Jan 22 00:23:34.902570 kernel: Linux version 5.10.107-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 9.3.0-r1 p3) 9.3.0, GNU ld (Gentoo 2.36.1 p5) 2.36.1) #1 SMP Tue Mar 22 19:39:53 -00 2022 Jan 22 00:23:34.902589 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=15990f5bb88d618f1948b7e8a720f1d5b95900cfecbef00df890bd0a136b39aa Jan 22 00:23:34.902596 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jan 22 00:23:34.902600 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jan 22 00:23:34.902606 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jan 22 00:23:34.902614 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jan 22 00:23:34.902623 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Jan 22 00:23:34.902633 kernel: BIOS-provided physical RAM map: Jan 22 00:23:34.902744 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Jan 22 00:23:34.902755 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Jan 22 00:23:34.902763 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Jan 22 00:23:34.902770 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable Jan 22 00:23:34.902776 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved Jan 22 00:23:34.902783 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Jan 22 00:23:34.902793 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Jan 22 00:23:34.902800 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Jan 22 00:23:34.902806 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Jan 22 00:23:34.902813 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Jan 22 00:23:34.902821 kernel: NX (Execute Disable) protection: active Jan 22 00:23:34.902829 kernel: SMBIOS 2.8 present. Jan 22 00:23:34.902838 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Jan 22 00:23:34.903373 kernel: Hypervisor detected: KVM Jan 22 00:23:34.903386 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jan 22 00:23:34.903393 kernel: kvm-clock: cpu 0, msr 646ba001, primary cpu clock Jan 22 00:23:34.903400 kernel: kvm-clock: using sched offset of 13873788432 cycles Jan 22 00:23:34.903413 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jan 22 00:23:34.903421 kernel: tsc: Detected 2445.426 MHz processor Jan 22 00:23:34.903430 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jan 22 00:23:34.903439 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jan 22 00:23:34.903446 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 Jan 22 00:23:34.903453 kernel: MTRR default type: write-back Jan 22 00:23:34.903461 kernel: MTRR fixed ranges enabled: Jan 22 00:23:34.903470 kernel: 00000-9FFFF write-back Jan 22 00:23:34.903479 kernel: A0000-BFFFF uncachable Jan 22 00:23:34.903490 kernel: C0000-FFFFF write-protect Jan 22 00:23:34.903497 kernel: MTRR variable ranges enabled: Jan 22 00:23:34.903503 kernel: 0 base 0000C0000000 mask FFFFC0000000 uncachable Jan 22 00:23:34.903510 kernel: 1 disabled Jan 22 00:23:34.903516 kernel: 2 disabled Jan 22 00:23:34.903523 kernel: 3 disabled Jan 22 00:23:34.903536 kernel: 4 disabled Jan 22 00:23:34.903544 kernel: 5 disabled Jan 22 00:23:34.903551 kernel: 6 disabled Jan 22 00:23:34.903558 kernel: 7 disabled Jan 22 00:23:34.903565 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jan 22 00:23:34.903572 kernel: Using GB pages for direct mapping Jan 22 00:23:34.903580 kernel: ACPI: Early table checksum verification disabled Jan 22 00:23:34.903588 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) Jan 22 00:23:34.903596 kernel: ACPI: RSDT 0x000000009CFE241A 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:23:34.903605 kernel: ACPI: FACP 0x000000009CFE21FA 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:23:34.903613 kernel: ACPI: DSDT 0x000000009CFE0040 0021BA (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:23:34.903621 kernel: ACPI: FACS 0x000000009CFE0000 000040 Jan 22 00:23:34.903632 kernel: ACPI: APIC 0x000000009CFE22EE 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:23:34.903747 kernel: ACPI: HPET 0x000000009CFE237E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:23:34.903758 kernel: ACPI: MCFG 0x000000009CFE23B6 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:23:34.903766 kernel: ACPI: WAET 0x000000009CFE23F2 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:23:34.903774 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21fa-0x9cfe22ed] Jan 22 00:23:34.903783 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21f9] Jan 22 00:23:34.903791 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Jan 22 00:23:34.903799 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22ee-0x9cfe237d] Jan 22 00:23:34.903810 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe237e-0x9cfe23b5] Jan 22 00:23:34.903818 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23b6-0x9cfe23f1] Jan 22 00:23:34.903826 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23f2-0x9cfe2419] Jan 22 00:23:34.903834 kernel: ACPI: Local APIC address 0xfee00000 Jan 22 00:23:34.903842 kernel: No NUMA configuration found Jan 22 00:23:34.903849 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] Jan 22 00:23:34.903858 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] Jan 22 00:23:34.903866 kernel: Zone ranges: Jan 22 00:23:34.903874 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jan 22 00:23:34.903885 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] Jan 22 00:23:34.903893 kernel: Normal empty Jan 22 00:23:34.904094 kernel: Movable zone start for each node Jan 22 00:23:34.904104 kernel: Early memory node ranges Jan 22 00:23:34.904112 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Jan 22 00:23:34.904120 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] Jan 22 00:23:34.904127 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] Jan 22 00:23:34.904135 kernel: On node 0 totalpages: 642938 Jan 22 00:23:34.904143 kernel: DMA zone: 64 pages used for memmap Jan 22 00:23:34.904152 kernel: DMA zone: 21 pages reserved Jan 22 00:23:34.904163 kernel: DMA zone: 3998 pages, LIFO batch:0 Jan 22 00:23:34.904172 kernel: DMA32 zone: 9984 pages used for memmap Jan 22 00:23:34.904180 kernel: DMA32 zone: 638940 pages, LIFO batch:63 Jan 22 00:23:34.904189 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jan 22 00:23:34.904197 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Jan 22 00:23:34.904205 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges Jan 22 00:23:34.904213 kernel: ACPI: PM-Timer IO Port: 0x608 Jan 22 00:23:34.904222 kernel: ACPI: Local APIC address 