Jan 22 00:36:56.303419 kernel: Linux version 5.10.107-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 9.3.0-r1 p3) 9.3.0, GNU ld (Gentoo 2.36.1 p5) 2.36.1) #1 SMP Tue Mar 22 19:39:53 -00 2022 Jan 22 00:36:56.303447 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=15990f5bb88d618f1948b7e8a720f1d5b95900cfecbef00df890bd0a136b39aa Jan 22 00:36:56.303458 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jan 22 00:36:56.303464 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jan 22 00:36:56.303470 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jan 22 00:36:56.303476 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jan 22 00:36:56.303484 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Jan 22 00:36:56.303494 kernel: BIOS-provided physical RAM map: Jan 22 00:36:56.303502 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Jan 22 00:36:56.303507 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Jan 22 00:36:56.303513 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Jan 22 00:36:56.303519 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable Jan 22 00:36:56.303526 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved Jan 22 00:36:56.303535 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Jan 22 00:36:56.303749 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Jan 22 00:36:56.303757 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Jan 22 00:36:56.303764 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Jan 22 00:36:56.303770 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Jan 22 00:36:56.303778 kernel: NX (Execute Disable) protection: active Jan 22 00:36:56.303786 kernel: SMBIOS 2.8 present. Jan 22 00:36:56.303794 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Jan 22 00:36:56.303801 kernel: Hypervisor detected: KVM Jan 22 00:36:56.303807 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jan 22 00:36:56.303813 kernel: kvm-clock: cpu 0, msr 3e6ba001, primary cpu clock Jan 22 00:36:56.303820 kernel: kvm-clock: using sched offset of 13606019028 cycles Jan 22 00:36:56.303831 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jan 22 00:36:56.303840 kernel: tsc: Detected 2445.426 MHz processor Jan 22 00:36:56.303846 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jan 22 00:36:56.303853 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jan 22 00:36:56.303861 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 Jan 22 00:36:56.303869 kernel: MTRR default type: write-back Jan 22 00:36:56.303878 kernel: MTRR fixed ranges enabled: Jan 22 00:36:56.303885 kernel: 00000-9FFFF write-back Jan 22 00:36:56.303891 kernel: A0000-BFFFF uncachable Jan 22 00:36:56.303897 kernel: C0000-FFFFF write-protect Jan 22 00:36:56.303908 kernel: MTRR variable ranges enabled: Jan 22 00:36:56.303917 kernel: 0 base 0000C0000000 mask FFFFC0000000 uncachable Jan 22 00:36:56.303924 kernel: 1 disabled Jan 22 00:36:56.303930 kernel: 2 disabled Jan 22 00:36:56.303937 kernel: 3 disabled Jan 22 00:36:56.303948 kernel: 4 disabled Jan 22 00:36:56.303957 kernel: 5 disabled Jan 22 00:36:56.303964 kernel: 6 disabled Jan 22 00:36:56.303972 kernel: 7 disabled Jan 22 00:36:56.303979 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jan 22 00:36:56.303989 kernel: Using GB pages for direct mapping Jan 22 00:36:56.303998 kernel: ACPI: Early table checksum verification disabled Jan 22 00:36:56.304005 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) Jan 22 00:36:56.304012 kernel: ACPI: RSDT 0x000000009CFE241A 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:36:56.304019 kernel: ACPI: FACP 0x000000009CFE21FA 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:36:56.304028 kernel: ACPI: DSDT 0x000000009CFE0040 0021BA (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:36:56.304038 kernel: ACPI: FACS 0x000000009CFE0000 000040 Jan 22 00:36:56.304045 kernel: ACPI: APIC 0x000000009CFE22EE 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:36:56.304054 kernel: ACPI: HPET 0x000000009CFE237E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:36:56.304063 kernel: ACPI: MCFG 0x000000009CFE23B6 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:36:56.304072 kernel: ACPI: WAET 0x000000009CFE23F2 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:36:56.304080 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21fa-0x9cfe22ed] Jan 22 00:36:56.304087 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21f9] Jan 22 00:36:56.304094 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Jan 22 00:36:56.304102 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22ee-0x9cfe237d] Jan 22 00:36:56.304113 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe237e-0x9cfe23b5] Jan 22 00:36:56.304121 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23b6-0x9cfe23f1] Jan 22 00:36:56.304128 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23f2-0x9cfe2419] Jan 22 00:36:56.304134 kernel: ACPI: Local APIC address 0xfee00000 Jan 22 00:36:56.304143 kernel: No NUMA configuration found Jan 22 00:36:56.304152 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] Jan 22 00:36:56.304160 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] Jan 22 00:36:56.304166 kernel: Zone ranges: Jan 22 00:36:56.304173 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jan 22 00:36:56.304181 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] Jan 22 00:36:56.304193 kernel: Normal empty Jan 22 00:36:56.304200 kernel: Movable zone start for each node Jan 22 00:36:56.304207 kernel: Early memory node ranges Jan 22 00:36:56.304213 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Jan 22 00:36:56.304222 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] Jan 22 00:36:56.304231 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] Jan 22 00:36:56.304239 kernel: On node 0 totalpages: 642938 Jan 22 00:36:56.304246 kernel: DMA zone: 64 pages used for memmap Jan 22 00:36:56.304252 kernel: DMA zone: 21 pages reserved Jan 22 00:36:56.304261 kernel: DMA zone: 3998 pages, LIFO batch:0 Jan 22 00:36:56.304273 kernel: DMA32 zone: 9984 pages used for memmap Jan 22 00:36:56.304280 kernel: DMA32 zone: 638940 pages, LIFO batch:63 Jan 22 00:36:56.304287 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jan 22 00:36:56.304293 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Jan 22 00:36:56.304303 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges Jan 22 00:36:56.304313 kernel: ACPI: PM-Timer IO Port: 0x608 Jan 22 00:36:56.304320 kernel: ACPI: Local APIC address 0xfee00000 Jan 22 00:36:56.304327 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jan 22 00:36:56.304335 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jan 22 00:36:56.304344 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jan 22 00:36:56.304355 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jan 22 00:36:56.304362 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jan 22 00:36:56.304369 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jan 22 00:36:56.304377 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jan 22 00:36:56.304385 kernel: ACPI: IRQ0 used by override. Jan 22 00:36:56.304394 kernel: ACPI: IRQ5 used by override. Jan 22 00:36:56.304400 kernel: ACPI: IRQ9 used by override. Jan 22 00:36:56.304407 kernel: ACPI: IRQ10 used by override. Jan 22 00:36:56.304414 kernel: ACPI: IRQ11 used by override. Jan 22 00:36:56.304426 kernel: Using ACPI (MADT) for SMP configuration information Jan 22 00:36:56.304434 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Jan 22 00:36:56.304441 kernel: TSC deadline timer available Jan 22 00:36:56.304448 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Jan 22 00:36:56.304456 kernel: kvm-guest: KVM setup pv remote TLB flush Jan 22 00:36:56.304465 kernel: kvm-guest: setup PV sched yield Jan 22 00:36:56.304473 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Jan 22 00:36:56.304480 kernel: Booting paravirtualized kernel on KVM Jan 22 00:36:56.304487 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jan 22 00:36:56.304496 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Jan 22 00:36:56.304508 kernel: percpu: Embedded 58 pages/cpu s199704 r8192 d29672 u524288 Jan 22 00:36:56.304515 kernel: pcpu-alloc: s199704 r8192 d29672 u524288 alloc=1*2097152 Jan 22 00:36:56.304522 kernel: pcpu-alloc: [0] 0 1 2 3 Jan 22 00:36:56.304529 kernel: kvm-guest: KVM setup async PF for cpu 0 Jan 22 00:36:56.304538 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c580 Jan 22 00:36:56.304645 kernel: kvm-guest: PV spinlocks enabled Jan 22 00:36:56.304655 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jan 22 00:36:56.304664 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632869 Jan 22 00:36:56.304671 kernel: Policy zone: DMA32 Jan 22 00:36:56.304752 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=15990f5bb88d618f1948b7e8a720f1d5b95900cfecbef00df890bd0a136b39aa Jan 22 00:36:56.304768 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jan 22 00:36:56.304778 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jan 22 00:36:56.304785 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jan 22 00:36:56.304793 kernel: Memory: 2449516K/2571752K available (10246K kernel code, 2239K rwdata, 11640K rodata, 42228K init, 1436K bss, 121976K reserved, 0K cma-reserved) Jan 22 00:36:56.304800 kernel: random: get_random_u64 called from __kmem_cache_create+0x26/0x400 with crng_init=0 Jan 22 00:36:56.304811 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Jan 22 00:36:56.304820 kernel: ftrace: allocating 34378 entries in 135 pages Jan 22 00:36:56.304829 kernel: ftrace: allocated 135 pages with 4 groups Jan 22 00:36:56.304836 kernel: rcu: Hierarchical RCU implementation. Jan 22 00:36:56.304844 kernel: rcu: RCU event tracing is enabled. Jan 22 00:36:56.304854 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Jan 22 00:36:56.304863 kernel: Rude variant of Tasks RCU enabled. Jan 22 00:36:56.304872 kernel: Tracing variant of Tasks RCU enabled. Jan 22 00:36:56.304879 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jan 22 00:36:56.304889 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Jan 22 00:36:56.304899 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Jan 22 00:36:56.304909 kernel: Console: colour VGA+ 80x25 Jan 22 00:36:56.304916 kernel: printk: console [ttyS0] enabled Jan 22 00:36:56.304923 kernel: ACPI: Core revision 20200925 Jan 22 00:36:56.304931 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Jan 22 00:36:56.304940 kernel: APIC: Switch to symmetric I/O mode setup Jan 22 00:36:56.304949 kernel: x2apic enabled Jan 22 00:36:56.304956 kernel: Switched APIC routing to physical x2apic. Jan 22 00:36:56.304963 kernel: kvm-guest: setup PV IPIs Jan 22 00:36:56.304974 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Jan 22 00:36:56.304983 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Jan 22 00:36:56.304992 kernel: Calibrating delay loop (skipped) preset value.. 4890.85 BogoMIPS (lpj=2445426) Jan 22 00:36:56.304999 kernel: pid_max: default: 32768 minimum: 301 Jan 22 00:36:56.305006 kernel: LSM: Security Framework initializing Jan 22 00:36:56.305014 kernel: SELinux: Initializing. Jan 22 00:36:56.305024 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jan 22 00:36:56.305032 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jan 22 00:36:56.305039 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Jan 22 00:36:56.305049 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Jan 22 00:36:56.305059 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Jan 22 00:36:56.305068 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jan 22 00:36:56.305075 kernel: Spectre V2 : Mitigation: Retpolines Jan 22 00:36:56.305083 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jan 22 00:36:56.305094 kernel: Speculative Store Bypass: Vulnerable Jan 22 00:36:56.305104 kernel: Freeing SMP alternatives memory: 28K Jan 22 00:36:56.305111 kernel: smpboot: CPU0: AMD EPYC 7763 64-Core Processor (family: 0x19, model: 0x1, stepping: 0x1) Jan 22 00:36:56.305118 kernel: Performance Events: PMU not available due to virtualization, using software events only. Jan 22 00:36:56.305126 kernel: rcu: Hierarchical SRCU implementation. Jan 22 00:36:56.305135 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Jan 22 00:36:56.305145 kernel: smp: Bringing up secondary CPUs ... Jan 22 00:36:56.305152 kernel: x86: Booting SMP configuration: Jan 22 00:36:56.305159 kernel: .... node #0, CPUs: #1 Jan 22 00:36:56.305167 kernel: kvm-clock: cpu 1, msr 3e6ba041, secondary cpu clock Jan 22 00:36:56.305179 kernel: kvm-guest: KVM setup async PF for cpu 1 Jan 22 00:36:56.305187 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c580 Jan 22 00:36:56.305193 kernel: #2 Jan 22 00:36:56.305201 kernel: kvm-clock: cpu 2, msr 3e6ba081, secondary cpu clock Jan 22 00:36:56.305210 kernel: kvm-guest: KVM setup async PF for cpu 2 Jan 22 00:36:56.305220 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c580 Jan 22 00:36:56.305228 kernel: #3 Jan 22 00:36:56.305235 kernel: kvm-clock: cpu 3, msr 3e6ba0c1, secondary cpu clock Jan 22 00:36:56.305242 kernel: kvm-guest: KVM setup async PF for cpu 3 Jan 22 00:36:56.305254 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c580 Jan 22 00:36:56.305264 kernel: smp: Brought up 1 node, 4 CPUs Jan 22 00:36:56.305271 kernel: smpboot: Max logical packages: 1 Jan 22 00:36:56.305278 kernel: smpboot: Total of 4 processors activated (19563.40 BogoMIPS) Jan 22 00:36:56.305286 kernel: devtmpfs: initialized Jan 22 00:36:56.305296 kernel: x86/mm: Memory block size: 128MB Jan 22 00:36:56.305304 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jan 22 00:36:56.305312 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Jan 22 00:36:56.305319 kernel: pinctrl core: initialized pinctrl subsystem Jan 22 00:36:56.305327 kernel: NET: Registered protocol family 16 Jan 22 00:36:56.305339 kernel: audit: initializing netlink subsys (disabled) Jan 22 00:36:56.305347 kernel: audit: type=2000 audit(1769042212.433:1): state=initialized audit_enabled=0 res=1 Jan 22 00:36:56.305355 kernel: thermal_sys: Registered thermal governor 'step_wise' Jan 22 00:36:56.305362 kernel: thermal_sys: Registered thermal governor 'user_space' Jan 22 00:36:56.305371 kernel: cpuidle: using governor menu Jan 22 00:36:56.305381 kernel: ACPI: bus type PCI registered Jan 22 00:36:56.305388 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jan 22 00:36:56.305395 kernel: dca service started, version 1.12.1 Jan 22 00:36:56.305403 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Jan 22 00:36:56.305415 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Jan 22 00:36:56.305424 kernel: PCI: Using configuration type 1 for base access Jan 22 00:36:56.305432 kernel: Kprobes globally optimized Jan 22 00:36:56.305439 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jan 22 00:36:56.305447 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jan 22 00:36:56.305457 kernel: ACPI: Added _OSI(Module Device) Jan 22 00:36:56.305465 kernel: ACPI: Added _OSI(Processor Device) Jan 22 00:36:56.305473 