0.3:22-10.0.0.1:46320 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:09:12.910000 audit[1655]: USER_ACCT pid=1655 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:09:12.938147 kernel: audit: type=1101 audit(1776114552.910:717): pid=1655 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:09:12.939433 sshd[1655]: Accepted publickey for core from 10.0.0.1 port 46320 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 21:09:13.009716 kernel: audit: type=1103 audit(1776114552.961:718): pid=1655 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:09:13.016660 kernel: audit: type=1006 audit(1776114553.006:719): pid=1655 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=37 res=1 Apr 13 21:09:12.961000 audit[1655]: CRED_ACQ pid=1655 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:09:13.164627 sshd[1655]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 21:09:14.248404 systemd-logind[1133]: New session 37 of user core. Apr 13 21:09:14.498864 systemd[1]: Started Session 37 of User core. Apr 13 21:09:16.247000 audit[1655]: USER_START pid=1655 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:09:16.306043 kernel: audit: type=1105 audit(1776114556.247:720): pid=1655 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:09:16.618000 audit[1658]: CRED_ACQ pid=1658 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:09:16.644517 kernel: audit: type=1103 audit(1776114556.618:721): pid=1658 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:09:19.895215 sshd[1655]: pam_unix(sshd:session): session closed for user core Apr 13 21:09:20.172000 audit[1655]: USER_END pid=1655 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:09:20.194489 kernel: audit: type=1106 audit(1776114560.172:722): pid=1655 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:09:20.216810 kernel: audit: type=1104 audit(1776114560.201:723): pid=1655 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:09:20.201000 audit[1655]: CRED_DISP pid=1655 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:09:20.652721 systemd[1]: sshd@36-10.0.0.3:22-10.0.0.1:46320.service: Deactivated successfully. Apr 13 21:09:20.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-10.0.0.3:22-10.0.0.1:46320 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:09:20.800372 kernel: audit: type=1131 audit(1776114560.763:724): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-10.0.0.3:22-10.0.0.1:46320 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:09:20.765317 systemd[1]: sshd@36-10.0.0.3:22-10.0.0.1:46320.service: Consumed 2.174s CPU time. Apr 13 21:09:20.982893 systemd[1]: session-37.scope: Deactivated successfully. Apr 13 21:09:20.993009 systemd[1]: session-37.scope: Consumed 2.398s CPU time. Apr 13 21:09:21.256997 systemd-logind[1133]: Session 37 logged out. Waiting for processes to exit. Apr 13 21:09:21.545719 systemd-logind[1133]: Removed session 37. Apr 13 21:09:32.190062 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:32922). Apr 13 21:09:32.297513 kernel: audit: type=1130 audit(1776114572.260:725): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-10.0.0.3:22-10.0.0.1:32922 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:09:32.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-10.0.0.3:22-10.0.0.1:32922 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:09:37.725000 audit[1665]: USER_ACCT pid=1665 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:09:37.788620 kernel: audit: type=1101 audit(1776114577.725:726): pid=1665 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:09:37.797682 sshd[1665]: Accepted publickey for core from 10.0.0.1 port 32922 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 21:09:37.914000 audit[1665]: CRED_ACQ pid=1665 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:09:37.933779 kernel: audit: type=1103 audit(1776114577.914:727): pid=1665 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:09:37.942721 kernel: audit: type=1006 audit(1776114577.925:728): pid=1665 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=38 res=1 Apr 13 21:09:38.107017 sshd[1665]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 21:09:39.414199 systemd-logind[1133]: New session 38 of user core. Apr 13 21:09:39.520987 systemd[1]: Started Session 38 of User core. Apr 13 21:09:41.537000 audit[1665]: USER_START pid=1665 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:09:41.590244 kernel: audit: type=1105 audit(1776114581.537:729): pid=1665 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:09:42.115000 audit[1667]: CRED_ACQ pid=1667 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:09:42.132523 kernel: audit: type=1103 audit(1776114582.115:730): pid=1667 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:09:48.076739 sshd[1665]: pam_unix(sshd:session): session closed for user core Apr 13 21:09:48.450000 audit[1665]: USER_END pid=1665 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:09:48.503695 kernel: audit: type=1106 audit(1776114588.450:731): pid=1665 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:09:48.529000 audit[1665]: CRED_DISP pid=1665 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:09:48.557942 kernel: audit: type=1104 audit(1776114588.529:732): pid=1665 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:09:49.159641 systemd[1]: sshd@37-10.0.0.3:22-10.0.0.1:32922.service: Deactivated successfully. Apr 13 21:09:49.