0xfee00000 Jan 22 00:23:34.904230 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jan 22 00:23:34.904238 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jan 22 00:23:34.904248 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jan 22 00:23:34.904257 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jan 22 00:23:34.904265 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jan 22 00:23:34.904273 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jan 22 00:23:34.904281 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jan 22 00:23:34.904289 kernel: ACPI: IRQ0 used by override. Jan 22 00:23:34.904297 kernel: ACPI: IRQ5 used by override. Jan 22 00:23:34.904305 kernel: ACPI: IRQ9 used by override. Jan 22 00:23:34.904313 kernel: ACPI: IRQ10 used by override. Jan 22 00:23:34.904322 kernel: ACPI: IRQ11 used by override. Jan 22 00:23:34.904331 kernel: Using ACPI (MADT) for SMP configuration information Jan 22 00:23:34.904339 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Jan 22 00:23:34.904348 kernel: TSC deadline timer available Jan 22 00:23:34.904356 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Jan 22 00:23:34.904364 kernel: kvm-guest: KVM setup pv remote TLB flush Jan 22 00:23:34.904372 kernel: kvm-guest: setup PV sched yield Jan 22 00:23:34.904380 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Jan 22 00:23:34.904388 kernel: Booting paravirtualized kernel on KVM Jan 22 00:23:34.904397 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jan 22 00:23:34.904408 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Jan 22 00:23:34.904417 kernel: percpu: Embedded 58 pages/cpu s199704 r8192 d29672 u524288 Jan 22 00:23:34.904425 kernel: pcpu-alloc: s199704 r8192 d29672 u524288 alloc=1*2097152 Jan 22 00:23:34.904433 kernel: pcpu-alloc: [0] 0 1 2 3 Jan 22 00:23:34.904442 kernel: kvm-guest: KVM setup async PF for cpu 0 Jan 22 00:23:34.904450 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c580 Jan 22 00:23:34.904460 kernel: kvm-guest: PV spinlocks enabled Jan 22 00:23:34.904469 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jan 22 00:23:34.904478 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632869 Jan 22 00:23:34.904488 kernel: Policy zone: DMA32 Jan 22 00:23:34.904501 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=15990f5bb88d618f1948b7e8a720f1d5b95900cfecbef00df890bd0a136b39aa Jan 22 00:23:34.904510 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jan 22 00:23:34.904518 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jan 22 00:23:34.904526 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jan 22 00:23:34.904536 kernel: Memory: 2449516K/2571752K available (10246K kernel code, 2239K rwdata, 11640K rodata, 42228K init, 1436K bss, 121976K reserved, 0K cma-reserved) Jan 22 00:23:34.904546 kernel: random: get_random_u64 called from __kmem_cache_create+0x26/0x400 with crng_init=0 Jan 22 00:23:34.904553 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Jan 22 00:23:34.904560 kernel: ftrace: allocating 34378 entries in 135 pages Jan 22 00:23:34.904567 kernel: ftrace: allocated 135 pages with 4 groups Jan 22 00:23:34.904577 kernel: rcu: Hierarchical RCU implementation. Jan 22 00:23:34.904587 kernel: rcu: RCU event tracing is enabled. Jan 22 00:23:34.904595 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Jan 22 00:23:34.904602 kernel: Rude variant of Tasks RCU enabled. Jan 22 00:23:34.904609 kernel: Tracing variant of Tasks RCU enabled. Jan 22 00:23:34.904619 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jan 22 00:23:34.904628 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Jan 22 00:23:34.904636 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Jan 22 00:23:34.904846 kernel: Console: colour VGA+ 80x25 Jan 22 00:23:34.904856 kernel: printk: console [ttyS0] enabled Jan 22 00:23:34.904865 kernel: ACPI: Core revision 20200925 Jan 22 00:23:34.904874 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Jan 22 00:23:34.904883 kernel: APIC: Switch to symmetric I/O mode setup Jan 22 00:23:34.904892 kernel: x2apic enabled Jan 22 00:23:34.905098 kernel: Switched APIC routing to physical x2apic. Jan 22 00:23:34.905111 kernel: kvm-guest: setup PV IPIs Jan 22 00:23:34.905119 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Jan 22 00:23:34.905126 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Jan 22 00:23:34.905135 kernel: Calibrating delay loop (skipped) preset value.. 4890.85 BogoMIPS (lpj=2445426) Jan 22 00:23:34.905144 kernel: pid_max: default: 32768 minimum: 301 Jan 22 00:23:34.905152 kernel: LSM: Security Framework initializing Jan 22 00:23:34.905161 kernel: SELinux: Initializing. Jan 22 00:23:34.905170 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jan 22 00:23:34.905178 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jan 22 00:23:34.905190 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Jan 22 00:23:34.905199 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Jan 22 00:23:34.905207 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Jan 22 00:23:34.905216 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jan 22 00:23:34.905225 kernel: Spectre V2 : Mitigation: Retpolines Jan 22 00:23:34.905238 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jan 22 00:23:34.905247 kernel: Speculative Store Bypass: Vulnerable Jan 22 00:23:34.905254 kernel: Freeing SMP alternatives memory: 28K Jan 22 00:23:34.905262 kernel: smpboot: CPU0: AMD EPYC 7763 64-Core Processor (family: 0x19, model: 0x1, stepping: 0x1) Jan 22 00:23:34.905269 kernel: Performance Events: PMU not available due to virtualization, using software events only. Jan 22 00:23:34.905276 kernel: rcu: Hierarchical SRCU implementation. Jan 22 00:23:34.905285 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Jan 22 00:23:34.905293 kernel: smp: Bringing up secondary CPUs ... Jan 22 00:23:34.905300 kernel: x86: Booting SMP configuration: Jan 22 00:23:34.905307 kernel: .... node #0, CPUs: #1 Jan 22 00:23:34.905316 kernel: kvm-clock: cpu 1, msr 646ba041, secondary cpu clock Jan 22 00:23:34.905325 kernel: kvm-guest: KVM setup async PF for cpu 1 Jan 22 00:23:34.905333 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c580 Jan 22 00:23:34.905342 kernel: #2 Jan 22 00:23:34.905351 kernel: kvm-clock: cpu 2, msr 646ba081, secondary cpu clock Jan 22 00:23:34.905359 kernel: kvm-guest: KVM setup async PF for cpu 2 Jan 22 00:23:34.905368 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c580 Jan 22 00:23:34.905377 kernel: #3 Jan 