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jan 22 00:36:56.305480 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jan 22 00:36:56.305489 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jan 22 00:36:56.305501 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jan 22 00:36:56.305508 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jan 22 00:36:56.305516 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jan 22 00:36:56.305523 kernel: ACPI: Interpreter enabled Jan 22 00:36:56.305533 kernel: ACPI: (supports S0 S3 S5) Jan 22 00:36:56.305648 kernel: ACPI: Using IOAPIC for interrupt routing Jan 22 00:36:56.305660 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jan 22 00:36:56.305669 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Jan 22 00:36:56.305678 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jan 22 00:36:56.305886 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jan 22 00:36:56.305976 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Jan 22 00:36:56.306055 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Jan 22 00:36:56.306069 kernel: PCI host bridge to bus 0000:00 Jan 22 00:36:56.306158 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jan 22 00:36:56.306233 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jan 22 00:36:56.306310 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jan 22 00:36:56.306380 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Jan 22 00:36:56.306453 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Jan 22 00:36:56.306524 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] Jan 22 00:36:56.306789 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jan 22 00:36:56.306882 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Jan 22 00:36:56.306973 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Jan 22 00:36:56.307061 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Jan 22 00:36:56.307142 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Jan 22 00:36:56.307224 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Jan 22 00:36:56.307313 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Jan 22 00:36:56.307397 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] Jan 22 00:36:56.307479 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Jan 22 00:36:56.307675 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Jan 22 00:36:56.307842 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Jan 22 00:36:56.307925 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] Jan 22 00:36:56.308007 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Jan 22 00:36:56.308085 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Jan 22 00:36:56.308170 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Jan 22 00:36:56.308253 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] Jan 22 00:36:56.308336 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Jan 22 00:36:56.308421 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Jan 22 00:36:56.308503 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Jan 22 00:36:56.308781 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Jan 22 00:36:56.308866 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Jan 22 00:36:56.308951 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Jan 22 00:36:56.309032 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] Jan 22 00:36:56.309110 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] Jan 22 00:36:56.309200 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Jan 22 00:36:56.309284 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Jan 22 00:36:56.309298 kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 5 *10 11) Jan 22 00:36:56.309308 kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs 5 *10 11) Jan 22 00:36:56.309317 kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 5 10 *11) Jan 22 00:36:56.309324 kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs 5 10 *11) Jan 22 00:36:56.309331 kernel: ACPI: PCI Interrupt Link [LNKE] (IRQs 5 *10 11) Jan 22 00:36:56.309340 kernel: ACPI: PCI Interrupt Link [LNKF] (IRQs 5 *10 11) Jan 22 00:36:56.309350 kernel: ACPI: PCI Interrupt Link [LNKG] (IRQs 5 10 *11) Jan 22 00:36:56.309361 kernel: ACPI: PCI Interrupt Link [LNKH] (IRQs 5 10 *11) Jan 22 00:36:56.309368 kernel: ACPI: PCI Interrupt Link [GSIA] (IRQs *16) Jan 22 00:36:56.309375 kernel: ACPI: PCI Interrupt Link [GSIB] (IRQs *17) Jan 22 00:36:56.309385 kernel: ACPI: PCI Interrupt Link [GSIC] (IRQs *18) Jan 22 00:36:56.309394 kernel: ACPI: PCI Interrupt Link [GSID] (IRQs *19) Jan 22 00:36:56.309402 kernel: ACPI: PCI Interrupt Link [GSIE] (IRQs *20) Jan 22 00:36:56.309409 kernel: ACPI: PCI Interrupt Link [GSIF] (IRQs *21) Jan 22 00:36:56.309417 kernel: ACPI: PCI Interrupt Link [GSIG] (IRQs *22) Jan 22 00:36:56.309427 kernel: ACPI: PCI Interrupt Link [GSIH] (IRQs *23) Jan 22 00:36:56.309438 kernel: iommu: Default domain type: Translated Jan 22 00:36:56.309518 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Jan 22 00:36:56.309779 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jan 22 00:36:56.309872 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Jan 22 00:36:56.309884 kernel: vgaarb: loaded Jan 22 00:36:56.309892 kernel: PCI: Using ACPI for IRQ routing Jan 22 00:36:56.309899 kernel: PCI: pci_cache_line_size set to 64 bytes Jan 22 00:36:56.309909 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Jan 22 00:36:56.309920 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] Jan 22 00:36:56.309932 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Jan 22 00:36:56.309939 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Jan 22 00:36:56.309947 kernel: clocksource: Switched to clocksource kvm-clock Jan 22 00:36:56.309957 kernel: VFS: Disk quotas dquot_6.6.0 Jan 22 00:36:56.309966 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jan 22 00:36:56.309973 kernel: pnp: PnP ACPI init Jan 22 00:36:56.310058 kernel: pnp 00:00: Plug and Play ACPI device, IDs PNP0303 (active) Jan 22 00:36:56.310140 kernel: pnp 00:01: Plug and Play ACPI device, IDs PNP0f13 (active) Jan 22 00:36:56.310224 kernel: pnp 00:02: Plug and Play ACPI device, IDs PNP0400 (active) Jan 22 00:36:56.310314 kernel: pnp 00:03: Plug and Play ACPI device, IDs PNP0501 (active) Jan 22 00:36:56.310397 kernel: pnp 00:04: Plug and Play ACPI device, IDs PNP0b00 (active) Jan 22 00:36:56.310480 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Jan 22 00:36:56.310669 kernel: system 00:05: Plug and Play ACPI device, IDs PNP0c01 (active) Jan 22 00:36:56.310755 kernel: pnp: PnP ACPI: found 6 devices Jan 22 00:36:56.310766 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jan 22 00:36:56.310776 kernel: NET: Registered protocol family 2 Jan 22 00:36:56.310785 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jan 22 00:36:56.310794 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jan 22 00:36:56.310802 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jan 22 00:36:56.310809 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jan 22 00:36:56.310817 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jan 22 00:36:56.310826 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jan 22 00:36:56.310840 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jan 22 00:36:56.310847 kernel: NET: Registered protocol family 1 Jan 22 00:36:56.310855 kernel: NET: Registered protocol family 44 Jan 22 00:36:56.310931 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jan 22 00:36:56.311002 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jan 22 00:36:56.311074 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jan 22 00:36:56.311143 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Jan 22 00:36:56.311217 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Jan 22 00:36:56.311286 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] Jan 22 00:36:56.311369 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jan 22 00:36:56.311447 kernel: pci 0000:00:01.0: pci_fixup_video+0x0/0xe0 took 11511 usecs Jan 22 00:36:56.311458 kernel: PCI: CLS 0 bytes, default 64 Jan 22 00:36:56.311466 kernel: Initialise system trusted keyrings Jan 22 00:36:56.311476 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jan 22 00:36:56.311485 kernel: Key type asymmetric registered Jan 22 00:36:56.311493 kernel: Asymmetric key parser 'x509' registered Jan 22 00:36:56.311500 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 251) Jan 22 00:36:56.311508 kernel: io scheduler mq-deadline registered Jan 22 00:36:56.311521 kernel: io scheduler kyber registered Jan 22 00:36:56.311530 kernel: io scheduler bfq registered Jan 22 00:36:56.311537 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jan 22 00:36:56.311656 kernel: PCI Interrupt Link [GSIG] enabled at IRQ 22 Jan 22 00:36:56.311668 kernel: PCI Interrupt Link [GSIH] enabled at IRQ 23 Jan 22 00:36:56.311675 kernel: PCI Interrupt Link [GSIE] enabled at IRQ 20 Jan 22 00:36:56.311682 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jan 22 00:36:56.311756 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jan 22 00:36:56.311765 kernel: random: fast init done Jan 22 00:36:56.311777 kernel: random: crng init done Jan 22 00:36:56.311784 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jan 22 00:36:56.311792 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jan 22 00:36:56.311799 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jan 22 00:36:56.311809 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jan 22 00:36:56.311819 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jan 22 00:36:56.311826 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jan 22 00:36:56.311907 kernel: rtc_cmos 00:04: RTC can wake from S4 Jan 22 00:36:56.311979 kernel: rtc_cmos 00:04: registered as rtc0 Jan 22 00:36:56.312063 kernel: rtc_cmos 00:04: setting system clock to 2026-01-22T00:36:55 UTC (1769042215) Jan 22 00:36:56.312136 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Jan 22 00:36:56.312149 kernel: NET: Registered protocol family 10 Jan 22 00:36:56.312157 kernel: Segment Routing with IPv6 Jan 22 00:36:56.312164 kernel: NET: Registered protocol family 17 Jan 22 00:36:56.312172 kernel: Key type dns_resolver registered Jan 22 00:36:56.312179 kernel: IPI shorthand broadcast: enabled Jan 22 00:36:56.312190 kernel: sched_clock: Marking stable (2909005776, 859162882)->(4218424266, -450255608) Jan 22 00:36:56.312199 kernel: registered taskstats version 1 Jan 22 00:36:56.312209 kernel: Loading compiled-in X.509 certificates Jan 22 00:36:56.312217 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.10.107-flatcar: 5866c780451a04cc08b278527846e2b48fb1aa10' Jan 22 00:36:56.312226 kernel: Key type ._fscrypt registered Jan 22 00:36:56.312236 kernel: Key type .fscrypt registered Jan 22 00:36:56.312243 kernel: Key type fscrypt-provisioning registered Jan 22 00:36:56.312250 kernel: ima: No TPM chip found, activating TPM-bypass! Jan 22 00:36:56.312257 kernel: ima: Allocated hash algorithm: sha1 Jan 22 00:36:56.312266 kernel: ima: No architecture policies found Jan 22 00:36:56.312276 kernel: Freeing unused kernel image (initmem) memory: 42228K Jan 22 00:36:56.312287 kernel: Write protecting the kernel read-only data: 24576k Jan 22 00:36:56.312304 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jan 22 00:36:56.312315 kernel: Freeing unused kernel image (rodata/data gap) memory: 648K Jan 22 00:36:56.312326 kernel: Run /init as init process Jan 22 00:36:56.312334 kernel: with arguments: Jan 22 00:36:56.312342 kernel: /init Jan 22 00:36:56.312351 kernel: with environment: Jan 22 00:36:56.312361 kernel: HOME=/ Jan 22 00:36:56.312369 kernel: TERM=linux Jan 22 00:36:56.312376 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jan 22 00:36:56.312387 systemd[1]: systemd 249 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jan 22 00:36:56.312401 systemd[1]: Detected virtualization kvm. Jan 22 00:36:56.312413 systemd[1]: Detected architecture x86-64. Jan 22 00:36:56.312421 systemd[1]: Running in initial RAM disk. Jan 22 00:36:56.312430 systemd[1]: No hostname configured, using default hostname. Jan 22 00:36:56.312440 systemd[1]: Hostname set to . Jan 22 00:36:56.312449 systemd[1]: Initializing machine ID from VM UUID. Jan 22 00:36:56.312458 systemd[1]: Queued start job for default target Initrd Default Target. Jan 22 00:36:56.312466 systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Jan 22 00:36:56.312477 systemd[1]: Reached target Local Encrypted Volumes. Jan 22 00:36:56.312489 systemd[1]: Reached target Path Units. Jan 22 00:36:56.312497 systemd[1]: Reached target Slice Units. Jan 22 00:36:56.312505 systemd[1]: Reached target Swaps. Jan 22 00:36:56.312516 systemd[1]: Reached target Timer Units. Jan 22 00:36:56.312527 systemd[1]: Listening on Open-iSCSI iscsid Socket. Jan 22 00:36:56.312535 systemd[1]: Listening on Open-iSCSI iscsiuio Socket. Jan 22 00:36:56.312646 systemd[1]: Listening on Journal Audit Socket. Jan 22 00:36:56.312660 systemd[1]: Listening on Journal Socket (/dev/log). Jan 22 00:36:56.312672 systemd[1]: Listening on Journal Socket. Jan 22 00:36:56.312680 systemd[1]: Listening on Network Service Netlink Socket. Jan 22 00:36:56.312753 systemd[1]: Listening on udev Control Socket. Jan 22 00:36:56.312764 systemd[1]: Listening on udev Kernel Socket. Jan 22 00:36:56.312773 systemd[1]: Reached target Socket Units. Jan 22 00:36:56.312781 systemd[1]: Starting Create List of Static Device Nodes... Jan 22 00:36:56.312789 systemd[1]: Finished Network Cleanup. Jan 22 00:36:56.312798 systemd[1]: Started Hardware RNG Entropy Gatherer Daemon. Jan 22 00:36:56.312808 systemd[1]: Starting Journal Service... Jan 22 00:36:56.312820 systemd[1]: Condition check resulted in Load Kernel Modules being skipped. Jan 22 00:36:56.312829 systemd[1]: Starting Apply Kernel Variables... Jan 22 00:36:56.312837 systemd[1]: Starting Setup Virtual Console... Jan 22 00:36:56.312847 systemd[1]: Finished Create List of Static Device Nodes. Jan 22 00:36:56.312861 systemd-journald[191]: Journal started Jan 22 00:36:56.312915 systemd-journald[191]: Runtime Journal (/run/log/journal/b53a3caba5254259b70f35481b88a13c) is 6.0M, max 48.7M, 42.6M free. Jan 22 00:36:56.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:56.733814 kernel: audit: type=1130 audit(1769042216.706:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:56.733881 systemd[1]: Started Journal Service. Jan 22 00:36:56.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:56.747523 systemd[1]: Finished Apply Kernel Variables. Jan 22 00:36:56.811201 kernel: audit: type=1130 audit(1769042216.746:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:56.811235 kernel: audit: type=1130 audit(1769042216.773:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:56.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:56.774341 systemd[1]: Finished Setup Virtual Console. Jan 22 00:36:56.844063 kernel: audit: type=1130 audit(1769042216.816:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:56.