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-10.0.0.3:22-10.0.0.1:32922 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:09:49.303474 kernel: audit: type=1131 audit(1776114589.241:733): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-10.0.0.3:22-10.0.0.1:32922 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:09:49.242963 systemd[1]: sshd@37-10.0.0.3:22-10.0.0.1:32922.service: Consumed 3.224s CPU time. Apr 13 21:09:49.457718 systemd[1]: session-38.scope: Deactivated successfully. Apr 13 21:09:49.551618 systemd[1]: session-38.scope: Consumed 3.735s CPU time. Apr 13 21:09:49.732968 systemd-logind[1133]: Session 38 logged out. Waiting for processes to exit. Apr 13 21:09:49.825011 systemd-logind[1133]: Removed session 38. Apr 13 21:09:58.835170 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:51214). Apr 13 21:09:58.894672 kernel: audit: type=1130 audit(1776114598.841:734): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-10.0.0.3:22-10.0.0.1:51214 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:09:58.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-10.0.0.3:22-10.0.0.1:51214 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:10:04.451000 audit[1672]: USER_ACCT pid=1672 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:10:04.530453 kernel: audit: type=1101 audit(1776114604.451:735): pid=1672 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:10:04.533949 sshd[1672]: Accepted publickey for core from 10.0.0.1 port 51214 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 21:10:04.593480 kernel: audit: type=1103 audit(1776114604.559:736): pid=1672 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:10:04.559000 audit[1672]: CRED_ACQ pid=1672 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:10:04.630496 kernel: audit: type=1006 audit(1776114604.592:737): pid=1672 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=39 res=1 Apr 13 21:10:04.705499 sshd[1672]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 21:10:05.895603 systemd-logind[1133]: New session 39 of user core. Apr 13 21:10:06.006032 systemd[1]: Started Session 39 of User core. Apr 13 21:10:07.427000 audit[1672]: USER_START pid=1672 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:10:07.512946 kernel: audit: type=1105 audit(1776114607.427:738): pid=1672 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:10:07.738000 audit[1674]: CRED_ACQ pid=1674 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:10:07.753522 kernel: audit: type=1103 audit(1776114607.738:739): pid=1674 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:10:12.613473 sshd[1672]: pam_unix(sshd:session): session closed for user core Apr 13 21:10:12.901000 audit[1672]: USER_END pid=1672 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:10:12.934635 kernel: audit: type=1106 audit(1776114612.901:740): pid=1672 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:10:12.940525 kernel: audit: type=1104 audit(1776114612.916:741): pid=1672 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:10:12.916000 audit[1672]: CRED_DISP pid=1672 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:10:13.116753 systemd[1]: sshd@38-10.0.0.3:22-10.0.0.1:51214.service: Deactivated successfully. Apr 13 21:10:13.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-10.0.0.3:22-10.0.0.1:51214 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:10:13.187867 kernel: audit: type=1131 audit(1776114613.144:742): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-10.0.0.3:22-10.0.0.1:51214 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:10:13.146641 systemd[1]: sshd@38-10.0.0.3:22-10.0.0.1:51214.service: Consumed 2.867s CPU time. Apr 13 21:10:13.194376 systemd[1]: session-39.scope: Deactivated successfully. Apr 13 21:10:13.219261 systemd[1]: session-39.scope: Consumed 3.294s CPU time. Apr 13 21:10:13.324497 systemd-logind[1133]: Session 39 logged out. Waiting for processes to exit. Apr 13 21:10:13.485207 systemd-logind[1133]: Removed session 39. Apr 13 21:10:23.529164 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:40284). Apr 13 21:10:23.595817 kernel: audit: type=1130 audit(1776114623.544:743): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-10.0.0.3:22-10.0.0.1:40284 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:10:23.