22 00:23:34.905385 kernel: kvm-clock: cpu 3, msr 646ba0c1, secondary cpu clock Jan 22 00:23:34.905396 kernel: kvm-guest: KVM setup async PF for cpu 3 Jan 22 00:23:34.905405 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c580 Jan 22 00:23:34.905414 kernel: smp: Brought up 1 node, 4 CPUs Jan 22 00:23:34.905422 kernel: smpboot: Max logical packages: 1 Jan 22 00:23:34.905432 kernel: smpboot: Total of 4 processors activated (19563.40 BogoMIPS) Jan 22 00:23:34.905441 kernel: devtmpfs: initialized Jan 22 00:23:34.905449 kernel: x86/mm: Memory block size: 128MB Jan 22 00:23:34.905457 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jan 22 00:23:34.905464 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Jan 22 00:23:34.905471 kernel: pinctrl core: initialized pinctrl subsystem Jan 22 00:23:34.905482 kernel: NET: Registered protocol family 16 Jan 22 00:23:34.905492 kernel: audit: initializing netlink subsys (disabled) Jan 22 00:23:34.905501 kernel: audit: type=2000 audit(1769041405.984:1): state=initialized audit_enabled=0 res=1 Jan 22 00:23:34.905509 kernel: thermal_sys: Registered thermal governor 'step_wise' Jan 22 00:23:34.905516 kernel: thermal_sys: Registered thermal governor 'user_space' Jan 22 00:23:34.905523 kernel: cpuidle: using governor menu Jan 22 00:23:34.905530 kernel: ACPI: bus type PCI registered Jan 22 00:23:34.905539 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jan 22 00:23:34.905548 kernel: dca service started, version 1.12.1 Jan 22 00:23:34.905559 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Jan 22 00:23:34.905568 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Jan 22 00:23:34.905576 kernel: PCI: Using configuration type 1 for base access Jan 22 00:23:34.905585 kernel: Kprobes globally optimized Jan 22 00:23:34.905593 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jan 22 00:23:34.905602 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jan 22 00:23:34.905611 kernel: ACPI: Added _OSI(Module Device) Jan 22 00:23:34.905619 kernel: ACPI: Added _OSI(Processor Device) Jan 22 00:23:34.905628 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jan 22 00:23:34.905637 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jan 22 00:23:34.905764 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jan 22 00:23:34.905773 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jan 22 00:23:34.905782 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jan 22 00:23:34.905790 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jan 22 00:23:34.905799 kernel: ACPI: Interpreter enabled Jan 22 00:23:34.905808 kernel: ACPI: (supports S0 S3 S5) Jan 22 00:23:34.905817 kernel: ACPI: Using IOAPIC for interrupt routing Jan 22 00:23:34.905826 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jan 22 00:23:34.905835 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Jan 22 00:23:34.905847 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jan 22 00:23:34.906346 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jan 22 00:23:34.906412 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Jan 22 00:23:34.906489 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Jan 22 00:23:34.906504 kernel: PCI host bridge to bus 0000:00 Jan 22 00:23:34.906584 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jan 22 00:23:34.906758 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jan 22 00:23:34.906831 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jan 22 00:23:34.906874 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Jan 22 00:23:34.907152 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Jan 22 00:23:34.907197 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] Jan 22 00:23:34.907236 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jan 22 00:23:34.907295 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Jan 22 00:23:34.907347 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Jan 22 00:23:34.907421 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Jan 22 00:23:34.907499 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Jan 22 00:23:34.907568 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Jan 22 00:23:34.907621 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Jan 22 00:23:34.907785 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] Jan 22 00:23:34.907835 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Jan 22 00:23:34.907883 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Jan 22 00:23:34.908259 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Jan 22 00:23:34.908350 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] Jan 22 00:23:34.908432 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Jan 22 00:23:34.908510 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Jan 22 00:23:34.908593 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Jan 22 00:23:34.908776 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] Jan 22 00:23:34.908869 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Jan 22 00:23:34.909233 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Jan 22 00:23:34.909318 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Jan 22 00:23:34.909405 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Jan 22 00:23:34.909482 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Jan 22 00:23:34.909561 kernel: pci 0000:00:1f.0: quirk_ich7_lpc+0x0/0x60 took 17578 usecs Jan 22 00:23:34.909769 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Jan 22 00:23:34.909860 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] Jan 22 00:23:34.910169 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] Jan 22 00:23:34.910254 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Jan 22 00:23:34.910328 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Jan 22 00:23:34.910340 kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 5 *10 11) Jan 22 00:23:34.910348 kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs 5 *10 11) Jan 22 00:23:34.910356 kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 5 10 *11) Jan 22 00:23:34.910364 kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs 5 10 *11) Jan 22 00:23:34.910375 kernel: ACPI: PCI Interrupt Link [LNKE] (IRQs 5 *10 11) Jan 22 00:23:34.910383 kernel: ACPI: PCI Interrupt Link [LNKF] (IRQs 5 *10 11) Jan 22 00:23:34.910391 kernel: ACPI: PCI Interrupt Link [LNKG] (IRQs 5 10 *11) Jan 22 00:23:34.910399 kernel: ACPI: PCI Interrupt Link [LNKH] (IRQs 5 10 *11) Jan 22 00:23:34.910407 kernel: ACPI: PCI Interrupt Link [GSIA] (IRQs *16) Jan 