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:56.818062 systemd[1]: Starting dracut ask for additional cmdline parameters... Jan 22 00:36:56.846996 systemd[1]: Starting Create Static Device Nodes in /dev... Jan 22 00:36:56.856068 systemd[1]: Finished Create Static Device Nodes in /dev. Jan 22 00:36:56.903327 kernel: audit: type=1130 audit(1769042216.872:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:56.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:56.932646 systemd[1]: Finished dracut ask for additional cmdline parameters. Jan 22 00:36:56.977415 kernel: audit: type=1130 audit(1769042216.939:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:56.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:56.941087 systemd[1]: Starting dracut cmdline hook... Jan 22 00:36:56.983870 dracut-cmdline[207]: dracut-dracut-053 Jan 22 00:36:56.983870 dracut-cmdline[207]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Jan 22 00:36:56.983870 dracut-cmdline[207]: BEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=15990f5bb88d618f1948b7e8a720f1d5b95900cfecbef00df890bd0a136b39aa Jan 22 00:36:57.048850 kernel: SCSI subsystem initialized Jan 22 00:36:57.063778 kernel: Loading iSCSI transport class v2.0-870. Jan 22 00:36:57.086969 kernel: iscsi: registered transport (tcp) Jan 22 00:36:57.121432 kernel: iscsi: registered transport (qla4xxx) Jan 22 00:36:57.121494 kernel: QLogic iSCSI HBA Driver Jan 22 00:36:57.138367 systemd[1]: Finished dracut cmdline hook. Jan 22 00:36:57.182791 kernel: audit: type=1130 audit(1769042217.137:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:57.182819 kernel: device-mapper: uevent: version 1.0.3 Jan 22 00:36:57.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:57.140214 systemd[1]: Starting dracut pre-udev hook... Jan 22 00:36:57.206308 kernel: device-mapper: ioctl: 4.43.0-ioctl (2020-10-01) initialised: dm-devel@redhat.com Jan 22 00:36:57.275830 kernel: raid6: avx2x4 gen() 22655 MB/s Jan 22 00:36:57.297813 kernel: raid6: avx2x4 xor() 3440 MB/s Jan 22 00:36:57.321390 kernel: raid6: avx2x2 gen() 19977 MB/s Jan 22 00:36:57.342826 kernel: raid6: avx2x2 xor() 21987 MB/s Jan 22 00:36:57.364826 kernel: raid6: avx2x1 gen() 13886 MB/s Jan 22 00:36:57.386860 kernel: raid6: avx2x1 xor() 15187 MB/s Jan 22 00:36:57.410776 kernel: raid6: sse2x4 gen() 10861 MB/s Jan 22 00:36:57.432789 kernel: raid6: sse2x4 xor() 2610 MB/s Jan 22 00:36:57.454795 kernel: raid6: sse2x2 gen() 3109 MB/s Jan 22 00:36:57.476773 kernel: raid6: sse2x2 xor() 10262 MB/s Jan 22 00:36:57.498809 kernel: raid6: sse2x1 gen() 855 MB/s Jan 22 00:36:57.527772 kernel: raid6: sse2x1 xor() 6146 MB/s Jan 22 00:36:57.527874 kernel: raid6: using algorithm avx2x4 gen() 22655 MB/s Jan 22 00:36:57.527889 kernel: raid6: .... xor() 3440 MB/s, rmw enabled Jan 22 00:36:57.534148 kernel: raid6: using avx2x2 recovery algorithm Jan 22 00:36:57.567859 kernel: xor: automatically using best checksumming function avx Jan 22 00:36:57.714881 kernel: Btrfs loaded, crc32c=crc32c-intel Jan 22 00:36:57.733136 systemd[1]: Finished dracut pre-udev hook. Jan 22 00:36:57.772087 kernel: audit: type=1130 audit(1769042217.738:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:57.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:57.771000 audit: BPF prog-id=6 op=LOAD Jan 22 00:36:57.782877 kernel: audit: type=1334 audit(1769042217.771:10): prog-id=6 op=LOAD Jan 22 00:36:57.782000 audit: BPF prog-id=7 op=LOAD Jan 22 00:36:57.783000 audit: BPF prog-id=8 op=LOAD Jan 22 00:36:57.784856 systemd[1]: Starting Rule-based Manager for Device Events and Files... Jan 22 00:36:57.825532 systemd-udevd[330]: /usr/lib64/udev/rules.d/50-udev-default.rules:42 Unknown group 'sgx', ignoring Jan 22 00:36:57.828674 systemd[1]: Started Rule-based Manager for Device Events and Files. Jan 22 00:36:57.877897 kernel: kauditd_printk_skb: 2 callbacks suppressed Jan 22 00:36:57.877927 kernel: audit: type=1130 audit(1769042217.841:13): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:57.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:57.843676 systemd[1]: Starting dracut pre-trigger hook... Jan 22 00:36:57.896222 kernel: audit: type=1334 audit(1769042217.882:14): prog-id=9 op=LOAD Jan 22 00:36:57.882000 audit: BPF prog-id=9 op=LOAD Jan 22 00:36:57.896294 dracut-pre-trigger[336]: rd.md=0: removing MD RAID activation Jan 22 00:36:57.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:57.883698 systemd[1]: Starting Network Configuration... Jan 22 00:36:57.945331 kernel: audit: type=1130 audit(1769042217.909:15): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:57.898855 systemd[1]: Finished dracut pre-trigger hook. Jan 22 00:36:57.911459 systemd[1]: Starting Coldplug All udev Devices... Jan 22 00:36:57.921920 systemd-udevd[330]: /usr/lib64/udev/rules.d/50-udev-default.rules:42 Unknown group 'sgx', ignoring Jan 22 00:36:57.986927 systemd[1]: Finished Coldplug All udev Devices. Jan 22 00:36:58.021519 kernel: audit: type=1130 audit(1769042217.993:16): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:57.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:58.024020 systemd-networkd[362]: lo: Link UP Jan 22 00:36:58.024070 systemd-networkd[362]: lo: Gained carrier Jan 22 00:36:58.024355 systemd-networkd[362]: Enumeration completed Jan 22 00:36:58.040011 systemd[1]: Started Network Configuration. Jan 22 00:36:58.088237 kernel: audit: type=1130 audit(1769042218.046:17): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:58.088268 kernel: virtio_blk virtio1: [vda] 9289728 512-byte logical blocks (4.76 GB/4.43 GiB) Jan 22 00:36:58.088521 kernel: audit: type=1334 audit(1769042218.087:18): prog-id=10 op=LOAD Jan 22 00:36:58.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:58.087000 audit: BPF prog-id=10 op=LOAD Jan 22 00:36:58.089057 systemd[1]: Starting Network Name Resolution... Jan 22 00:36:58.119799 kernel: cryptd: max_cpu_qlen set to 1000 Jan 22 00:36:58.119828 kernel: vda: detected capacity change from 0 to 4756340736 Jan 22 00:36:58.128820 kernel: libata version 3.00 loaded. Jan 22 00:36:58.141808 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jan 22 00:36:58.159780 kernel: AVX2 version of gcm_enc/dec engaged. Jan 22 00:36:58.159806 kernel: AES CTR mode by8 optimization enabled Jan 22 00:36:58.162060 kernel: ahci 0000:00:1f.2: version 3.0 Jan 22 00:36:58.162399 kernel: PCI Interrupt Link [GSIA] enabled at IRQ 16 Jan 22 00:36:58.172657 systemd-resolved[387]: Positive Trust Anchors: Jan 22 00:36:58.840488 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Jan 22 00:36:58.840871 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Jan 22 00:36:58.840964 kernel: scsi host0: ahci Jan 22 00:36:58.841066 kernel: scsi host1: ahci Jan 22 00:36:58.841154 kernel: scsi host2: ahci Jan 22 00:36:58.841240 kernel: scsi host3: ahci Jan 22 00:36:58.841328 kernel: scsi host4: ahci Jan 22 00:36:58.841413 kernel: scsi host5: ahci Jan 22 00:36:58.841500 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 Jan 22 00:36:58.841511 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 Jan 22 00:36:58.841524 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 Jan 22 00:36:58.841536 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 Jan 22 00:36:58.841655 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 Jan 22 00:36:58.841667 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 Jan 22 00:36:58.841684 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/vda6 scanned by systemd-udevd (369) Jan 22 00:36:58.841694 kernel: ata1: SATA link down (SStatus 0 SControl 300) Jan 22 00:36:58.841703 kernel: ata2: SATA link down (SStatus 0 SControl 300) Jan 22 00:36:58.841781 kernel: ata4: SATA link down (SStatus 0 SControl 300) Jan 22 00:36:58.841792 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Jan 22 00:36:58.841802 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Jan 22 00:36:58.841811 kernel: ata3.00: applying bridge limits Jan 22 00:36:58.841821 kernel: ata3.00: configured for UDMA/100 Jan 22 00:36:58.841834 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Jan 22 00:36:58.841949 kernel: ata6: SATA link down (SStatus 0 SControl 300) Jan 22 00:36:58.841961 kernel: ata5: SATA link down (SStatus 0 SControl 300) Jan 22 00:36:58.172672 systemd-resolved[387]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jan 22 00:36:58.172772 systemd-resolved[387]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jan 22 00:36:58.173032 systemd-resolved[387]: Defaulting to hostname 'linux'. Jan 22 00:36:58.174261 systemd[1]: Started Network Name Resolution. Jan 22 00:36:58.971196 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Jan 22 00:36:58.971423 kernel: audit: type=1130 audit(1769042218.916:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:58.971440 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jan 22 00:36:58.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:58.174513 systemd-udevd[368]: Using default interface naming scheme 'v249'. Jan 22 00:36:58.198488 systemd-networkd[362]: eth0: Link UP Jan 22 00:36:58.923201 systemd[1]: Found device /dev/disk/by-label/ROOT. Jan 22 00:36:58.990853 systemd[1]: Found device /dev/disk/by-partuuid/7130c94a-213a-4e5a-8e26-6cce9662f132. Jan 22 00:36:58.998091 systemd[1]: Found device /dev/disk/by-partlabel/USR-A. Jan 22 00:36:59.022001 systemd[1]: Found device /dev/disk/by-label/EFI-SYSTEM. Jan 22 00:36:59.036960 systemd[1]: Found device /dev/disk/by-label/OEM. Jan 22 00:36:59.038274 systemd[1]: Reached target Initrd Root Device. Jan 22 00:36:59.061516 systemd[1]: Reached target Network. Jan 22 00:36:59.071260 systemd[1]: Reached target Host and Network Name Lookups. Jan 22 00:36:59.072939 systemd[1]: Starting Generate new UUID for disk GPT if necessary... Jan 22 00:36:59.107325 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jan 22 00:36:59.089838 systemd[1]: Starting iSCSI UserSpace I/O driver... Jan 22 00:36:59.223937 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Jan 22 00:36:59.224052 kernel: audit: type=1130 audit(1769042219.129:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:59.224062 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jan 22 00:36:59.224070 kernel: audit: type=1130 audit(1769042219.171:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:59.224077 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jan 22 00:36:59.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:59.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:59.119244 systemd[1]: Started iSCSI UserSpace I/O driver. Jan 22 00:36:59.132232 systemd[1]: Starting Open-iSCSI... Jan 22 00:36:59.226623 iscsid[456]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jan 22 00:36:59.226623 iscsid[456]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jan 22 00:36:59.226623 iscsid[456]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jan 22 00:36:59.226623 iscsid[456]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jan 22 00:36:59.226623 iscsid[456]: If using hardware iscsi like qla4xxx this message can be ignored. Jan 22 00:36:59.226623 iscsid[456]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jan 22 00:36:59.226623 iscsid[456]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jan 22 00:36:59.159003 systemd[1]: Started Open-iSCSI. Jan 22 00:36:59.174785 systemd[1]: Starting dracut initqueue hook... Jan 22 00:36:59.216443 systemd-networkd[362]: eth0: Gained carrier Jan 22 00:36:59.241317 systemd[1]: Finished dracut initqueue hook. Jan 22 00:36:59.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:59.391348 systemd[1]: Reached target Preparation for Remote File Systems. Jan 22 00:36:59.407334 kernel: audit: type=1130 audit(1769042219.365:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:36:59.396156 systemd[1]: Reached target Remote Encrypted Volumes. Jan 22 00:36:59.413228 systemd[1]: Reached target Remote File Systems. Jan 22 00:36:59.413947 systemd-networkd[362]: eth0: DHCPv4 address 10.0.0.6/16 via 10.0.0.1 Jan 22 00:36:59.426364 systemd[1]: Starting dracut pre-mount hook... Jan 22 00:36:59.468169 systemd[1]: Finished dracut pre-mount hook. Jan 22 00:36:59.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:00.162868 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jan 22 00:37:00.164662 disk-uuid[455]: The operation has completed successfully. Jan 22 00:37:00.226408 systemd[1]: disk-uuid.service: Deactivated successfully. Jan 22 00:37:00.226956 systemd[1]: Finished Generate new UUID for disk GPT if necessary. Jan 22 00:37:00.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:00.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:00.251533 systemd[1]: Starting Ignition (setup)... Jan 22 00:37:00.295951 kernel: BTRFS info (device vda6): disk space caching is enabled Jan 22 00:37:00.296012 kernel: BTRFS info (device vda6): has skinny extents Jan 22 00:37:00.338324 systemd[1]: mnt-oem.mount: Deactivated successfully. Jan 22 00:37:00.359949 systemd[1]: ignition-setup.service: Deactivated successfully. Jan 22 00:37:00.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:00.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:00.360143 systemd[1]: Finished Ignition (setup). Jan 22 00:37:00.372314 ignition[506]: Ignition v0.36.1-15-gde4e6cc9 Jan 22 00:37:00.365691 systemd[1]: Starting Ignition (disks)... Jan 22 00:37:00.372320 ignition[506]: Stage: disks Jan 22 00:37:00.372329 ignition[506]: reading system config file "/usr/lib/ignition/base.ign" Jan 22 00:37:00.372337 ignition[506]: no config at "/usr/lib/ignition/base.ign" Jan 22 00:37:00.372370 ignition[506]: parsed url from cmdline: "" Jan 22 00:37:00.372373 ignition[506]: no config URL provided Jan 22 00:37:00.372376 ignition[506]: reading system config file "/usr/lib/ignition/user.ign" Jan 22 00:37:00.372381 ignition[506]: no config at "/usr/lib/ignition/user.ign" Jan 22 00:37:00.372393 ignition[506]: op(1): [started] loading QEMU firmware config module Jan 22 00:37:00.372397 ignition[506]: op(1): executing: "modprobe" "qemu_fw_cfg" Jan 22 00:37:00.438333 ignition[506]: op(1): [finished] loading QEMU firmware config module Jan 22 00:37:00.465055 systemd-networkd[362]: eth0: Gained IPv6LL Jan 22 00:37:00.586837 ignition[506]: parsing config with SHA512: 75d4c495c57c58378ef2edc9de598782effb0d0e8d9ef5b97f117f494850dffdd6453533edee37f9360c870cda3b812abab7abe8ea1be6d7b62899b4bbd29842 Jan 22 00:37:00.592265 ignition[506]: disks: disks passed Jan 22 00:37:00.592335 ignition[506]: Ignition finished successfully Jan 22 00:37:00.605967 systemd[1]: ignition-disks.service: Deactivated successfully. Jan 22 00:37:00.606238 systemd[1]: Finished Ignition (disks). Jan 22 00:37:00.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:00.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:00.614319 systemd[1]: Reached target Preparation for Local File Systems. Jan 22 00:37:00.639843 systemd[1]: Starting File System Check on /dev/disk/by-label/ROOT... Jan 22 00:37:00.641330 systemd[1]: Starting Verity Setup for /dev/mapper/usr... Jan 22 00:37:00.684711 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Jan 22 00:37:00.709988 systemd-fsck[523]: ROOT: clean, 556/553792 files, 37783/553472 blocks Jan 22 00:37:00.721943 systemd[1]: Finished File System Check on /dev/disk/by-label/ROOT. Jan 22 00:37:00.