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-10.0.0.3:22-10.0.0.1:40284 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:10:29.448000 audit[1680]: USER_ACCT pid=1680 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:10:29.522466 kernel: audit: type=1101 audit(1776114629.448:744): pid=1680 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:10:29.527950 sshd[1680]: Accepted publickey for core from 10.0.0.1 port 40284 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 21:10:29.555000 audit[1680]: CRED_ACQ pid=1680 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:10:29.601472 kernel: audit: type=1103 audit(1776114629.555:745): pid=1680 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:10:29.605296 kernel: audit: type=1006 audit(1776114629.571:746): pid=1680 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=40 res=1 Apr 13 21:10:29.645196 sshd[1680]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 21:10:30.641505 systemd-logind[1133]: New session 40 of user core. Apr 13 21:10:30.855513 systemd[1]: Started Session 40 of User core. Apr 13 21:10:32.239000 audit[1680]: USER_START pid=1680 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:10:32.255641 kernel: audit: type=1105 audit(1776114632.239:747): pid=1680 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:10:32.466000 audit[1682]: CRED_ACQ pid=1682 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:10:32.491085 kernel: audit: type=1103 audit(1776114632.466:748): pid=1682 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:10:33.547933 update_engine[1150]: I0413 21:10:33.545262 1150 filesystem_copier_action.cc:274] Hash: W2tlmDO1e7ue6lfdobBruQSsP93+fWBhNnXM6T/sIeY= Apr 13 21:10:33.591884 update_engine[1150]: I0413 21:10:33.553591 1150 action_processor.cc:82] ActionProcessor::ActionComplete: finished FilesystemCopierAction, starting KernelCopierAction Apr 13 21:11:06.331407 sshd[1680]: pam_unix(sshd:session): session closed for user core Apr 13 21:11:06.801000 audit[1680]: USER_END pid=1680 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:11:06.819140 kernel: audit: type=1106 audit(1776114666.801:749): pid=1680 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:11:06.825924 kernel: audit: type=1104 audit(1776114666.819:750): pid=1680 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:11:06.819000 audit[1680]: CRED_DISP pid=1680 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:11:07.107754 systemd[1]: sshd@39-10.0.0.3:22-10.0.0.1:40284.service: Deactivated successfully. Apr 13 21:11:07.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-10.0.0.3:22-10.0.0.1:40284 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:11:07.126689 systemd[1]: sshd@39-10.0.0.3:22-10.0.0.1:40284.service: Consumed 2.743s CPU time. Apr 13 21:11:07.137678 kernel: audit: type=1131 audit(1776114667.123:751): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-10.0.0.3:22-10.0.0.1:40284 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:11:07.353403 systemd[1]: session-40.scope: Deactivated successfully. Apr 13 21:11:07.442105 systemd[1]: session-40.scope: Consumed 4.966s CPU time. Apr 13 21:11:07.948705 systemd-logind[1133]: Session 40 logged out. Waiting for processes to exit. Apr 13 21:11:08.444609 systemd-logind[1133]: Removed session 40. Apr 13 21:11:19.916384 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:52222). Apr 13 21:11:19.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-10.0.0.3:22-10.0.0.1:52222 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:11:20.033679 kernel: audit: type=1130 audit(1776114679.933:752): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-10.0.0.3:22-10.0.0.1:52222 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:11:26.263000 audit[1688]: USER_ACCT pid=1688 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:11:26.315895 kernel: audit: type=1101 audit(1776114686.263:753): pid=1688 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:11:26.317452 sshd[1688]: Accepted publickey for core from 10.0.0.1 port 52222 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 21:11:26.452602 kernel: audit: type=1103 audit(1776114686.391:754): pid=1688 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:11:26.454233 kernel: audit: type=1006 audit(1776114686.406:755): pid=1688 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=41 res=1 Apr 13 21:11:26.391000 audit[1688]: CRED_ACQ pid=1688 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:11:26.467749 sshd[1688]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 21:11:30.200862 systemd-logind[1133]: New session 41 of user core. Apr 13 21:11:30.513989 systemd[1]: Started Session 41 of User core. Apr 13 21:11:32.412108 update_engine[1150]: I0413 21:11:32.405548 1150 