22 00:23:34.910416 kernel: ACPI: PCI Interrupt Link [GSIB] (IRQs *17) Jan 22 00:23:34.910423 kernel: ACPI: PCI Interrupt Link [GSIC] (IRQs *18) Jan 22 00:23:34.910432 kernel: ACPI: PCI Interrupt Link [GSID] (IRQs *19) Jan 22 00:23:34.910441 kernel: ACPI: PCI Interrupt Link [GSIE] (IRQs *20) Jan 22 00:23:34.910449 kernel: ACPI: PCI Interrupt Link [GSIF] (IRQs *21) Jan 22 00:23:34.910460 kernel: ACPI: PCI Interrupt Link [GSIG] (IRQs *22) Jan 22 00:23:34.910469 kernel: ACPI: PCI Interrupt Link [GSIH] (IRQs *23) Jan 22 00:23:34.910478 kernel: iommu: Default domain type: Translated Jan 22 00:23:34.910568 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Jan 22 00:23:34.910768 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jan 22 00:23:34.910856 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Jan 22 00:23:34.910868 kernel: vgaarb: loaded Jan 22 00:23:34.910877 kernel: PCI: Using ACPI for IRQ routing Jan 22 00:23:34.910885 kernel: PCI: pci_cache_line_size set to 64 bytes Jan 22 00:23:34.911171 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Jan 22 00:23:34.911184 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] Jan 22 00:23:34.911193 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Jan 22 00:23:34.911200 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Jan 22 00:23:34.911208 kernel: clocksource: Switched to clocksource kvm-clock Jan 22 00:23:34.911216 kernel: VFS: Disk quotas dquot_6.6.0 Jan 22 00:23:34.911223 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jan 22 00:23:34.911231 kernel: pnp: PnP ACPI init Jan 22 00:23:34.911326 kernel: pnp 00:00: Plug and Play ACPI device, IDs PNP0303 (active) Jan 22 00:23:34.911383 kernel: pnp 00:01: Plug and Play ACPI device, IDs PNP0f13 (active) Jan 22 00:23:34.911430 kernel: pnp 00:02: Plug and Play ACPI device, IDs PNP0400 (active) Jan 22 00:23:34.911478 kernel: pnp 00:03: Plug and Play ACPI device, IDs PNP0501 (active) Jan 22 00:23:34.911522 kernel: pnp 00:04: Plug and Play ACPI device, IDs PNP0b00 (active) Jan 22 00:23:34.911566 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Jan 22 00:23:34.911606 kernel: system 00:05: Plug and Play ACPI device, IDs PNP0c01 (active) Jan 22 00:23:34.911615 kernel: pnp: PnP ACPI: found 6 devices Jan 22 00:23:34.911620 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jan 22 00:23:34.911626 kernel: NET: Registered protocol family 2 Jan 22 00:23:34.911631 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jan 22 00:23:34.911636 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jan 22 00:23:34.911744 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jan 22 00:23:34.911750 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jan 22 00:23:34.911757 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jan 22 00:23:34.911763 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jan 22 00:23:34.911768 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jan 22 00:23:34.911772 kernel: NET: Registered protocol family 1 Jan 22 00:23:34.911777 kernel: NET: Registered protocol family 44 Jan 22 00:23:34.911826 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jan 22 00:23:34.911867 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jan 22 00:23:34.912131 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jan 22 00:23:34.912174 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Jan 22 00:23:34.912216 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Jan 22 00:23:34.912254 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] Jan 22 00:23:34.912299 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jan 22 00:23:34.912344 kernel: pci 0000:00:01.0: pci_fixup_video+0x0/0xe0 took 29844 usecs Jan 22 00:23:34.912351 kernel: PCI: CLS 0 bytes, default 64 Jan 22 00:23:34.912356 kernel: Initialise system trusted keyrings Jan 22 00:23:34.912361 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jan 22 00:23:34.912367 kernel: Key type asymmetric registered Jan 22 00:23:34.912374 kernel: Asymmetric key parser 'x509' registered Jan 22 00:23:34.912379 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 251) Jan 22 00:23:34.912384 kernel: io scheduler mq-deadline registered Jan 22 00:23:34.912389 kernel: io scheduler kyber registered Jan 22 00:23:34.912394 kernel: io scheduler bfq registered Jan 22 00:23:34.912399 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jan 22 00:23:34.912404 kernel: PCI Interrupt Link [GSIG] enabled at IRQ 22 Jan 22 00:23:34.912409 kernel: PCI Interrupt Link [GSIH] enabled at IRQ 23 Jan 22 00:23:34.912414 kernel: PCI Interrupt Link [GSIE] enabled at IRQ 20 Jan 22 00:23:34.912419 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jan 22 00:23:34.912425 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jan 22 00:23:34.912430 kernel: random: fast init done Jan 22 00:23:34.912435 kernel: random: crng init done Jan 22 00:23:34.912440 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jan 22 00:23:34.912445 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jan 22 00:23:34.912450 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jan 22 00:23:34.912455 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jan 22 00:23:34.912460 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jan 22 00:23:34.912502 kernel: rtc_cmos 00:04: RTC can wake from S4 Jan 22 00:23:34.912511 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jan 22 00:23:34.912550 kernel: rtc_cmos 00:04: registered as rtc0 Jan 22 00:23:34.912588 kernel: rtc_cmos 00:04: setting system clock to 2026-01-22T00:23:33 UTC (1769041413) Jan 22 00:23:34.912741 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Jan 22 00:23:34.912756 kernel: NET: Registered protocol family 10 Jan 22 00:23:34.912765 kernel: Segment Routing with IPv6 Jan 22 00:23:34.912773 kernel: NET: Registered protocol family 17 Jan 22 00:23:34.912781 kernel: Key type dns_resolver registered Jan 22 00:23:34.912789 kernel: IPI shorthand broadcast: enabled Jan 22 00:23:34.912801 kernel: sched_clock: Marking stable (5801592846, 1680083979)->(8466173826, -984497001) Jan 22 00:23:34.912809 kernel: registered taskstats version 1 Jan 22 00:23:34.912818 kernel: Loading compiled-in X.509 certificates Jan 22 00:23:34.912826 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.10.107-flatcar: 5866c780451a04cc08b278527846e2b48fb1aa10' Jan 22 00:23:34.912835 kernel: Key type ._fscrypt registered Jan 22 00:23:34.912843 kernel: Key type .fscrypt registered Jan 22 00:23:34.912852 kernel: Key type fscrypt-provisioning