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:00.723416 systemd[1]: Mounting /sysroot... Jan 22 00:37:00.793234 systemd[1]: Found device /dev/mapper/usr. Jan 22 00:37:00.795326 systemd[1]: Starting File System Check on /dev/mapper/usr... Jan 22 00:37:00.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:00.814047 systemd[1]: Finished Verity Setup for /dev/mapper/usr. Jan 22 00:37:00.851411 systemd-fsck[533]: fsck.ext4: Operation not permitted while trying to open /dev/mapper/usr Jan 22 00:37:00.851411 systemd-fsck[533]: You must have r/w access to the filesystem or be root Jan 22 00:37:00.852153 systemd-fsck[530]: fsck failed with exit status 8. Jan 22 00:37:00.852211 systemd-fsck[530]: Ignoring error. Jan 22 00:37:00.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:00.871231 systemd[1]: Finished File System Check on /dev/mapper/usr. Jan 22 00:37:00.885530 systemd[1]: Mounting /sysusr/usr... Jan 22 00:37:00.955836 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: (null) Jan 22 00:37:00.955896 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null) Jan 22 00:37:00.956091 systemd[1]: Mounted /sysusr/usr. Jan 22 00:37:00.984878 kernel: ext4 filesystem being mounted at /sysroot supports timestamps until 2038 (0x7fffffff) Jan 22 00:37:00.985522 systemd[1]: Mounted /sysroot. Jan 22 00:37:00.991114 systemd[1]: Reached target Initrd Root File System. Jan 22 00:37:01.001096 systemd[1]: Reached target Local File Systems. Jan 22 00:37:01.019031 systemd[1]: Reached target System Initialization. Jan 22 00:37:01.031200 systemd[1]: Reached target Basic System. Jan 22 00:37:01.044951 systemd[1]: Mounting /sysroot/usr... Jan 22 00:37:01.057168 systemd[1]: Mounted /sysroot/usr. Jan 22 00:37:01.071312 systemd[1]: Starting Root filesystem setup... Jan 22 00:37:01.165326 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jan 22 00:37:01.173524 systemd[1]: Finished Root filesystem setup. Jan 22 00:37:01.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.186003 systemd[1]: Starting Ignition (files)... Jan 22 00:37:01.193849 ignition[549]: Ignition v0.36.1-15-gde4e6cc9 Jan 22 00:37:01.193860 ignition[549]: Stage: files Jan 22 00:37:01.193870 ignition[549]: reading system config file "/usr/lib/ignition/base.ign" Jan 22 00:37:01.193882 ignition[549]: no config at "/usr/lib/ignition/base.ign" Jan 22 00:37:01.194694 ignition[549]: files: compiled without relabeling support, skipping Jan 22 00:37:01.224516 systemd[1]: Starting /sysroot/boot... Jan 22 00:37:01.271062 systemd[1]: Finished /sysroot/boot. Jan 22 00:37:01.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.293959 ignition[549]: files: createUsers: op(1): [started] creating or modifying user "core" Jan 22 00:37:01.294041 ignition[549]: files: createUsers: op(1): executing: "/usr/sbin/usermod" "--root" "/sysroot" "core" Jan 22 00:37:01.300219 ignition[549]: files: createUsers: op(1): [finished] creating or modifying user "core" Jan 22 00:37:01.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.300229 ignition[549]: files: createUsers: op(2): [started] adding ssh keys to user "core" Jan 22 00:37:01.307525 systemd[1]: ignition-files.service: Deactivated successfully. Jan 22 00:37:01.304982 ignition[549]: files: createUsers: op(2): [finished] adding ssh keys to user "core" Jan 22 00:37:01.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.307865 systemd[1]: Finished Ignition (files). Jan 22 00:37:01.305013 ignition[549]: files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/etc/flatcar/update.conf" Jan 22 00:37:01.321969 systemd[1]: Condition check resulted in Populate torcx store to satisfy profile being skipped. Jan 22 00:37:01.388000 audit: BPF prog-id=3 op=UNLOAD Jan 22 00:37:01.389000 audit: BPF prog-id=10 op=UNLOAD Jan 22 00:37:01.305512 ignition[549]: files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/etc/flatcar/update.conf" Jan 22 00:37:01.398000 audit: BPF prog-id=9 op=UNLOAD Jan 22 00:37:01.400000 audit: BPF prog-id=6 op=UNLOAD Jan 22 00:37:01.323064 systemd[1]: Starting Ignition (record completion)... Jan 22 00:37:01.305522 ignition[549]: files: op(4): [started] processing unit "coreos-metadata.service" Jan 22 00:37:01.339358 systemd[1]: Starting Reload Configuration from the Real Root... Jan 22 00:37:01.305661 ignition[549]: files: op(4): op(5): [started] writing unit "coreos-metadata.service" at "etc/systemd/system/coreos-metadata.service" Jan 22 00:37:01.353284 systemd[1]: ignition-quench.service: Deactivated successfully. Jan 22 00:37:01.306353 ignition[549]: files: op(4): op(5): [finished] writing unit "coreos-metadata.service" at "etc/systemd/system/coreos-metadata.service" Jan 22 00:37:01.353919 systemd[1]: Finished Ignition (record completion). Jan 22 00:37:01.306361 ignition[549]: files: op(4): [finished] processing unit "coreos-metadata.service" Jan 22 00:37:01.372319 systemd[1]: Reloading. Jan 22 00:37:01.306367 ignition[549]: files: files passed Jan 22 00:37:01.306372 ignition[549]: Ignition finished successfully Jan 22 00:37:01.576000 audit: BPF prog-id=11 op=LOAD Jan 22 00:37:01.577000 audit: BPF prog-id=12 op=LOAD Jan 22 00:37:01.577000 audit: BPF prog-id=13 op=LOAD Jan 22 00:37:01.577000 audit: BPF prog-id=4 op=UNLOAD Jan 22 00:37:01.577000 audit: BPF prog-id=5 op=UNLOAD Jan 22 00:37:01.579000 audit: BPF prog-id=14 op=LOAD Jan 22 00:37:01.580000 audit: BPF prog-id=15 op=LOAD Jan 22 00:37:01.581000 audit: BPF prog-id=16 op=LOAD Jan 22 00:37:01.582000 audit: BPF prog-id=17 op=LOAD Jan 22 00:37:01.583000 audit: BPF prog-id=18 op=LOAD Jan 22 00:37:01.583000 audit: BPF prog-id=7 op=UNLOAD Jan 22 00:37:01.583000 audit: BPF prog-id=8 op=UNLOAD Jan 22 00:37:01.618239 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jan 22 00:37:01.618495 systemd[1]: Finished Reload Configuration from the Real Root. Jan 22 00:37:01.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.646219 systemd[1]: Reached target Initrd File Systems. Jan 22 00:37:01.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.660864 systemd[1]: Reached target Initrd Default Target. Jan 22 00:37:01.666956 systemd[1]: Condition check resulted in dracut mount hook being skipped. Jan 22 00:37:01.668295 systemd[1]: Starting dracut pre-pivot and cleanup hook... Jan 22 00:37:01.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.686861 systemd[1]: Finished dracut pre-pivot and cleanup hook. Jan 22 00:37:01.700055 systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Jan 22 00:37:01.720460 systemd[1]: Stopped target Host and Network Name Lookups. Jan 22 00:37:01.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.729915 systemd[1]: Stopped target Remote Encrypted Volumes. Jan 22 00:37:01.737395 systemd[1]: Stopped target Timer Units. Jan 22 00:37:01.746880 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jan 22 00:37:01.747089 systemd[1]: Stopped dracut pre-pivot and cleanup hook. Jan 22 00:37:01.761005 systemd[1]: Stopped target Initrd Default Target. Jan 22 00:37:01.773433 systemd[1]: Stopped target Basic System. Jan 22 00:37:01.788283 systemd[1]: Stopped target Initrd Root Device. Jan 22 00:37:01.801406 systemd[1]: Stopped target Path Units. Jan 22 00:37:01.811815 systemd[1]: Stopped target Remote File Systems. Jan 22 00:37:01.822139 systemd[1]: Stopped target Preparation for Remote File Systems. Jan 22 00:37:01.832163 systemd[1]: Stopped target Slice Units. Jan 22 00:37:01.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.974483 iscsid[456]: iscsid shutting down. Jan 22 00:37:01.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.842368 systemd[1]: Stopped target Socket Units. Jan 22 00:37:01.985000 audit: BPF prog-id=14 op=UNLOAD Jan 22 00:37:01.851533 systemd[1]: Stopped target System Initialization. Jan 22 00:37:01.861452 systemd[1]: Stopped target Local File Systems. Jan 22 00:37:01.866905 systemd[1]: Stopped target Preparation for Local File Systems. Jan 22 00:37:01.880304 systemd[1]: Stopped target Swaps. Jan 22 00:37:01.880663 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jan 22 00:37:02.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.880877 systemd[1]: Stopped dracut pre-mount hook. Jan 22 00:37:01.888178 systemd[1]: Stopped target Local Encrypted Volumes. Jan 22 00:37:01.889826 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jan 22 00:37:02.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.893940 systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Jan 22 00:37:01.895006 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jan 22 00:37:01.895163 systemd[1]: Stopped dracut initqueue hook. Jan 22 00:37:02.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:02.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:02.110000 audit: BPF prog-id=16 op=UNLOAD Jan 22 00:37:01.898083 systemd[1]: Stopping Open-iSCSI... Jan 22 00:37:01.900187 systemd[1]: Stopping /sysroot/boot... Jan 22 00:37:02.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.900365 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jan 22 00:37:01.900533 systemd[1]: Stopped Coldplug All udev Devices. Jan 22 00:37:02.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:02.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.909285 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jan 22 00:37:01.909468 systemd[1]: Stopped dracut pre-trigger hook. Jan 22 00:37:02.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.920443 systemd[1]: iscsid.service: Deactivated successfully. Jan 22 00:37:02.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:02.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.920850 systemd[1]: Stopped Open-iSCSI. Jan 22 00:37:02.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=rngd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.923135 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jan 22 00:37:01.924316 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jan 22 00:37:02.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:02.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:01.924484 systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Jan 22 00:37:01.932522 systemd[1]: iscsid.socket: Deactivated successfully. Jan 22 00:37:01.932709 systemd[1]: Closed Open-iSCSI iscsid Socket. Jan 22 00:37:01.933664 systemd[1]: Stopping iSCSI UserSpace I/O driver... Jan 22 00:37:01.938664 systemd[1]: iscsiuio.service: Deactivated successfully. Jan 22 00:37:01.938932 systemd[1]: Stopped iSCSI UserSpace I/O driver. Jan 22 00:37:02.254000 audit: BPF prog-id=11 op=UNLOAD Jan 22 00:37:01.939532 systemd[1]: Stopped target Network. Jan 22 00:37:01.945900 systemd[1]: iscsiuio.socket: Deactivated successfully. Jan 22 00:37:01.945937 systemd[1]: Closed Open-iSCSI iscsiuio Socket. Jan 22 00:37:01.952115 systemd[1]: Stopping Network Name Resolution... Jan 22 00:37:01.967382 systemd[1]: systemd-resolved.service: Deactivated successfully. Jan 22 00:37:01.967962 systemd[1]: Stopped Network Name Resolution. Jan 22 00:37:01.974921 systemd[1]: sysroot-boot.service: Deactivated successfully. Jan 22 00:37:01.975102 systemd[1]: Stopped /sysroot/boot. Jan 22 00:37:01.985527 systemd[1]: Stopping Network Configuration... Jan 22 00:37:01.989214 systemd-networkd[362]: eth0: DHCP lease lost Jan 22 00:37:02.017893 systemd-networkd[362]: eth0: DHCPv6 lease lost Jan 22 00:37:02.022098 systemd[1]: systemd-networkd.service: Deactivated successfully. Jan 22 00:37:02.022300 systemd[1]: Stopped Network Configuration. Jan 22 00:37:02.285000 audit: BPF prog-id=15 op=UNLOAD Jan 22 00:37:02.035448 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jan 22 00:37:02.035486 systemd[1]: Closed Network Service Netlink Socket. Jan 22 00:37:02.046451 systemd[1]: Stopping Network Cleanup... Jan 22 00:37:02.055242 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jan 22 00:37:02.055326 systemd[1]: Stopped Apply Kernel Variables. Jan 22 00:37:02.061071 systemd[1]: Stopping Rule-based Manager for Device Events and Files... Jan 22 00:37:02.083534 systemd[1]: systemd-udevd.service: Deactivated successfully. Jan 22 00:37:02.084268 systemd[1]: Stopped Rule-based Manager for Device Events and Files. Jan 22 00:37:02.099986 systemd[1]: network-cleanup.service: Deactivated successfully. Jan 22 00:37:02.100186 systemd[1]: Stopped Network Cleanup. Jan 22 00:37:02.109923 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jan 22 00:37:02.109976 systemd[1]: Closed udev Control Socket. Jan 22 00:37:02.115034 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jan 22 00:37:02.115073 systemd[1]: Closed udev Kernel Socket. Jan 22 00:37:02.125145 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jan 22 00:37:02.125203 systemd[1]: Stopped dracut pre-udev hook. Jan 22 00:37:02.136846 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jan 22 00:37:02.136905 systemd[1]: Stopped dracut cmdline hook. Jan 22 00:37:02.148032 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jan 22 00:37:02.148092 systemd[1]: Stopped dracut ask for additional cmdline parameters. Jan 22 00:37:02.161092 systemd[1]: Starting Cleanup udev Database... Jan 22 00:37:02.172302 systemd[1]: Stopping Hardware RNG Entropy Gatherer Daemon... Jan 22 00:37:02.178069 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jan 22 00:37:02.178120 systemd[1]: Stopped Create Static Device Nodes in /dev. Jan 22 00:37:02.178308 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jan 22 00:37:02.178341 systemd[1]: Stopped Create List of Static Device Nodes. Jan 22 00:37:02.196259 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jan 22 00:37:02.196306 systemd[1]: Stopped Setup Virtual Console. Jan 22 00:37:02.202914 systemd[1]: rngd.service: Deactivated successfully. Jan 22 00:37:02.203098 systemd[1]: Stopped Hardware RNG Entropy Gatherer Daemon. Jan 22 00:37:02.214936 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jan 22 00:37:02.215113 systemd[1]: Finished Cleanup udev Database. Jan 22 00:37:02.223839 systemd[1]: Reached target Switch Root. Jan 22 00:37:02.230867 systemd[1]: Starting Switch Root... Jan 22 00:37:02.252439 systemd[1]: Switching root. Jan 22 00:37:02.286974 systemd-journald[191]: Journal stopped Jan 22 00:37:06.852361 systemd-journald[191]: Received SIGTERM from PID 1 (n/a). Jan 22 00:37:06.852413 kernel: SELinux: policy capability network_peer_controls=1 Jan 22 00:37:06.852428 kernel: SELinux: policy capability open_perms=1 Jan 22 00:37:06.852443 kernel: SELinux: policy capability extended_socket_class=1 Jan 22 00:37:06.852456 kernel: SELinux: policy capability always_check_network=0 Jan 22 00:37:06.852469 kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 00:37:06.852488 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 00:37:06.852499 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jan 22 00:37:06.852512 systemd[1]: Successfully loaded SELinux policy in 118.932ms. Jan 22 00:37:06.852530 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 8.860ms. Jan 22 00:37:06.852671 systemd[1]: systemd 249 