action_processor.cc:82] ActionProcessor::ActionComplete: finished KernelCopierAction, starting OmahaRequestAction Apr 13 21:11:32.482548 update_engine[1150]: I0413 21:11:32.412577 1150 omaha_request_action.cc:268] Posting an Omaha request to http://10.0.0.2:34567/v1/update Apr 13 21:11:32.482548 update_engine[1150]: I0413 21:11:32.412671 1150 omaha_request_action.cc:269] Request: Apr 13 21:11:32.482548 update_engine[1150]: Apr 13 21:11:32.482548 update_engine[1150]: Apr 13 21:11:32.482548 update_engine[1150]: Apr 13 21:11:32.482548 update_engine[1150]: Apr 13 21:11:32.482548 update_engine[1150]: Apr 13 21:11:32.482548 update_engine[1150]: Apr 13 21:11:32.482548 update_engine[1150]: I0413 21:11:32.412678 1150 libcurl_http_fetcher.cc:48] Starting/Resuming transfer Apr 13 21:11:32.482548 update_engine[1150]: I0413 21:11:32.477633 1150 libcurl_http_fetcher.cc:152] Setting up curl options for HTTP Apr 13 21:11:32.634714 update_engine[1150]: I0413 21:11:32.592999 1150 libcurl_http_fetcher.cc:435] Setting up timeout source: 1 seconds. Apr 13 21:11:34.085000 audit[1688]: USER_START pid=1688 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:11:34.134740 kernel: audit: type=1105 audit(1776114694.085:756): pid=1688 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:11:34.405838 update_engine[1150]: I0413 21:11:34.404364 1150 libcurl_http_fetcher.cc:248] HTTP response code: 200 Apr 13 21:11:34.439737 update_engine[1150]: I0413 21:11:34.434149 1150 libcurl_http_fetcher.cc:305] Transfer completed (200), 241 bytes downloaded Apr 13 21:11:34.447053 update_engine[1150]: I0413 21:11:34.438783 1150 omaha_request_action.cc:619] Omaha request response: Apr 13 21:11:34.447053 update_engine[1150]: Apr 13 21:11:34.447053 update_engine[1150]: Apr 13 21:11:34.447053 update_engine[1150]: Apr 13 21:11:34.447053 update_engine[1150]: Apr 13 21:11:34.447053 update_engine[1150]: Apr 13 21:11:34.447053 update_engine[1150]: Apr 13 21:11:34.447053 update_engine[1150]: I0413 21:11:34.440313 1150 action_processor.cc:82] ActionProcessor::ActionComplete: finished OmahaRequestAction, starting DownloadAction Apr 13 21:11:34.447053 update_engine[1150]: I0413 21:11:34.440325 1150 install_plan.cc:53] InstallPlan: , new_update, url: http://10.0.0.2:34567/packages/update.gz, payload size: 507403528, payload hash: EavLG76K1QSxSOWEIFaClhdZVnpkdrvlK+26+IjCyh4=, partition_path: /dev/vda4, kernel_path: /boot/flatcar/vmlinuz-b, pcr_policy_path: /var/lib/update_engine/pcrs-b.zip, old_partition_path: /dev/vda3, old_kernel_path: /boot/flatcar/vmlinuz-a Apr 13 21:11:34.534989 kernel: audit: type=1103 audit(1776114694.478:757): pid=1691 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:11:34.478000 audit[1691]: CRED_ACQ pid=1691 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:11:34.536350 update_engine[1150]: I0413 21:11:34.494378 1150 update_attempter.cc:420] Download status: active Apr 13 21:11:34.536350 update_engine[1150]: I0413 21:11:34.502914 1150 multi_range_http_fetcher.cc:30] starting first transfer Apr 13 21:11:34.536350 update_engine[1150]: I0413 21:11:34.506307 1150 multi_range_http_fetcher.cc:58] starting transfer of range 0+? Apr 13 21:11:34.536350 update_engine[1150]: I0413 21:11:34.510025 1150 libcurl_http_fetcher.cc:48] Starting/Resuming transfer Apr 13 21:11:34.536350 update_engine[1150]: I0413 21:11:34.527568 1150 libcurl_http_fetcher.cc:152] Setting up curl options for HTTP Apr 13 21:11:34.536695 update_engine[1150]: I0413 21:11:34.536350 1150 libcurl_http_fetcher.cc:435] Setting up timeout source: 1 seconds. Apr 13 21:11:34.696591 update_engine[1150]: I0413 21:11:34.667784 1150 update_attempter.cc:442] Downloaded 512/507403528 bytes (0%) Apr 13 21:11:34.821640 update_engine[1150]: I0413 21:11:34.819710 1150 payload_processor.cc:39] PartitionInfo new_partition_info sha256: feZPVcbfQeP58uzRntmKzkwYt9hPbd0Dm6bhi0Z/41g= size: 1073741824 Apr 13 21:11:34.861365 update_engine[1150]: I0413 21:11:34.858736 1150 payload_processor.cc:226] Starting to apply update payload operations Apr 13 21:11:35.107227 update_engine[1150]: I0413 21:11:35.064400 1150 payload_processor.cc:282] Completed 1/1079 operations (0%) Apr 13 21:11:35.236711 update_engine[1150]: I0413 21:11:35.233278 1150 payload_processor.cc:282] Completed 2/1079 operations (0%) Apr 13 21:11:35.366554 update_engine[1150]: I0413 21:11:35.356693 1150 payload_processor.cc:282] Completed 3/1079 operations (0%) Apr 13 21:11:35.462243 update_engine[1150]: I0413 21:11:35.457068 1150 payload_processor.cc:282] Completed 4/1079 operations (0%) Apr 13 21:11:35.602710 update_engine[1150]: I0413 21:11:35.600436 1150 payload_processor.cc:282] Completed 5/1079 operations (0%) Apr 13 21:12:03.748202 sshd[1688]: pam_unix(sshd:session): session closed for user core Apr 13 21:12:03.975000 audit[1688]: USER_END pid=1688 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:12:03.991564 kernel: audit: type=1106 audit(1776114723.975:758): pid=1688 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:12:03.998285 kernel: audit: type=1104 audit(1776114723.980:759): pid=1688 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:12:03.980000 audit[1688]: CRED_DISP pid=1688 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:12:04.126651 systemd[1]: sshd@40-10.0.0.3:22-10.0.0.1:52222.service: Deactivated successfully. Apr 13 21:12:04.