registered Jan 22 00:23:34.912860 kernel: ima: No TPM chip found, activating TPM-bypass! Jan 22 00:23:34.912869 kernel: ima: Allocated hash algorithm: sha1 Jan 22 00:23:34.912879 kernel: ima: No architecture policies found Jan 22 00:23:34.912887 kernel: Freeing unused kernel image (initmem) memory: 42228K Jan 22 00:23:34.913175 kernel: Write protecting the kernel read-only data: 24576k Jan 22 00:23:34.913190 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jan 22 00:23:34.913199 kernel: Freeing unused kernel image (rodata/data gap) memory: 648K Jan 22 00:23:34.913208 kernel: Run /init as init process Jan 22 00:23:34.913217 kernel: with arguments: Jan 22 00:23:34.913226 kernel: /init Jan 22 00:23:34.913235 kernel: with environment: Jan 22 00:23:34.913244 kernel: HOME=/ Jan 22 00:23:34.913252 kernel: TERM=linux Jan 22 00:23:34.913261 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jan 22 00:23:34.913269 systemd[1]: systemd 249 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jan 22 00:23:34.913279 systemd[1]: Detected virtualization kvm. Jan 22 00:23:34.913285 systemd[1]: Detected architecture x86-64. Jan 22 00:23:34.913291 systemd[1]: Running in initial RAM disk. Jan 22 00:23:34.913296 systemd[1]: No hostname configured, using default hostname. Jan 22 00:23:34.913301 systemd[1]: Hostname set to . Jan 22 00:23:34.913307 systemd[1]: Initializing machine ID from VM UUID. Jan 22 00:23:34.913312 systemd[1]: Queued start job for default target Initrd Default Target. Jan 22 00:23:34.913319 systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Jan 22 00:23:34.913325 systemd[1]: Reached target Local Encrypted Volumes. Jan 22 00:23:34.913330 systemd[1]: Reached target Path Units. Jan 22 00:23:34.913335 systemd[1]: Reached target Slice Units. Jan 22 00:23:34.913341 systemd[1]: Reached target Swaps. Jan 22 00:23:34.913346 systemd[1]: Reached target Timer Units. Jan 22 00:23:34.913352 systemd[1]: Listening on Open-iSCSI iscsid Socket. Jan 22 00:23:34.913358 systemd[1]: Listening on Open-iSCSI iscsiuio Socket. Jan 22 00:23:34.913364 systemd[1]: Listening on Journal Audit Socket. Jan 22 00:23:34.913370 systemd[1]: Listening on Journal Socket (/dev/log). Jan 22 00:23:34.913375 systemd[1]: Listening on Journal Socket. Jan 22 00:23:34.913381 systemd[1]: Listening on Network Service Netlink Socket. Jan 22 00:23:34.913386 systemd[1]: Listening on udev Control Socket. Jan 22 00:23:34.913392 systemd[1]: Listening on udev Kernel Socket. Jan 22 00:23:34.913397 systemd[1]: Reached target Socket Units. Jan 22 00:23:34.913402 systemd[1]: Starting Create List of Static Device Nodes... Jan 22 00:23:34.913408 systemd[1]: Finished Network Cleanup. Jan 22 00:23:34.913414 systemd[1]: Started Hardware RNG Entropy Gatherer Daemon. Jan 22 00:23:34.913420 systemd[1]: Starting Journal Service... Jan 22 00:23:34.913426 systemd[1]: Condition check resulted in Load Kernel Modules being skipped. Jan 22 00:23:34.913431 systemd[1]: Starting Apply Kernel Variables... Jan 22 00:23:34.913436 systemd[1]: Starting Setup Virtual Console... Jan 22 00:23:34.913442 systemd[1]: Finished Create List of Static Device Nodes. Jan 22 00:23:34.913451 systemd-journald[192]: Journal started Jan 22 00:23:34.913490 systemd-journald[192]: Runtime Journal (/run/log/journal/1a8e0eb2b121448da543757784405e48) is 6.0M, max 48.7M, 42.6M free. Jan 22 00:23:35.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:35.894303 kernel: audit: type=1130 audit(1769041415.843:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:35.894385 systemd[1]: Started Journal Service. Jan 22 00:23:35.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:35.917184 systemd[1]: Finished Apply Kernel Variables. Jan 22 00:23:36.037414 kernel: audit: type=1130 audit(1769041415.916:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:36.037442 kernel: audit: type=1130 audit(1769041415.973:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:35.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:35.975484 systemd[1]: Finished Setup Virtual Console. Jan 22 00:23:36.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:36.073241 systemd[1]: Starting dracut ask for additional cmdline parameters... Jan 22 00:23:36.226221 kernel: audit: type=1130 audit(1769041416.069:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:36.226266 kernel: audit: type=1130 audit(1769041416.163:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:36.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:36.136799 systemd[1]: Starting Create Static Device Nodes in /dev... Jan 22 00:23:36.151091 systemd[1]: Finished Create Static Device Nodes in /dev. Jan 22 00:23:36.326821 kernel: audit: type=1130 audit(1769041416.250:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:36.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:36.227537 systemd[1]: Finished dracut ask for additional cmdline parameters. Jan 22 00:23:36.342177 dracut-cmdline[208]: dracut-dracut-053 Jan 22 00:23:36.342177 dracut-cmdline[208]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Jan 22 00:23:36.342177 dracut-cmdline[208]: BEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=15990f5bb88d618f1948b7e8a720f1d5b95900cfecbef00df890bd0a136b39aa Jan 22 00:23:36.252361 systemd[1]: Starting dracut cmdline hook... Jan 22 00:23:36.462263 kernel: SCSI subsystem initialized Jan 22 00:23:36.487453 kernel: Loading iSCSI transport class v2.0-870. Jan 22 00:23:36.528304 kernel: iscsi: registered transport (tcp) Jan 22 00:23:36.587100 kernel: iscsi: registered transport (qla4xxx) Jan 22 00:23:36.587282 kernel: QLogic iSCSI HBA Driver Jan 22 00:23:36.617438 systemd[1]: Finished dracut cmdline hook. Jan 22 00:23:36.701438 kernel: audit: type=1130 audit(1769041416.627:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:36.