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jan 22 00:37:06.852693 systemd[1]: Detected virtualization kvm. Jan 22 00:37:06.852706 systemd[1]: Detected architecture x86-64. Jan 22 00:37:06.852717 systemd[1]: Detected first boot. Jan 22 00:37:06.852731 systemd[1]: Initializing machine ID from VM UUID. Jan 22 00:37:06.852742 kernel: kauditd_printk_skb: 71 callbacks suppressed Jan 22 00:37:06.852754 kernel: audit: type=1400 audit(1769042222.912:94): avc: denied { associate } for pid=713 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jan 22 00:37:06.852771 systemd[1]: Populated /etc with preset unit settings. Jan 22 00:37:06.852853 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jan 22 00:37:06.852869 systemd[1]: initrd-switch-root.service: Current command vanished from the unit file, execution of the command list won't be resumed. Jan 22 00:37:06.852881 kernel: audit: type=1334 audit(1769042225.988:95): prog-id=21 op=LOAD Jan 22 00:37:06.852896 kernel: audit: type=1334 audit(1769042225.998:96): prog-id=22 op=LOAD Jan 22 00:37:06.852908 kernel: audit: type=1334 audit(1769042225.998:97): prog-id=23 op=LOAD Jan 22 00:37:06.852918 kernel: audit: type=1334 audit(1769042225.998:98): prog-id=12 op=UNLOAD Jan 22 00:37:06.852930 kernel: audit: type=1334 audit(1769042225.998:99): prog-id=13 op=UNLOAD Jan 22 00:37:06.852942 kernel: audit: type=1334 audit(1769042226.050:100): prog-id=24 op=LOAD Jan 22 00:37:06.852955 kernel: audit: type=1334 audit(1769042226.050:101): prog-id=21 op=UNLOAD Jan 22 00:37:06.852967 kernel: audit: type=1334 audit(1769042226.060:102): prog-id=25 op=LOAD Jan 22 00:37:06.852978 kernel: audit: type=1334 audit(1769042226.073:103): prog-id=26 op=LOAD Jan 22 00:37:06.852989 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jan 22 00:37:06.852999 systemd[1]: Stopped Switch Root. Jan 22 00:37:06.853007 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jan 22 00:37:06.853014 systemd[1]: Created slice Slice /system/addon-config. Jan 22 00:37:06.853022 systemd[1]: Created slice Slice /system/addon-run. Jan 22 00:37:06.853029 systemd[1]: Created slice Slice /system/getty. Jan 22 00:37:06.853036 systemd[1]: Created slice Slice /system/modprobe. Jan 22 00:37:06.853044 systemd[1]: Created slice Slice /system/serial-getty. Jan 22 00:37:06.853051 systemd[1]: Created slice Slice /system/system-cloudinit. Jan 22 00:37:06.853058 systemd[1]: Created slice Slice /system/systemd-fsck. Jan 22 00:37:06.853066 systemd[1]: Created slice User and Session Slice. Jan 22 00:37:06.853073 systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Jan 22 00:37:06.853080 systemd[1]: Started Forward Password Requests to Wall Directory Watch. Jan 22 00:37:06.853091 systemd[1]: Set up automount Boot partition Automount Point. Jan 22 00:37:06.853098 systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Jan 22 00:37:06.853105 systemd[1]: Stopped target Switch Root. Jan 22 00:37:06.853113 systemd[1]: Stopped target Initrd File Systems. Jan 22 00:37:06.853120 systemd[1]: Stopped target Initrd Root File System. Jan 22 00:37:06.853127 systemd[1]: Reached target Remote Encrypted Volumes. Jan 22 00:37:06.853135 systemd[1]: Reached target Remote File Systems. Jan 22 00:37:06.853142 systemd[1]: Reached target Slice Units. Jan 22 00:37:06.853150 systemd[1]: Reached target Swaps. Jan 22 00:37:06.853158 systemd[1]: Reached target Verify torcx succeeded. Jan 22 00:37:06.853165 systemd[1]: Reached target Local Verity Protected Volumes. Jan 22 00:37:06.853172 systemd[1]: Listening on Process Core Dump Socket. Jan 22 00:37:06.853180 systemd[1]: Listening on initctl Compatibility Named Pipe. Jan 22 00:37:06.853187 systemd[1]: Listening on Network Service Netlink Socket. Jan 22 00:37:06.853194 systemd[1]: Listening on udev Control Socket. Jan 22 00:37:06.853201 systemd[1]: Listening on udev Kernel Socket. Jan 22 00:37:06.853208 systemd[1]: Mounting Huge Pages File System... Jan 22 00:37:06.853216 systemd[1]: Mounting POSIX Message Queue File System... Jan 22 00:37:06.853224 systemd[1]: Mounting External Media Directory... Jan 22 00:37:06.853231 systemd[1]: Condition check resulted in /proc/xen being skipped. Jan 22 00:37:06.853238 systemd[1]: Mounting Kernel Debug File System... Jan 22 00:37:06.853245 systemd[1]: Mounting Kernel Trace File System... Jan 22 00:37:06.853252 systemd[1]: Mounting Temporary Directory /tmp... Jan 22 00:37:06.853260 systemd[1]: Starting Create missing system files... Jan 22 00:37:06.853267 systemd[1]: Starting Create List of Static Device Nodes... Jan 22 00:37:06.853274 systemd[1]: Starting Load Kernel Module configfs... Jan 22 00:37:06.853282 systemd[1]: Starting Load Kernel Module drm... Jan 22 00:37:06.853290 systemd[1]: Starting Load Kernel Module fuse... Jan 22 00:37:06.853297 systemd[1]: Condition check resulted in Create /etc/nsswitch.conf being skipped. Jan 22 00:37:06.853304 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jan 22 00:37:06.853311 systemd[1]: Stopped File System Check on Root Device. Jan 22 00:37:06.853318 kernel: fuse: init (API version 7.32) Jan 22 00:37:06.853325 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jan 22 00:37:06.853333 systemd[1]: Stopped systemd-fsck-usr.service. Jan 22 00:37:06.853340 systemd[1]: Stopped Journal Service. Jan 22 00:37:06.853348 systemd[1]: systemd-journald.service: Consumed 1.859s CPU time. Jan 22 00:37:06.853359 systemd[1]: Starting Journal Service... Jan 22 00:37:06.853366 systemd[1]: Condition check resulted in Load Kernel Modules being skipped. Jan 22 00:37:06.853373 systemd[1]: Starting Remount Root and Kernel File Systems... Jan 22 00:37:06.853383 systemd-journald[767]: Journal started Jan 22 00:37:06.853421 systemd-journald[767]: Runtime Journal (/run/log/journal/b53a3caba5254259b70f35481b88a13c) is 6.0M, max 48.7M, 42.6M free. Jan 22 00:37:02.587000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jan 22 00:37:02.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jan 22 00:37:02.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jan 22 00:37:02.763000 audit: BPF prog-id=19 op=LOAD Jan 22 00:37:02.763000 audit: BPF prog-id=19 op=UNLOAD Jan 22 00:37:02.763000 audit: BPF prog-id=20 op=LOAD Jan 22 00:37:02.764000 audit: BPF prog-id=20 op=UNLOAD Jan 22 00:37:02.912000 audit[713]: AVC avc: denied { associate } for pid=713 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jan 22 00:37:05.988000 audit: BPF prog-id=21 op=LOAD Jan 22 00:37:05.998000 audit: BPF prog-id=22 op=LOAD Jan 22 00:37:05.998000 audit: BPF prog-id=23 op=LOAD Jan 22 00:37:05.998000 audit: BPF prog-id=12 op=UNLOAD Jan 22 00:37:05.998000 audit: BPF prog-id=13 op=UNLOAD Jan 22 00:37:06.050000 audit: BPF prog-id=24 op=LOAD Jan 22 00:37:06.050000 audit: BPF prog-id=21 op=UNLOAD Jan 22 00:37:06.060000 audit: BPF prog-id=25 op=LOAD Jan 22 00:37:06.073000 audit: BPF prog-id=26 op=LOAD Jan 22 00:37:06.076000 audit: BPF prog-id=22 op=UNLOAD Jan 22 00:37:06.076000 audit: BPF prog-id=23 op=UNLOAD Jan 22 00:37:06.084000 audit: BPF prog-id=27 op=LOAD Jan 22 00:37:06.084000 audit: BPF prog-id=24 op=UNLOAD Jan 22 00:37:06.084000 audit: BPF prog-id=28 op=LOAD Jan 22 00:37:06.085000 audit: BPF prog-id=29 op=LOAD Jan 22 00:37:06.085000 audit: BPF prog-id=25 op=UNLOAD Jan 22 00:37:06.085000 audit: BPF prog-id=26 op=UNLOAD Jan 22 00:37:06.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:06.104000 audit: BPF prog-id=27 op=UNLOAD Jan 22 00:37:06.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:06.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:06.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:06.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:06.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:06.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:06.798000 audit: BPF prog-id=30 op=LOAD Jan 22 00:37:06.799000 audit: BPF prog-id=31 op=LOAD Jan 22 00:37:06.800000 audit: BPF prog-id=32 op=LOAD Jan 22 00:37:06.800000 audit: BPF prog-id=28 op=UNLOAD Jan 22 00:37:06.800000 audit: BPF prog-id=29 op=UNLOAD Jan 22 00:37:06.846000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jan 22 00:37:02.903120 /usr/lib64/systemd/system-generators/torcx-generator[713]: time="2026-01-22T00:37:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3033.2.4 /usr/share/oem/torcx/store /var/lib/torcx/store/3033.2.4 /var/lib/torcx/store]" Jan 22 00:37:05.987451 systemd[1]: Queued start job for default target Multi-User System. Jan 22 00:37:02.904997 /usr/lib64/systemd/system-generators/torcx-generator[713]: time="2026-01-22T00:37:02Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jan 22 00:37:06.086472 systemd[1]: systemd-journald.service: Deactivated successfully. Jan 22 00:37:02.905029 /usr/lib64/systemd/system-generators/torcx-generator[713]: time="2026-01-22T00:37:02Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jan 22 00:37:06.087269 systemd[1]: systemd-journald.service: Consumed 1.859s CPU time. Jan 22 00:37:02.906386 /usr/lib64/systemd/system-generators/torcx-generator[713]: time="2026-01-22T00:37:02Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jan 22 00:37:02.906401 /usr/lib64/systemd/system-generators/torcx-generator[713]: time="2026-01-22T00:37:02Z" level=debug msg="skipped missing lower profile" missing profile=oem Jan 22 00:37:02.906668 /usr/lib64/systemd/system-generators/torcx-generator[713]: time="2026-01-22T00:37:02Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jan 22 00:37:02.906686 /usr/lib64/systemd/system-generators/torcx-generator[713]: time="2026-01-22T00:37:02Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jan 22 00:37:02.907007 /usr/lib64/systemd/system-generators/torcx-generator[713]: time="2026-01-22T00:37:02Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jan 22 00:37:02.907053 /usr/lib64/systemd/system-generators/torcx-generator[713]: time="2026-01-22T00:37:02Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jan 22 00:37:02.907077 /usr/lib64/systemd/system-generators/torcx-generator[713]: time="2026-01-22T00:37:02Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jan 22 00:37:02.910834 /usr/lib64/systemd/system-generators/torcx-generator[713]: time="2026-01-22T00:37:02Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jan 22 00:37:02.910882 /usr/lib64/systemd/system-generators/torcx-generator[713]: time="2026-01-22T00:37:02Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jan 22 00:37:02.910905 /usr/lib64/systemd/system-generators/torcx-generator[713]: time="2026-01-22T00:37:02Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3033.2.4: no such file or directory" path=/usr/share/oem/torcx/store/3033.2.4 Jan 22 00:37:02.910921 /usr/lib64/systemd/system-generators/torcx-generator[713]: time="2026-01-22T00:37:02Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jan 22 00:37:02.910941 /usr/lib64/systemd/system-generators/torcx-generator[713]: time="2026-01-22T00:37:02Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3033.2.4: no such file or directory" path=/var/lib/torcx/store/3033.2.4 Jan 22 00:37:02.910959 /usr/lib64/systemd/system-generators/torcx-generator[713]: time="2026-01-22T00:37:02Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jan 22 00:37:05.610987 /usr/lib64/systemd/system-generators/torcx-generator[713]: time="2026-01-22T00:37:05Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jan 22 00:37:05.611305 /usr/lib64/systemd/system-generators/torcx-generator[713]: time="2026-01-22T00:37:05Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jan 22 00:37:05.611415 /usr/lib64/systemd/system-generators/torcx-generator[713]: time="2026-01-22T00:37:05Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jan 22 00:37:05.611652 /usr/lib64/systemd/system-generators/torcx-generator[713]: time="2026-01-22T00:37:05Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jan 22 00:37:05.611722 /usr/lib64/systemd/system-generators/torcx-generator[713]: time="2026-01-22T00:37:05Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jan 22 00:37:05.611862 /usr/lib64/systemd/system-generators/torcx-generator[713]: time="2026-01-22T00:37:05Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jan 22 00:37:06.872455 systemd[1]: Starting Apply Kernel Variables... Jan 22 00:37:06.889969 systemd[1]: Starting Coldplug All udev Devices... Jan 22 00:37:06.906130 systemd[1]: verity-setup.service: Deactivated successfully. Jan 22 00:37:06.906193 systemd[1]: Stopped verity-setup.service. Jan 22 00:37:06.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:06.926736 systemd[1]: Condition check resulted in Set fake PV driver version for XenServer being skipped. Jan 22 00:37:06.939436 systemd[1]: Started Journal Service. Jan 22 00:37:06.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:06.942197 systemd[1]: Mounted Huge Pages File System. Jan 22 00:37:06.949766 systemd[1]: Mounted POSIX Message Queue File System. Jan 22 00:37:06.956443 systemd[1]: Mounted External Media Directory. Jan 22 00:37:06.963987 systemd[1]: Mounted Kernel Debug File System. Jan 22 00:37:06.972415 systemd[1]: Mounted Kernel Trace File System. Jan 22 00:37:06.980409 systemd[1]: Mounted Temporary Directory /tmp. Jan 22 00:37:06.987453 systemd[1]: Finished Create missing system files. Jan 22 00:37:06.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:06.995395 systemd[1]: Finished Create List of Static Device Nodes. Jan 22 00:37:07.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:07.007426 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jan 22 00:37:07.008001 systemd[1]: Finished Load Kernel Module configfs. Jan 22 00:37:07.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:07.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:07.015912 systemd[1]: modprobe@drm.service: Deactivated successfully. Jan 22 00:37:07.016246 systemd[1]: Finished Load Kernel Module drm. Jan 22 00:37:07.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:07.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:07.023315 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jan 22 00:37:07.023509 systemd[1]: Finished Load Kernel Module fuse. Jan 22 00:37:07.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:07.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:07.031433 systemd[1]: Finished Remount Root and Kernel File Systems. Jan 22 00:37:07.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:07.040314 systemd[1]: Finished Apply Kernel Variables. Jan 22 00:37:07.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:07.059519 systemd[1]: Mounting FUSE Control File System... Jan 22 00:37:07.068263 systemd[1]: Mounting Kernel Configuration File System... Jan 22 00:37:07.077485 systemd[1]: Condition check resulted in Remount Root File System being skipped. Jan 22 00:37:07.080854 systemd[1]: Starting Rebuild Hardware Database... Jan 22 00:37:07.088344 systemd[1]: Starting Flush Journal to Persistent Storage... Jan 22 00:37:07.094968 systemd[1]: Condition check resulted in Platform Persistent Storage Archival being skipped. Jan 22 00:37:07.097299 systemd[1]: Starting Load/Save Random Seed... Jan 22 00:37:07.098288 systemd-journald[767]: Time spent on flushing to /var/log/journal/b53a3caba5254259b70f35481b88a13c is 17.099ms for 1001 entries. Jan 22 00:37:07.098288 systemd-journald[767]: System Journal (/var/log/journal/b53a3caba5254259b70f35481b88a13c) is 8.0M, max 203.0M, 195.0M free. Jan 22 00:37:07.116707 systemd[1]: Starting Create System Users... Jan 22 00:37:07.125232 systemd[1]: Mounted FUSE Control File System. Jan 22 00:37:07.131017 systemd[1]: Mounted Kernel Configuration File System. Jan 22 00:37:07.140743 systemd[1]: Finished Flush Journal to Persistent Storage. Jan 22 00:37:07.