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-10.0.0.3:22-10.0.0.1:52222 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:12:04.196180 systemd[1]: sshd@40-10.0.0.3:22-10.0.0.1:52222.service: Consumed 3.710s CPU time. Apr 13 21:12:04.207954 kernel: audit: type=1131 audit(1776114724.192:760): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-10.0.0.3:22-10.0.0.1:52222 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:12:04.224492 systemd[1]: session-41.scope: Deactivated successfully. Apr 13 21:12:04.292932 systemd[1]: session-41.scope: Consumed 2.482s CPU time. Apr 13 21:12:04.410436 systemd-logind[1133]: Session 41 logged out. Waiting for processes to exit. Apr 13 21:12:04.532686 systemd-logind[1133]: Removed session 41. Apr 13 21:12:15.049567 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:49520). Apr 13 21:12:15.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-10.0.0.3:22-10.0.0.1:49520 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:12:15.081541 kernel: audit: type=1130 audit(1776114735.053:761): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-10.0.0.3:22-10.0.0.1:49520 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:12:27.137000 audit[1696]: USER_ACCT pid=1696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:12:27.157290 kernel: audit: type=1101 audit(1776114747.137:762): pid=1696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:12:27.160742 sshd[1696]: Accepted publickey for core from 10.0.0.1 port 49520 ssh2: RSA SHA256:hJ0yVEUMzHmd1UJwdq/RFRWUaGkZpEZrw/gCzyoQqTM Apr 13 21:12:27.348000 audit[1696]: CRED_ACQ pid=1696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:12:27.363547 kernel: audit: type=1103 audit(1776114747.348:763): pid=1696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:12:27.375650 kernel: audit: type=1006 audit(1776114747.362:764): pid=1696 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=42 res=1 Apr 13 21:12:27.534625 sshd[1696]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 13 21:12:29.711686 systemd-logind[1133]: New session 42 of user core. Apr 13 21:12:29.836668 systemd[1]: Started Session 42 of User core. Apr 13 21:12:32.445000 audit[1696]: USER_START pid=1696 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:12:32.468442 kernel: audit: type=1105 audit(1776114752.445:765): pid=1696 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:12:32.849000 audit[1698]: CRED_ACQ pid=1698 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:12:32.919544 kernel: audit: type=1103 audit(1776114752.849:766): pid=1698 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:12:35.214378 update_engine[1150]: I0413 21:12:35.207738 1150 payload_processor.cc:282] Completed 6/1079 operations (0%) Apr 13 21:12:35.318274 update_engine[1150]: I0413 21:12:35.309659 1150 update_attempter.cc:442] Downloaded 934400/507403528 bytes (0%) Apr 13 21:13:03.017749 sshd[1696]: pam_unix(sshd:session): session closed for user core Apr 13 21:13:03.394000 audit[1696]: USER_END pid=1696 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:13:03.442705 kernel: audit: type=1106 audit(1776114783.394:767): pid=1696 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:13:03.468374 kernel: audit: type=1104 audit(1776114783.447:768): pid=1696 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:13:03.447000 audit[1696]: CRED_DISP pid=1696 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 13 21:13:04.215150 systemd[1]: sshd@41-10.0.0.3:22-10.0.0.1:49520.service: Deactivated successfully. Apr 13 21:13:04.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-10.0.0.3:22-10.0.0.1:49520 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:13:04.321208 kernel: audit: type=1131 audit(1776114784.308:769): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-10.0.0.3:22-10.0.0.1:49520 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 13 21:13:04.312140 systemd[1]: sshd@41-10.0.0.3:22-10.0.0.1:49520.service: Consumed 5.359s CPU time. Apr 13 21:13:04.467618 systemd[1]: session-42.scope: Deactivated successfully. Apr 13 21:13:04.587175 systemd[1]: session-42.scope: Consumed 3.738s CPU time. Apr 13 21:13:04.715512 systemd-logind[1133]: Session 42 logged out. Waiting for processes to exit. Apr 13 21:13:05.025180 systemd-logind[1133]: Removed session 42.