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:36.629560 systemd[1]: Starting dracut pre-udev hook... Jan 22 00:23:36.723222 kernel: device-mapper: uevent: version 1.0.3 Jan 22 00:23:36.745519 kernel: device-mapper: ioctl: 4.43.0-ioctl (2020-10-01) initialised: dm-devel@redhat.com Jan 22 00:23:36.856309 kernel: raid6: avx2x4 gen() 22577 MB/s Jan 22 00:23:36.884269 kernel: raid6: avx2x4 xor() 3736 MB/s Jan 22 00:23:36.911280 kernel: raid6: avx2x2 gen() 20430 MB/s Jan 22 00:23:36.939245 kernel: raid6: avx2x2 xor() 16485 MB/s Jan 22 00:23:36.966295 kernel: raid6: avx2x1 gen() 10458 MB/s Jan 22 00:23:36.995320 kernel: raid6: avx2x1 xor() 11909 MB/s Jan 22 00:23:37.023392 kernel: raid6: sse2x4 gen() 12023 MB/s Jan 22 00:23:37.050400 kernel: raid6: sse2x4 xor() 3473 MB/s Jan 22 00:23:37.079405 kernel: raid6: sse2x2 gen() 2743 MB/s Jan 22 00:23:37.106359 kernel: raid6: sse2x2 xor() 7311 MB/s Jan 22 00:23:37.134311 kernel: raid6: sse2x1 gen() 808 MB/s Jan 22 00:23:37.174447 kernel: raid6: sse2x1 xor() 5031 MB/s Jan 22 00:23:37.174519 kernel: raid6: using algorithm avx2x4 gen() 22577 MB/s Jan 22 00:23:37.174531 kernel: raid6: .... xor() 3736 MB/s, rmw enabled Jan 22 00:23:37.187343 kernel: raid6: using avx2x2 recovery algorithm Jan 22 00:23:37.238310 kernel: xor: automatically using best checksumming function avx Jan 22 00:23:37.502553 kernel: Btrfs loaded, crc32c=crc32c-intel Jan 22 00:23:37.534499 systemd[1]: Finished dracut pre-udev hook. Jan 22 00:23:37.617342 kernel: audit: type=1130 audit(1769041417.547:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:37.617383 kernel: audit: type=1334 audit(1769041417.591:10): prog-id=6 op=LOAD Jan 22 00:23:37.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:37.591000 audit: BPF prog-id=6 op=LOAD Jan 22 00:23:37.618000 audit: BPF prog-id=7 op=LOAD Jan 22 00:23:37.635000 audit: BPF prog-id=8 op=LOAD Jan 22 00:23:37.637359 kernel: audit: type=1334 audit(1769041417.618:11): prog-id=7 op=LOAD Jan 22 00:23:37.638273 systemd[1]: Starting Rule-based Manager for Device Events and Files... Jan 22 00:23:37.723317 systemd-udevd[331]: /usr/lib64/udev/rules.d/50-udev-default.rules:42 Unknown group 'sgx', ignoring Jan 22 00:23:37.727188 systemd[1]: Started Rule-based Manager for Device Events and Files. Jan 22 00:23:37.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:37.768803 systemd[1]: Starting dracut pre-trigger hook... Jan 22 00:23:37.790000 audit: BPF prog-id=9 op=LOAD Jan 22 00:23:37.793385 systemd[1]: Starting Network Configuration... Jan 22 00:23:37.850244 dracut-pre-trigger[351]: rd.md=0: removing MD RAID activation Jan 22 00:23:37.905371 systemd-networkd[352]: lo: Link UP Jan 22 00:23:37.905482 systemd-networkd[352]: lo: Gained carrier Jan 22 00:23:37.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:37.905878 systemd-networkd[352]: Enumeration completed Jan 22 00:23:37.907097 systemd[1]: Started Network Configuration. Jan 22 00:23:37.938000 audit: BPF prog-id=10 op=LOAD Jan 22 00:23:37.940611 systemd[1]: Starting Network Name Resolution... Jan 22 00:23:38.014887 systemd[1]: Finished dracut pre-trigger hook. Jan 22 00:23:38.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:38.042619 systemd[1]: Starting Coldplug All udev Devices... Jan 22 00:23:38.067456 systemd-udevd[331]: /usr/lib64/udev/rules.d/50-udev-default.rules:42 Unknown group 'sgx', ignoring Jan 22 00:23:38.128346 systemd-resolved[369]: Positive Trust Anchors: Jan 22 00:23:38.128360 systemd-resolved[369]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jan 22 00:23:38.128398 systemd-resolved[369]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jan 22 00:23:38.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:38.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:38.128855 systemd-resolved[369]: Defaulting to hostname 'linux'. Jan 22 00:23:38.130459 systemd[1]: Started Network Name Resolution. Jan 22 00:23:38.162893 systemd[1]: Finished Coldplug All udev Devices. Jan 22 00:23:39.803868 kernel: cryptd: max_cpu_qlen set to 1000 Jan 22 00:23:39.804076 kernel: libata version 3.00 loaded. Jan 22 00:23:39.804095 kernel: virtio_blk virtio1: [vda] 9289728 512-byte logical blocks (4.76 GB/4.43 GiB) Jan 22 00:23:39.804236 kernel: vda: detected capacity change from 0 to 4756340736 Jan 22 00:23:39.804248 kernel: AVX2 version of gcm_enc/dec engaged. Jan 22 00:23:39.804260 kernel: AES CTR mode by8 optimization enabled Jan 22 00:23:39.804272 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jan 22 00:23:39.804283 kernel: ahci 0000:00:1f.2: version 3.0 Jan 22 00:23:39.804391 kernel: PCI Interrupt Link [GSIA] enabled at IRQ 16 Jan 22 00:23:39.804408 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Jan 22 00:23:39.804492 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Jan 22 00:23:39.804589 kernel: scsi host0: ahci Jan 22 00:23:39.804787 kernel: scsi host1: ahci Jan 22 00:23:39.804883 kernel: scsi host2: ahci Jan 22 00:23:39.805161 kernel: scsi host3: ahci Jan 22 00:23:39.805260 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/vda6 scanned by systemd-udevd (390) Jan 22 00:23:39.805272 kernel: scsi host4: ahci Jan 22 00:23:39.805376 kernel: scsi host5: ahci Jan 22 00:23:39.805463 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 Jan 22 00:23:39.805474 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 Jan 22 00:23:39.805484 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 Jan 22 00:23:39.805495 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 Jan 22 00:23:39.805506 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 Jan 22 00:23:39.805521 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 Jan 22 00:23:39.805532 kernel: ata2: SATA link down (SStatus 0 SControl 300) Jan 22 00:23:39.805544 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Jan 22 00:23:39.805554 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Jan 22 00:23:39.805566 kernel: ata3.00: applying bridge limits Jan 22 00:23:39.805581 kernel: ata4: SATA link down (SStatus 0 SControl 300) Jan 22 00:23:39.805594 kernel: ata5: SATA link down (SStatus 0 SControl 300) Jan 22 00:23:39.805604 kernel: ata6: SATA link down (SStatus 0 SControl 300) Jan 22 00:23:39.805613 kernel: ata1: SATA link down (SStatus 0 SControl 300) Jan 22 00:23:39.805621 kernel: ata3.00: configured for UDMA/100 Jan 22 00:23:39.805633 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Jan 22 00:23:39.805863 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Jan 22 00:23:39.806169 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jan 22 00:23:39.806182 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jan 22 00:23:38.181529 systemd[1]: Reached target Network. Jan 22 00:23:39.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:38.211157 systemd[1]: Reached target Host and Network Name Lookups. Jan 22 00:23:38.246426 systemd[1]: Starting iSCSI UserSpace I/O driver... Jan 22 00:23:38.408595 systemd-udevd[389]: Using default interface naming scheme 'v249'. Jan 22 00:23:38.433509 systemd-networkd[352]: eth0: Link UP Jan 22 00:23:39.916258 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Jan 22 00:23:39.791872 systemd-networkd[352]: eth0: Gained carrier Jan 22 00:23:39.793409 systemd[1]: Started iSCSI UserSpace I/O driver. Jan 22 00:23:39.824372 systemd[1]: Found device /dev/disk/by-label/ROOT. Jan 22 00:23:39.842488 systemd[1]: Found device /dev/disk/by-partuuid/7130c94a-213a-4e5a-8e26-6cce9662f132. Jan 22 00:23:40.024355 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jan 22 00:23:40.043448 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jan 22 00:23:39.869409 systemd[1]: Found device /dev/disk/by-partlabel/USR-A. Jan 22 00:23:40.