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:07.150282 systemd[1]: Finished Load/Save Random Seed. Jan 22 00:37:07.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:07.156400 systemd[1]: Reached target First Boot Complete. Jan 22 00:37:07.165329 systemd[1]: Finished Coldplug All udev Devices. Jan 22 00:37:07.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:07.173781 systemd[1]: Starting Wait for udev To Complete Device Initialization... Jan 22 00:37:07.184090 systemd-sysusers[779]: Creating group sgx with gid 999. Jan 22 00:37:07.186190 systemd-sysusers[779]: Creating group systemd-oom with gid 998. Jan 22 00:37:07.187884 systemd-sysusers[779]: Creating user systemd-oom (systemd Userspace OOM Killer) with uid 998 and gid 998. Jan 22 00:37:07.190259 systemd-sysusers[779]: Creating group systemd-timesync with gid 997. Jan 22 00:37:07.191666 systemd-sysusers[779]: Creating user systemd-timesync (systemd Time Synchronization) with uid 997 and gid 997. Jan 22 00:37:07.193526 systemd-sysusers[779]: Creating group systemd-coredump with gid 996. Jan 22 00:37:07.195109 systemd-sysusers[779]: Creating user systemd-coredump (systemd Core Dumper) with uid 996 and gid 996. Jan 22 00:37:07.235022 systemd[1]: Finished Create System Users. Jan 22 00:37:07.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:07.256364 systemd[1]: Starting Create Static Device Nodes in /dev... Jan 22 00:37:07.311193 systemd[1]: Finished Create Static Device Nodes in /dev. Jan 22 00:37:07.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:07.566989 systemd[1]: Finished Rebuild Hardware Database. Jan 22 00:37:07.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:07.584000 audit: BPF prog-id=33 op=LOAD Jan 22 00:37:07.586000 audit: BPF prog-id=34 op=LOAD Jan 22 00:37:07.586000 audit: BPF prog-id=35 op=LOAD Jan 22 00:37:07.586000 audit: BPF prog-id=17 op=UNLOAD Jan 22 00:37:07.586000 audit: BPF prog-id=18 op=UNLOAD Jan 22 00:37:07.588281 systemd[1]: Starting Rule-based Manager for Device Events and Files... Jan 22 00:37:07.685920 systemd[1]: Started Rule-based Manager for Device Events and Files. Jan 22 00:37:07.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:07.702335 systemd[1]: Starting Network Configuration... Jan 22 00:37:07.700000 audit: BPF prog-id=36 op=LOAD Jan 22 00:37:07.742433 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Jan 22 00:37:07.758674 kernel: ACPI: Power Button [PWRF] Jan 22 00:37:07.751000 audit[798]: AVC avc: denied { confidentiality } for pid=798 comm="systemd-udevd" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jan 22 00:37:07.762041 systemd-udevd[801]: Using default interface naming scheme 'v249'. Jan 22 00:37:07.814725 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Jan 22 00:37:07.822186 systemd-networkd[795]: lo: Link UP Jan 22 00:37:07.822316 systemd-networkd[795]: lo: Gained carrier Jan 22 00:37:07.823092 systemd-networkd[795]: Enumeration completed Jan 22 00:37:07.846430 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Jan 22 00:37:07.846923 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Jan 22 00:37:07.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:07.823387 systemd[1]: Started Network Configuration. Jan 22 00:37:07.827505 systemd-networkd[795]: eth0: Link UP Jan 22 00:37:07.858918 systemd-networkd[795]: eth0: Gained carrier Jan 22 00:37:07.873429 systemd-networkd[795]: eth0: DHCPv4 address 10.0.0.6/16 via 10.0.0.1 Jan 22 00:37:07.900936 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Jan 22 00:37:07.931445 udevadm[783]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jan 22 00:37:07.986764 kernel: mousedev: PS/2 mouse device common for all mice Jan 22 00:37:08.001763 kernel: kvm: Nested Virtualization enabled Jan 22 00:37:08.001924 kernel: SVM: kvm: Nested Paging enabled Jan 22 00:37:08.001946 kernel: SVM: Virtual VMLOAD VMSAVE supported Jan 22 00:37:08.015765 kernel: EDAC MC: Ver: 3.0.0 Jan 22 00:37:08.559466 systemd[1]: Finished Wait for udev To Complete Device Initialization. Jan 22 00:37:08.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:08.575099 kernel: kauditd_printk_skb: 49 callbacks suppressed Jan 22 00:37:08.575148 kernel: audit: type=1130 audit(1769042228.567:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:08.610495 systemd[1]: Starting Activation of LVM2 logical volumes... Jan 22 00:37:08.649165 lvm[816]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jan 22 00:37:08.677292 systemd[1]: Finished Activation of LVM2 logical volumes. Jan 22 00:37:08.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:08.684117 systemd[1]: Reached target Local Encrypted Volumes. Jan 22 00:37:08.717798 kernel: audit: type=1130 audit(1769042228.683:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:08.735317 systemd[1]: Starting Activation of LVM2 logical volumes... Jan 22 00:37:08.753090 lvm[817]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jan 22 00:37:08.781443 systemd[1]: Finished Activation of LVM2 logical volumes. Jan 22 00:37:08.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:08.790156 systemd[1]: Reached target Preparation for Local File Systems. Jan 22 00:37:08.818995 kernel: audit: type=1130 audit(1769042228.789:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:08.826399 systemd[1]: Condition check resulted in Virtual Machine and Container Storage (Compatibility) being skipped. Jan 22 00:37:08.826506 systemd[1]: Reached target Containers. Jan 22 00:37:08.836059 systemd[1]: Starting File System Check on /dev/disk/by-label/OEM... Jan 22 00:37:08.903341 systemd[1]: Finished File System Check on /dev/disk/by-label/OEM. Jan 22 00:37:08.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:08.947962 kernel: audit: type=1130 audit(1769042228.911:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:08.952380 systemd[1]: Mounting /usr/share/oem... Jan 22 00:37:08.977869 kernel: BTRFS info (device vda6): disk space caching is enabled Jan 22 00:37:08.977963 kernel: BTRFS info (device vda6): has skinny extents Jan 22 00:37:09.001779 systemd[1]: Mounted /usr/share/oem. Jan 22 00:37:09.006981 systemd[1]: Reached target Local File Systems. Jan 22 00:37:09.023204 systemd[1]: Starting Rebuild Dynamic Linker Cache... Jan 22 00:37:09.029492 systemd[1]: Condition check resulted in Set Up Additional Binary Formats being skipped. Jan 22 00:37:09.029905 systemd[1]: Condition check resulted in Store a System Token in an EFI Variable being skipped. Jan 22 00:37:09.032031 systemd[1]: Starting Commit a transient machine-id on disk... Jan 22 00:37:09.039749 systemd[1]: Starting Create Volatile Files and Directories... Jan 22 00:37:09.054092 systemd-tmpfiles[842]: /usr/lib64/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jan 22 00:37:09.055983 systemd-tmpfiles[842]: /usr/lib64/tmpfiles.d/systemd.conf:33: Duplicate line for path "/var/lib/systemd", ignoring. Jan 22 00:37:09.093767 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jan 22 00:37:09.095864 systemd[1]: Finished Commit a transient machine-id on disk. Jan 22 00:37:09.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:09.138669 kernel: audit: type=1130 audit(1769042229.102:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:09.139949 systemd-tmpfiles[842]: Detected autofs mount point /boot during canonicalization of /boot. Jan 22 00:37:09.140010 systemd-tmpfiles[842]: Skipping /boot Jan 22 00:37:09.148336 systemd-tmpfiles[842]: Detected autofs mount point /boot during canonicalization of /boot. Jan 22 00:37:09.148398 systemd-tmpfiles[842]: Skipping /boot Jan 22 00:37:09.203154 systemd[1]: Finished Create Volatile Files and Directories. Jan 22 00:37:09.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:09.241993 kernel: audit: type=1130 audit(1769042229.213:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:09.248116 systemd[1]: Starting Load Security Auditing Rules... Jan 22 00:37:09.258277 systemd[1]: Starting Clean up broken links in /etc/ssl/certs... Jan 22 00:37:09.269785 systemd[1]: Starting Rebuild Journal Catalog... Jan 22 00:37:09.279000 audit: BPF prog-id=37 op=LOAD Jan 22 00:37:09.283282 systemd[1]: Starting Network Name Resolution... Jan 22 00:37:09.290680 kernel: audit: type=1334 audit(1769042229.279:159): prog-id=37 op=LOAD Jan 22 00:37:09.297000 audit: BPF prog-id=38 op=LOAD Jan 22 00:37:09.302273 systemd[1]: Starting Network Time Synchronization... Jan 22 00:37:09.310672 kernel: audit: type=1334 audit(1769042229.297:160): prog-id=38 op=LOAD Jan 22 00:37:09.319490 systemd[1]: Starting Record System Boot/Shutdown in UTMP... Jan 22 00:37:09.334000 audit[855]: SYSTEM_BOOT pid=855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib64/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jan 22 00:37:09.329271 systemd[1]: Finished Clean up broken links in /etc/ssl/certs. Jan 22 00:37:09.370913 kernel: audit: type=1127 audit(1769042229.334:161): pid=855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib64/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jan 22 00:37:09.372202 kernel: audit: type=1130 audit(1769042229.370:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:09.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:09.372518 systemd[1]: Finished Rebuild Journal Catalog. Jan 22 00:37:09.395747 augenrules[863]: No rules Jan 22 00:37:09.394000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jan 22 00:37:09.414158 systemd[1]: Finished Load Security Auditing Rules. Jan 22 00:37:09.424071 systemd[1]: Condition check resulted in Update CA bundle at /etc/ssl/certs/ca-certificates.crt being skipped. Jan 22 00:37:09.426774 systemd[1]: Finished Record System Boot/Shutdown in UTMP. Jan 22 00:37:09.490160 systemd-networkd[795]: eth0: Gained IPv6LL Jan 22 00:37:09.519184 systemd[1]: Started Network Time Synchronization. Jan 22 00:37:09.525896 systemd[1]: Reached target System Time Set. Jan 22 00:37:10.475677 systemd-timesyncd[853]: Initial synchronization to time server 10.0.0.1:123 (10.0.0.1). Jan 22 00:37:10.482149 systemd-resolved[852]: Positive Trust Anchors: Jan 22 00:37:10.482209 systemd-resolved[852]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jan 22 00:37:10.482247 systemd-resolved[852]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jan 22 00:37:10.486015 systemd-resolved[852]: Defaulting to hostname 'linux'. Jan 22 00:37:10.488818 systemd[1]: Started Network Name Resolution. Jan 22 00:37:10.497764 systemd[1]: Reached target Network. Jan 22 00:37:10.504750 systemd[1]: Reached target Host and Network Name Lookups. Jan 22 00:37:10.892241 systemd[1]: Finished Rebuild Dynamic Linker Cache. Jan 22 00:37:10.916667 systemd[1]: Starting Update is Completed... Jan 22 00:37:10.933910 systemd[1]: Finished Update is Completed. Jan 22 00:37:10.941453 systemd[1]: Reached target System Initialization. Jan 22 00:37:10.959778 systemd[1]: Started Watch for update engine configuration changes. Jan 22 00:37:10.968684 systemd[1]: Started Watch for a cloud-config at /var/lib/flatcar-install/user_data. Jan 22 00:37:10.978125 systemd[1]: Started Daily Log Rotation. Jan 22 00:37:10.984753 systemd[1]: Started Weekly check for MD array's redundancy information.. Jan 22 00:37:10.993371 systemd[1]: Started Daily Cleanup of Temporary Directories. Jan 22 00:37:11.001484 systemd[1]: Condition check resulted in Update Engine Stub Timer being skipped. Jan 22 00:37:11.001643 systemd[1]: Reached target Path Units. Jan 22 00:37:11.008910 systemd[1]: Reached target Timer Units. Jan 22 00:37:11.017427 systemd[1]: Listening on D-Bus System Message Bus Socket. Jan 22 00:37:11.035620 systemd[1]: Starting Docker Socket for the API... Jan 22 00:37:11.056197 systemd[1]: Listening on OpenSSH Server Socket. Jan 22 00:37:11.063719 systemd[1]: Listening on Docker Socket for the API. Jan 22 00:37:11.071696 systemd[1]: Reached target Socket Units. Jan 22 00:37:11.077069 systemd[1]: Reached target Basic System. Jan 22 00:37:11.083156 systemd[1]: Condition check resulted in Configure Addon /usr/share/oem being skipped. Jan 22 00:37:11.083251 systemd[1]: Condition check resulted in Run Addon /usr/share/oem being skipped. Jan 22 00:37:11.096177 systemd[1]: Started D-Bus System Message Bus. Jan 22 00:37:11.106187 systemd[1]: Starting Extend Filesystems... Jan 22 00:37:11.111643 systemd[1]: Condition check resulted in Modifies /etc/environment for CoreOS being skipped. Jan 22 00:37:11.113259 systemd[1]: Starting Generate /run/flatcar/motd... Jan 22 00:37:11.121037 systemd[1]: Starting Install an ssh key from /proc/cmdline... Jan 22 00:37:11.128847 systemd[1]: Starting Generate sshd host keys... Jan 22 00:37:11.134901 systemd[1]: Condition check resulted in Load cloud-config from /usr/share/oem/cloud-config.yml being skipped. Jan 22 00:37:11.135001 systemd[1]: Reached target Load system-provided cloud configs. Jan 22 00:37:11.162906 systemd[1]: Starting User Login Management... Jan 22 00:37:11.168469 systemd[1]: Condition check resulted in TCG Core Services Daemon being skipped. Jan 22 00:37:11.169078 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jan 22 00:37:11.169986 extend-filesystems[873]: Found sr0 Jan 22 00:37:11.180785 extend-filesystems[873]: Found vda Jan 22 00:37:11.180785 extend-filesystems[873]: Found vda1 Jan 22 00:37:11.180785 extend-filesystems[873]: Found vda2 Jan 22 00:37:11.180785 extend-filesystems[873]: Found vda3 Jan 22 00:37:11.180785 extend-filesystems[873]: Found usr Jan 22 00:37:11.180785 extend-filesystems[873]: Found vda4 Jan 22 00:37:11.180785 extend-filesystems[873]: Found vda6 Jan 22 00:37:11.180785 extend-filesystems[873]: Found vda7 Jan 22 00:37:11.180785 extend-filesystems[873]: Found vda9 Jan 22 00:37:11.180785 extend-filesystems[873]: Checking size of /dev/vda9 Jan 22 00:37:11.170634 systemd[1]: Starting Update Engine... Jan 22 00:37:11.180477 systemd[1]: Condition check resulted in Load cloud-config from url defined in /proc/cmdline being skipped. Jan 22 00:37:11.180511 systemd[1]: Reached target Load user-provided cloud configs. Jan 22 00:37:11.200034 systemd[1]: motdgen.service: Deactivated successfully. Jan 22 00:37:11.200501 systemd[1]: Finished Generate /run/flatcar/motd. Jan 22 00:37:11.210521 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jan 22 00:37:11.210980 systemd[1]: Finished Install an ssh key from /proc/cmdline. Jan 22 00:37:11.319180 extend-filesystems[873]: Old size kept for /dev/vda9 Jan 22 00:37:11.324100 systemd[1]: extend-filesystems.service: Deactivated successfully. Jan 22 