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:40.077402 iscsid[469]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jan 22 00:23:40.077402 iscsid[469]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jan 22 00:23:40.077402 iscsid[469]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jan 22 00:23:40.077402 iscsid[469]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jan 22 00:23:40.077402 iscsid[469]: If using hardware iscsi like qla4xxx this message can be ignored. Jan 22 00:23:40.077402 iscsid[469]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jan 22 00:23:40.077402 iscsid[469]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jan 22 00:23:39.873526 systemd[1]: Found device /dev/disk/by-label/EFI-SYSTEM. Jan 22 00:23:39.907264 systemd-networkd[352]: eth0: DHCPv4 address 10.0.0.2/16 via 10.0.0.1 Jan 22 00:23:39.910538 systemd[1]: Found device /dev/disk/by-label/OEM. Jan 22 00:23:39.916561 systemd[1]: Reached target Initrd Root Device. Jan 22 00:23:39.940676 systemd[1]: Starting Generate new UUID for disk GPT if necessary... Jan 22 00:23:39.972238 systemd[1]: Starting Open-iSCSI... Jan 22 00:23:40.032170 systemd[1]: Started Open-iSCSI. Jan 22 00:23:40.053436 systemd[1]: Starting dracut initqueue hook... Jan 22 00:23:40.757527 systemd[1]: Finished dracut initqueue hook. Jan 22 00:23:40.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:40.768682 systemd[1]: Reached target Preparation for Remote File Systems. Jan 22 00:23:40.791865 systemd[1]: Reached target Remote Encrypted Volumes. Jan 22 00:23:40.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:40.802355 systemd[1]: Reached target Remote File Systems. Jan 22 00:23:40.926847 kernel: kauditd_printk_skb: 11 callbacks suppressed Jan 22 00:23:40.926875 kernel: audit: type=1130 audit(1769041420.844:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:40.813856 systemd[1]: Starting dracut pre-mount hook... Jan 22 00:23:40.838231 systemd[1]: Finished dracut pre-mount hook. Jan 22 00:23:40.961813 systemd-networkd[352]: eth0: Gained IPv6LL Jan 22 00:23:41.030415 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jan 22 00:23:41.036084 disk-uuid[468]: The operation has completed successfully. Jan 22 00:23:41.126455 systemd[1]: disk-uuid.service: Deactivated successfully. Jan 22 00:23:41.137373 systemd[1]: Finished Generate new UUID for disk GPT if necessary. Jan 22 00:23:41.295616 kernel: audit: type=1130 audit(1769041421.163:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:41.295654 kernel: audit: type=1131 audit(1769041421.164:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:41.295666 kernel: BTRFS info (device vda6): disk space caching is enabled Jan 22 00:23:41.295676 kernel: BTRFS info (device vda6): has skinny extents Jan 22 00:23:41.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:41.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:41.167200 systemd[1]: Starting Ignition (setup)... Jan 22 00:23:41.354877 systemd[1]: mnt-oem.mount: Deactivated successfully. Jan 22 00:23:41.393268 systemd[1]: ignition-setup.service: Deactivated successfully. Jan 22 00:23:41.410519 systemd[1]: Finished Ignition (setup). Jan 22 00:23:41.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:41.435320 systemd[1]: Starting Ignition (disks)... Jan 22 00:23:41.636397 kernel: audit: type=1130 audit(1769041421.433:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:41.636439 kernel: audit: type=1131 audit(1769041421.433:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:41.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:41.454860 ignition[520]: Ignition v0.36.1-15-gde4e6cc9 Jan 22 00:23:41.454872 ignition[520]: Stage: disks Jan 22 00:23:41.454882 ignition[520]: reading system config file "/usr/lib/ignition/base.ign" Jan 22 00:23:41.455088 ignition[520]: no config at "/usr/lib/ignition/base.ign" Jan 22 00:23:41.455142 ignition[520]: parsed url from cmdline: "" Jan 22 00:23:41.455145 ignition[520]: no config URL provided Jan 22 00:23:41.455150 ignition[520]: reading system config file "/usr/lib/ignition/user.ign" Jan 22 00:23:41.455159 ignition[520]: no config at "/usr/lib/ignition/user.ign" Jan 22 00:23:41.455177 ignition[520]: op(1): [started] loading QEMU firmware config module Jan 22 00:23:41.455182 ignition[520]: op(1): executing: "modprobe" "qemu_fw_cfg" Jan 22 00:23:41.463133 ignition[520]: op(1): [finished] loading QEMU firmware config module Jan 22 00:23:41.921397 ignition[520]: parsing config with SHA512: b7821dacc459b87bd6a0daf6d46c2d1397d5fbf0282e6a23bfac25ad397bb2f169b693a4d3cda0ecc16af2a9f757edac17691eb1ae20f21a87bc0c896fab5943 Jan 22 00:23:41.960140 ignition[520]: disks: disks passed Jan 22 00:23:41.960263 ignition[520]: Ignition finished successfully Jan 22 00:23:41.991554 systemd[1]: ignition-disks.service: Deactivated successfully. Jan 22 00:23:42.003517 systemd[1]: Finished Ignition (disks). Jan 22 00:23:42.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:42.026217 systemd[1]: Reached target Preparation for Local File Systems. Jan 22 00:23:42.153192 kernel: audit: type=1130 audit(1769041422.024:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:42.153223 kernel: audit: type=1131 audit(1769041422.024:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:42.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:42.155214 systemd[1]: Starting File System Check on /dev/disk/by-label/ROOT... Jan 22 00:23:42.183484 systemd[1]: Starting Verity Setup for /dev/mapper/usr... Jan 22 00:23:42.198266 systemd-fsck[531]: ROOT: clean, 556/553792 files, 37783/553472 blocks Jan 22 00:23:42.224571 systemd[1]: Finished File System Check on /dev/disk/by-label/ROOT. Jan 22 00:23:42.292656 kernel: audit: type=1130 audit(1769041422.242:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:42.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:42.297343 systemd[1]: Mounting /sysroot... Jan 22 00:23:42.340108 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Jan 22 00:23:42.578660 systemd[1]: Found device /dev/mapper/usr. Jan 22 00:23:42.677573 kernel: audit: type=1130 audit(1769041422.611:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:42.