00:37:11.324619 systemd[1]: Finished Extend Filesystems. Jan 22 00:37:11.366693 systemd-logind[886]: Watching system buttons on /dev/input/event1 (Power Button) Jan 22 00:37:11.366838 systemd-logind[886]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jan 22 00:37:11.368391 systemd-logind[886]: New seat seat0. Jan 22 00:37:11.374980 systemd[1]: Started User Login Management. Jan 22 00:37:11.441842 update_engine[888]: I0122 00:37:11.439973 888 main.cc:89] Flatcar Update Engine starting Jan 22 00:37:11.466451 systemd[1]: Started Update Engine. Jan 22 00:37:11.466903 update_engine[888]: I0122 00:37:11.466799 888 update_check_scheduler.cc:74] Next update check in 6m24s Jan 22 00:37:11.487069 systemd[1]: Started Cluster reboot manager. Jan 22 00:37:11.613243 sshd_keygen[889]: ssh-keygen: generating new host keys: RSA DSA ECDSA ED25519 Jan 22 00:37:11.661785 systemd[1]: Finished Generate sshd host keys. Jan 22 00:37:11.675253 systemd[1]: Starting Generate /run/issue... Jan 22 00:37:11.694755 systemd[1]: issuegen.service: Deactivated successfully. Jan 22 00:37:11.695088 systemd[1]: Finished Generate /run/issue. Jan 22 00:37:11.712021 systemd[1]: Starting Permit User Sessions... Jan 22 00:37:11.738906 systemd[1]: Finished Permit User Sessions. Jan 22 00:37:11.756949 systemd[1]: Started Getty on tty1. Jan 22 00:37:11.766438 systemd[1]: Started Serial Getty on ttyS0. Jan 22 00:37:11.773196 systemd[1]: Reached target Login Prompts. Jan 22 00:37:11.779805 systemd[1]: Reached target Multi-User System. Jan 22 00:37:11.785982 locksmithd[897]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jan 22 00:37:11.788130 systemd[1]: Starting Record Runlevel Change in UTMP... Jan 22 00:37:11.806448 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jan 22 00:37:11.806913 systemd[1]: Finished Record Runlevel Change in UTMP. Jan 22 00:37:11.812656 systemd[1]: Startup finished in 3.075s (kernel) + 6.729s (initrd) + 8.416s (userspace) = 18.221s. Jan 22 00:37:20.167812 systemd[1]: Created slice Slice /system/sshd. Jan 22 00:37:20.169731 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:34578). Jan 22 00:37:20.284453 sshd[918]: Accepted publickey for core from 10.0.0.1 port 34578 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:37:20.290014 sshd[918]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:37:20.320964 systemd[1]: Created slice User Slice of UID 500. Jan 22 00:37:20.322997 systemd[1]: Starting User Runtime Directory /run/user/500... Jan 22 00:37:20.331125 systemd-logind[886]: New session 1 of user core. Jan 22 00:37:20.340930 systemd[1]: Finished User Runtime Directory /run/user/500. Jan 22 00:37:20.354920 systemd[1]: Starting User Manager for UID 500... Jan 22 00:37:20.359736 systemd[921]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:37:20.474872 systemd[921]: Queued start job for default target Main User Target. Jan 22 00:37:20.475199 systemd[921]: Reached target Paths. Jan 22 00:37:20.475221 systemd[921]: Reached target Sockets. Jan 22 00:37:20.475235 systemd[921]: Reached target Timers. Jan 22 00:37:20.475247 systemd[921]: Reached target Basic System. Jan 22 00:37:20.475490 systemd[921]: Reached target Main User Target. Jan 22 00:37:20.475506 systemd[921]: Startup finished in 106ms. Jan 22 00:37:20.475790 systemd[1]: Started User Manager for UID 500. Jan 22 00:37:20.480828 systemd[1]: Started Session 1 of User core. Jan 22 00:37:20.566258 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:34580). Jan 22 00:37:20.624824 sshd[930]: Accepted publickey for core from 10.0.0.1 port 34580 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:37:20.626925 sshd[930]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:37:20.636402 systemd-logind[886]: New session 2 of user core. Jan 22 00:37:20.650008 systemd[1]: Started Session 2 of User core. Jan 22 00:37:20.738044 sshd[930]: pam_unix(sshd:session): session closed for user core Jan 22 00:37:20.750949 systemd[1]: sshd@1-10.0.0.6:22-10.0.0.1:34580.service: Deactivated successfully. Jan 22 00:37:20.751979 systemd-logind[886]: Session 2 logged out. Waiting for processes to exit. Jan 22 00:37:20.752400 systemd[1]: session-2.scope: Deactivated successfully. Jan 22 00:37:20.754967 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:34582). Jan 22 00:37:20.755963 systemd-logind[886]: Removed session 2. Jan 22 00:37:20.799210 sshd[936]: Accepted publickey for core from 10.0.0.1 port 34582 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:37:20.800827 sshd[936]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:37:20.809031 systemd-logind[886]: New session 3 of user core. Jan 22 00:37:20.823419 systemd[1]: Started Session 3 of User core. Jan 22 00:37:20.907143 sshd[936]: pam_unix(sshd:session): session closed for user core Jan 22 00:37:20.915528 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:34586). Jan 22 00:37:20.920258 systemd[1]: sshd@2-10.0.0.6:22-10.0.0.1:34582.service: Deactivated successfully. Jan 22 00:37:20.921735 systemd[1]: session-3.scope: Deactivated successfully. Jan 22 00:37:20.924505 systemd-logind[886]: Session 3 logged out. Waiting for processes to exit. Jan 22 00:37:20.930715 systemd-logind[886]: Removed session 3. Jan 22 00:37:20.966532 sshd[941]: Accepted publickey for core from 10.0.0.1 port 34586 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:37:20.967724 sshd[941]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:37:20.975472 systemd-logind[886]: New session 4 of user core. Jan 22 00:37:20.986140 systemd[1]: Started Session 4 of User core. Jan 22 00:37:21.073539 sshd[941]: pam_unix(sshd:session): session closed for user core Jan 22 00:37:21.081040 systemd[1]: sshd@3-10.0.0.6:22-10.0.0.1:34586.service: Deactivated successfully. Jan 22 00:37:21.082177 systemd[1]: session-4.scope: Deactivated successfully. Jan 22 00:37:21.085193 systemd-logind[886]: Session 4 logged out. Waiting for processes to exit. Jan 22 00:37:21.086536 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:34600). Jan 22 00:37:21.088799 systemd-logind[886]: Removed session 4. Jan 22 00:37:21.134507 sshd[948]: Accepted publickey for core from 10.0.0.1 port 34600 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:37:21.136242 sshd[948]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:37:21.150092 systemd-logind[886]: New session 5 of user core. Jan 22 00:37:21.157154 systemd[1]: Started Session 5 of User core. Jan 22 00:37:21.267856 sudo[951]: core : PWD=/home/core ; USER=root ; COMMAND=/sbin/setenforce 1 Jan 22 00:37:21.268183 sudo[951]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:37:21.289754 sudo[951]: pam_unix(sudo:session): session closed for user root Jan 22 00:37:21.295214 sshd[948]: pam_unix(sshd:session): session closed for user core Jan 22 00:37:21.306789 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:34604). Jan 22 00:37:21.310970 dbus-daemon[872]: [system] Reloaded configuration Jan 22 00:37:21.317732 systemd[1]: sshd@4-10.0.0.6:22-10.0.0.1:34600.service: Deactivated successfully. Jan 22 00:37:21.318874 systemd[1]: session-5.scope: Deactivated successfully. Jan 22 00:37:21.320916 systemd-logind[886]: Session 5 logged out. Waiting for processes to exit. Jan 22 00:37:21.324557 systemd-logind[886]: Removed session 5. Jan 22 00:37:21.354126 sshd[954]: Accepted publickey for core from 10.0.0.1 port 34604 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:37:21.357590 sshd[954]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:37:21.367160 systemd-logind[886]: New session 6 of user core. Jan 22 00:37:21.379014 systemd[1]: Started Session 6 of User core. Jan 22 00:37:21.463233 sudo[959]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jan 22 00:37:21.463772 sudo[959]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:37:21.474601 sudo[959]: pam_unix(sudo:session): session closed for user root Jan 22 00:37:21.484550 sudo[958]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/systemctl restart audit-rules Jan 22 00:37:21.484909 sudo[958]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:37:21.513391 systemd[1]: Stopping Load Security Auditing Rules... Jan 22 00:37:21.517000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jan 22 00:37:21.518119 auditctl[962]: No rules Jan 22 00:37:21.518865 systemd[1]: audit-rules.service: Deactivated successfully. Jan 22 00:37:21.519377 systemd[1]: Stopped Load Security Auditing Rules. Jan 22 00:37:21.522128 systemd[1]: Starting Load Security Auditing Rules... Jan 22 00:37:21.526157 kernel: kauditd_printk_skb: 1 callbacks suppressed Jan 22 00:37:21.526401 kernel: audit: type=1305 audit(1769042241.517:164): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jan 22 00:37:21.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:21.571011 kernel: audit: type=1131 audit(1769042241.519:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:21.576133 augenrules[979]: No rules Jan 22 00:37:21.577865 systemd[1]: Finished Load Security Auditing Rules. Jan 22 00:37:21.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:21.579787 sudo[958]: pam_unix(sudo:session): session closed for user root Jan 22 00:37:21.582087 sshd[954]: pam_unix(sshd:session): session closed for user core Jan 22 00:37:21.587140 systemd[1]: sshd@5-10.0.0.6:22-10.0.0.1:34604.service: Deactivated successfully. Jan 22 00:37:21.588226 systemd[1]: session-6.scope: Deactivated successfully. Jan 22 00:37:21.590803 systemd-logind[886]: Session 6 logged out. Waiting for processes to exit. Jan 22 00:37:21.591771 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:34606). Jan 22 00:37:21.598114 systemd-logind[886]: Removed session 6. Jan 22 00:37:21.579000 audit[958]: USER_END pid=958 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:21.646059 kernel: audit: type=1130 audit(1769042241.578:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:21.646138 kernel: audit: type=1106 audit(1769042241.579:167): pid=958 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:21.646153 kernel: audit: type=1104 audit(1769042241.579:168): pid=958 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:21.579000 audit[958]: CRED_DISP pid=958 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:21.676114 sshd[985]: Accepted publickey for core from 10.0.0.1 port 34606 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:37:21.677721 kernel: audit: type=1106 audit(1769042241.583:169): pid=954 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:21.583000 audit[954]: USER_END pid=954 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:21.677990 sshd[985]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:37:21.684587 systemd-logind[886]: New session 7 of user core. Jan 22 00:37:21.685082 systemd[1]: Started Session 7 of User core. Jan 22 00:37:21.583000 audit[954]: CRED_DISP pid=954 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:21.756854 kernel: audit: type=1104 audit(1769042241.583:170): pid=954 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:21.756953 kernel: audit: type=1131 audit(1769042241.587:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.6:22-10.0.0.1:34604 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:21.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.6:22-10.0.0.1:34604 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:21.758598 sudo[988]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/mkdir -p . Jan 22 00:37:21.758985 sudo[988]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:37:21.770784 sudo[988]: pam_unix(sudo:session): session closed for user root Jan 22 00:37:21.773913 sshd[985]: pam_unix(sshd:session): session closed for user core Jan 22 00:37:21.777619 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:34608). Jan 22 00:37:21.778200 systemd[1]: sshd@6-10.0.0.6:22-10.0.0.1:34606.service: Deactivated successfully. Jan 22 00:37:21.779010 systemd[1]: session-7.scope: Deactivated successfully. Jan 22 00:37:21.789902 systemd-logind[886]: Session 7 logged out. Waiting for processes to exit. Jan 22 00:37:21.793815 kernel: audit: type=1130 audit(1769042241.591:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.6:22-10.0.0.1:34606 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:21.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.6:22-10.0.0.1:34606 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:21.794629 systemd-logind[886]: Removed session 7. Jan 22 00:37:21.675000 audit[985]: USER_ACCT pid=985 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:21.875456 kernel: audit: type=1101 audit(1769042241.675:173): pid=985 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:21.677000 audit[985]: CRED_ACQ pid=985 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:21.699000 audit[985]: USER_START pid=985 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:21.701000 audit[987]: CRED_ACQ pid=987 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:21.758000 audit[988]: USER_ACCT pid=988 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:21.758000 audit[988]: CRED_REFR pid=988 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:21.766000 audit[988]: USER_START pid=988 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:21.770000 audit[988]: USER_END pid=988 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:21.770000 audit[988]: CRED_DISP pid=988 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:21.775000 audit[985]: USER_END pid=985 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:21.775000 audit[985]: CRED_DISP pid=985 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:21.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.6:22-10.0.0.1:34608 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:21.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.6:22-10.0.0.1:34606 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:21.908000 audit[991]: USER_ACCT pid=991 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:21.908991 sshd[991]: Accepted publickey for core from 10.0.0.1 port 34608 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:37:21.911000 audit[991]: CRED_ACQ pid=991 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:21.912472 sshd[991]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:37:21.920197 systemd-logind[886]: New session 8 of user core. Jan 22 00:37:21.930045 systemd[1]: Started Session 8 of User core. Jan 22 00:37:21.955000 audit[991]: USER_START pid=991 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:21.957000 audit[994]: CRED_ACQ pid=994 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:22.018837 sudo[995]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/install -m 0755 /dev/stdin kolet Jan 22 00:37:22.017000 audit[995]: USER_ACCT pid=995 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:22.018000 audit[995]: CRED_REFR pid=995 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:22.019118 sudo[995]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:37:22.023000 audit[995]: USER_START pid=995 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:23.180816 sudo[995]: pam_unix(sudo:session): session closed for user root Jan 22 00:37:23.180000 audit[995]: USER_END pid=995 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:23.180000 audit[995]: CRED_DISP pid=995 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:23.184193 sshd[991]: pam_unix(sshd:session): session closed for user core Jan 22 00:37:23.188000 audit[991]: USER_END pid=991 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:23.188000 audit[991]: CRED_DISP pid=991 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:23.192489 systemd[1]: sshd@7-10.0.0.6:22-10.0.0.1:34608.service: Deactivated successfully. Jan 22 00:37:23.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.6:22-10.0.0.1:34608 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:23.193625 systemd[1]: session-8.scope: Deactivated successfully. Jan 22 00:37:23.194009 systemd[1]: session-8.scope: Consumed 1.477s CPU time. Jan 22 00:37:23.195015 systemd-logind[886]: Session 8 logged out. Waiting for processes to exit. Jan 22 00:37:23.196753 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:34620). Jan 22 00:37:23.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.6:22-10.0.0.1:34620 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:23.198717 systemd-logind[886]: Removed session 8. Jan 22 00:37:23.239000 audit[999]: USER_ACCT pid=999 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:23.240002 sshd[999]: Accepted publickey for core from 10.0.0.1 port 34620 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:37:23.241000 audit[999]: CRED_ACQ pid=999 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:23.241961 sshd[999]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:37:23.255127 systemd-logind[886]: New session 9 of user core. Jan 22 00:37:23.260860 systemd[1]: Started Session 9 of User core. Jan 22 00:37:23.282000 audit[999]: USER_START pid=999 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:23.284000 audit[1001]: CRED_ACQ pid=1001 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:23.339000 audit[1002]: USER_ACCT pid=1002 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:23.340642 sudo[1002]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/mkdir -p /updates Jan 22 00:37:23.340000 audit[1002]: CRED_REFR pid=1002 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:23.340979 sudo[1002]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:37:23.345000 audit[1002]: USER_START pid=1002 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:23.349000 audit[1002]: USER_END pid=1002 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:23.350000 audit[1002]: CRED_DISP pid=1002 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:23.350045 sudo[1002]: pam_unix(sudo:session): session closed for user root Jan 22 00:37:23.353522 sshd[999]: pam_unix(sshd:session): session closed for user core Jan 22 00:37:23.359000 audit[999]: USER_END pid=999 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:23.359000 audit[999]: CRED_DISP pid=999 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:23.368381 systemd[1]: sshd@8-10.0.0.6:22-10.0.0.1:34620.service: Deactivated successfully. Jan 22 00:37:23.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.6:22-10.0.0.1:34620 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:23.375225 systemd[1]: session-9.scope: Deactivated successfully. Jan 22 00:37:23.397423 systemd-logind[886]: Session 9 logged out. Waiting for processes to exit. Jan 22 00:37:23.413111 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:34622). Jan 22 00:37:23.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.6:22-10.0.0.1:34622 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:23.425167 systemd-logind[886]: Removed session 9. Jan 22 00:37:23.503000 audit[1006]: USER_ACCT pid=1006 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:23.505962 sshd[1006]: Accepted publickey for core from 10.0.0.1 port 34622 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:37:23.516000 audit[1006]: CRED_ACQ pid=1006 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:23.528826 sshd[1006]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:37:23.585216 systemd-logind[886]: New session 10 of user core. Jan 22 00:37:23.599481 systemd[1]: Started Session 10 of User core. Jan 22 00:37:23.652000 audit[1006]: USER_START pid=1006 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:23.657000 audit[1008]: CRED_ACQ pid=1008 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:23.749000 audit[1009]: USER_ACCT pid=1009 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:23.750965 sudo[1009]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/install -m 0755 /dev/stdin /updates/update.gz Jan 22 00:37:23.751837 sudo[1009]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:37:23.751000 audit[1009]: CRED_REFR pid=1009 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:23.758000 audit[1009]: USER_START pid=1009 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:34.152000 audit[1009]: USER_END pid=1009 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:34.153006 sudo[1009]: pam_unix(sudo:session): session closed for user root Jan 22 00:37:34.156598 sshd[1006]: pam_unix(sshd:session): session closed for user core Jan 22 00:37:34.162887 kernel: kauditd_printk_skb: 49 callbacks suppressed Jan 22 00:37:34.162951 kernel: audit: type=1106 audit(1769042254.152:223): pid=1009 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:34.152000 audit[1009]: CRED_DISP pid=1009 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:34.225850 kernel: audit: type=1104 audit(1769042254.152:224): pid=1009 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:34.225956 kernel: audit: type=1106 audit(1769042254.162:225): pid=1006 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:34.162000 audit[1006]: USER_END pid=1006 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:34.271556 kernel: audit: type=1104 audit(1769042254.162:226): pid=1006 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:34.162000 audit[1006]: CRED_DISP pid=1006 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:34.333567 systemd[1]: sshd@9-10.0.0.6:22-10.0.0.1:34622.service: Deactivated successfully. Jan 22 00:37:34.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.6:22-10.0.0.1:34622 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:34.336548 systemd[1]: session-10.scope: Deactivated successfully. Jan 22 00:37:34.336994 systemd[1]: session-10.scope: Consumed 13.862s CPU time. Jan 22 00:37:34.347035 systemd-logind[886]: Session 10 logged out. Waiting for processes to exit. Jan 22 00:37:34.377697 kernel: audit: type=1131 audit(1769042254.334:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.6:22-10.0.0.1:34622 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:34.395855 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:34256). Jan 22 00:37:34.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.6:22-10.0.0.1:34256 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:34.404946 systemd-logind[886]: Removed session 10. Jan 22 00:37:34.438475 kernel: audit: type=1130 audit(1769042254.396:228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.6:22-10.0.0.1:34256 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:34.476000 audit[1013]: USER_ACCT pid=1013 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:34.477725 sshd[1013]: Accepted publickey for core from 10.0.0.1 port 34256 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:37:34.509183 sshd[1013]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:37:34.519165 systemd-logind[886]: New session 11 of user core. Jan 22 00:37:34.507000 audit[1013]: CRED_ACQ pid=1013 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:34.572490 kernel: audit: type=1101 audit(1769042254.476:229): pid=1013 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:34.572882 kernel: audit: type=1103 audit(1769042254.507:230): pid=1013 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:34.572924 kernel: audit: type=1006 audit(1769042254.508:231): pid=1013 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Jan 22 00:37:34.609722 systemd[1]: Started Session 11 of User core. Jan 22 00:37:34.635000 audit[1013]: USER_START pid=1013 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:34.638000 audit[1016]: CRED_ACQ pid=1016 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:34.700017 kernel: audit: type=1105 audit(1769042254.635:232): pid=1013 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:34.716000 audit[1017]: USER_ACCT pid=1017 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:34.720862 sudo[1017]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/systemd-run --quiet ./kolet run cl.update.docker-btrfs-compat Omaha Jan 22 00:37:34.721000 audit[1017]: CRED_REFR pid=1017 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:34.722587 sudo[1017]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:37:34.730000 audit[1017]: USER_START pid=1017 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:34.784895 systemd[1]: Started /home/core/./kolet run cl.update.docker-btrfs-compat Omaha. Jan 22 00:37:34.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=run-r3e07d48c6fc94c25936cefe23f655c7c comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:34.786853 sudo[1017]: pam_unix(sudo:session): session closed for user root Jan 22 00:37:34.786000 audit[1017]: USER_END pid=1017 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:34.786000 audit[1017]: CRED_DISP pid=1017 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:37:34.792861 sshd[1013]: pam_unix(sshd:session): session closed for user core Jan 22 00:37:34.795000 audit[1013]: USER_END pid=1013 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:34.795000 audit[1013]: CRED_DISP pid=1013 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:34.797693 systemd[1]: sshd@10-10.0.0.6:22-10.0.0.1:34256.service: Deactivated successfully. Jan 22 00:37:34.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.6:22-10.0.0.1:34256 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:34.798893 systemd[1]: session-11.scope: Deactivated successfully. Jan 22 00:37:34.800585 systemd-logind[886]: Session 11 logged out. Waiting for processes to exit. Jan 22 00:37:34.804111 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:37984). Jan 22 00:37:34.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.6:22-10.0.0.1:37984 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:34.807478 systemd-logind[886]: Removed session 11. Jan 22 00:37:34.865000 audit[1022]: USER_ACCT pid=1022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:34.866069 sshd[1022]: Accepted publickey for core from 10.0.0.1 port 37984 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:37:34.868000 audit[1022]: CRED_ACQ pid=1022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:34.869410 sshd[1022]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:37:34.877239 systemd-logind[886]: New session 12 of user core. Jan 22 00:37:34.895909 systemd[1]: Started Session 12 of User core. Jan 22 00:37:34.926000 audit[1022]: USER_START pid=1022 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:34.927000 audit[1029]: CRED_ACQ pid=1029 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:35.018229 sshd[1022]: pam_unix(sshd:session): session closed for user core Jan 22 00:37:35.022000 audit[1022]: USER_END pid=1022 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:35.023000 audit[1022]: CRED_DISP pid=1022 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:35.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.6:22-10.0.0.1:37984 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:35.025608 systemd[1]: sshd@11-10.0.0.6:22-10.0.0.1:37984.service: Deactivated successfully. Jan 22 00:37:35.026713 systemd[1]: session-12.scope: Deactivated successfully. Jan 22 00:37:35.029959 systemd-logind[886]: Session 12 logged out. Waiting for processes to exit. Jan 22 00:37:35.032625 systemd-logind[886]: Removed session 12. Jan 22 00:37:40.032720 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:38000). Jan 22 00:37:40.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.6:22-10.0.0.1:38000 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:40.042579 kernel: kauditd_printk_skb: 19 callbacks suppressed Jan 22 00:37:40.042635 kernel: audit: type=1130 audit(1769042260.032:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.6:22-10.0.0.1:38000 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:40.124000 audit[1037]: USER_ACCT pid=1037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:40.125204 sshd[1037]: Accepted publickey for core from 10.0.0.1 port 38000 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:37:40.127949 sshd[1037]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:37:40.140611 systemd-logind[886]: New session 13 of user core. Jan 22 00:37:40.238089 kernel: audit: type=1101 audit(1769042260.124:253): pid=1037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:40.238130 kernel: audit: type=1103 audit(1769042260.127:254): pid=1037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:40.238148 kernel: audit: type=1006 audit(1769042260.127:255): pid=1037 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Jan 22 00:37:40.127000 audit[1037]: CRED_ACQ pid=1037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:40.237873 systemd[1]: Started Session 13 of User core. Jan 22 00:37:40.261000 audit[1037]: USER_START pid=1037 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:40.269000 audit[1039]: CRED_ACQ pid=1039 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:40.352398 kernel: audit: type=1105 audit(1769042260.261:256): pid=1037 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:40.352512 kernel: audit: type=1103 audit(1769042260.269:257): pid=1039 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:40.351995 sshd[1037]: pam_unix(sshd:session): session closed for user core Jan 22 00:37:40.355000 audit[1037]: USER_END pid=1037 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:40.357704 systemd[1]: sshd@12-10.0.0.6:22-10.0.0.1:38000.service: Deactivated successfully. Jan 22 00:37:40.359237 systemd[1]: session-13.scope: Deactivated successfully. Jan 22 00:37:40.361117 systemd-logind[886]: Session 13 logged out. Waiting for processes to exit. Jan 22 00:37:40.366437 systemd-logind[886]: Removed session 13. Jan 22 00:37:40.403583 kernel: audit: type=1106 audit(1769042260.355:258): pid=1037 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:40.403700 kernel: audit: type=1104 audit(1769042260.355:259): pid=1037 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:40.355000 audit[1037]: CRED_DISP pid=1037 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:37:40.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.6:22-10.0.0.1:38000 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:40.490054 kernel: audit: type=1131 audit(1769042260.357:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.6:22-10.0.0.1:38000 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:37:56.607773 update_engine[888]: I0122 00:37:56.607434 888 update_attempter.cc:505] Updating boot flags...