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:42.594516 systemd[1]: Finished Verity Setup for /dev/mapper/usr. Jan 22 00:23:42.613423 systemd[1]: Starting File System Check on /dev/mapper/usr... Jan 22 00:23:42.874474 systemd-fsck[548]: fsck.ext4: Operation not permitted while trying to open /dev/mapper/usr Jan 22 00:23:42.874474 systemd-fsck[548]: You must have r/w access to the filesystem or be root Jan 22 00:23:42.975154 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null) Jan 22 00:23:42.975183 kernel: ext4 filesystem being mounted at /sysroot supports timestamps until 2038 (0x7fffffff) Jan 22 00:23:42.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:42.875227 systemd-fsck[546]: fsck failed with exit status 8. Jan 22 00:23:43.058247 kernel: audit: type=1130 audit(1769041422.988:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:42.875232 systemd-fsck[546]: Ignoring error. Jan 22 00:23:42.894612 systemd[1]: Mounted /sysroot. Jan 22 00:23:42.928469 systemd[1]: Reached target Initrd Root File System. Jan 22 00:23:43.119563 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: (null) Jan 22 00:23:42.962010 systemd[1]: Finished File System Check on /dev/mapper/usr. Jan 22 00:23:42.991209 systemd[1]: Mounting /sysusr/usr... Jan 22 00:23:43.113530 systemd[1]: Mounted /sysusr/usr. Jan 22 00:23:43.143242 systemd[1]: Reached target Local File Systems. Jan 22 00:23:43.154498 systemd[1]: Reached target System Initialization. Jan 22 00:23:43.164216 systemd[1]: Reached target Basic System. Jan 22 00:23:43.179600 systemd[1]: Mounting /sysroot/usr... Jan 22 00:23:43.195537 systemd[1]: Mounted /sysroot/usr. Jan 22 00:23:43.230656 systemd[1]: Starting Root filesystem setup... Jan 22 00:23:43.417623 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jan 22 00:23:43.419458 systemd[1]: Finished Root filesystem setup. Jan 22 00:23:43.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:43.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:43.481395 systemd[1]: Starting Ignition (files)... Jan 22 00:23:43.505637 systemd[1]: Starting /sysroot/boot... Jan 22 00:23:43.508339 ignition[563]: Ignition v0.36.1-15-gde4e6cc9 Jan 22 00:23:43.508346 ignition[563]: Stage: files Jan 22 00:23:43.508357 ignition[563]: reading system config file "/usr/lib/ignition/base.ign" Jan 22 00:23:43.508369 ignition[563]: no config at "/usr/lib/ignition/base.ign" Jan 22 00:23:43.509245 ignition[563]: files: compiled without relabeling support, skipping Jan 22 00:23:43.620862 systemd[1]: Finished /sysroot/boot. Jan 22 00:23:43.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:43.718343 ignition[563]: files: createUsers: op(1): [started] creating or modifying user "core" Jan 22 00:23:43.718452 ignition[563]: files: createUsers: op(1): executing: "/usr/sbin/usermod" "--root" "/sysroot" "core" Jan 22 00:23:43.729848 ignition[563]: files: createUsers: op(1): [finished] creating or modifying user "core" Jan 22 00:23:43.729866 ignition[563]: files: createUsers: op(2): [started] adding ssh keys to user "core" Jan 22 00:23:43.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:43.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:43.748182 systemd[1]: ignition-files.service: Deactivated successfully. Jan 22 00:23:43.741658 ignition[563]: files: createUsers: op(2): [finished] adding ssh keys to user "core" Jan 22 00:23:43.748390 systemd[1]: Finished Ignition (files). Jan 22 00:23:43.741686 ignition[563]: files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/etc/flatcar/update.conf" Jan 22 00:23:43.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:43.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:43.866000 audit: BPF prog-id=10 op=UNLOAD Jan 22 00:23:43.867000 audit: BPF prog-id=6 op=UNLOAD Jan 22 00:23:43.869000 audit: BPF prog-id=3 op=UNLOAD Jan 22 00:23:43.761162 systemd[1]: Condition check resulted in Populate torcx store to satisfy profile being skipped. Jan 22 00:23:43.870000 audit: BPF prog-id=9 op=UNLOAD Jan 22 00:23:43.743146 ignition[563]: files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/etc/flatcar/update.conf" Jan 22 00:23:43.764227 systemd[1]: Starting Ignition (record completion)... Jan 22 00:23:43.743158 ignition[563]: files: op(4): [started] processing unit "coreos-metadata.service" Jan 22 00:23:43.801479 systemd[1]: Starting Reload Configuration from the Real Root... Jan 22 00:23:43.743190 ignition[563]: files: op(4): op(5): [started] writing unit "coreos-metadata.service" at "etc/systemd/system/coreos-metadata.service" Jan 22 00:23:43.827414 systemd[1]: ignition-quench.service: Deactivated successfully. Jan 22 00:23:43.744505 ignition[563]: files: op(4): op(5): [finished] writing unit "coreos-metadata.service" at "etc/systemd/system/coreos-metadata.service" Jan 22 00:23:43.827654 systemd[1]: Finished Ignition (record completion). Jan 22 00:23:43.744512 ignition[563]: files: op(4): [finished] processing unit "coreos-metadata.service" Jan 22 00:23:43.851697 systemd[1]: Reloading. Jan 22 00:23:43.744516 ignition[563]: files: files passed Jan 22 00:23:43.744520 ignition[563]: Ignition finished successfully Jan 22 00:23:44.105000 audit: BPF prog-id=11 op=LOAD Jan 22 00:23:44.107000 audit: BPF prog-id=12 op=LOAD Jan 22 00:23:44.109000 audit: BPF prog-id=13 op=LOAD Jan 22 00:23:44.111000 audit: BPF prog-id=14 op=LOAD Jan 22 00:23:44.111000 audit: BPF prog-id=7 op=UNLOAD Jan 22 00:23:44.111000 audit: BPF prog-id=8 op=UNLOAD Jan 22 00:23:44.116000 audit: BPF prog-id=15 op=LOAD Jan 22 00:23:44.117000 audit: BPF prog-id=16 op=LOAD Jan 22 00:23:44.121000 audit: BPF prog-id=17 op=LOAD Jan 22 00:23:44.121000 audit: BPF prog-id=4 op=UNLOAD Jan 22 00:23:44.121000 audit: BPF prog-id=5 op=UNLOAD Jan 22 00:23:44.122000 audit: BPF prog-id=18 op=LOAD Jan 22 00:23:44.171440 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jan 22 00:23:44.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:44.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:44.171875 systemd[1]: Finished Reload Configuration from the Real Root. Jan 22 00:23:44.185199 systemd[1]: Reached target Initrd File Systems. Jan 22 00:23:44.197308 systemd[1]: Reached target Initrd Default Target. Jan 22 00:23:44.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:44.223472 systemd[1]: Condition check resulted in dracut mount hook being skipped. Jan 22 00:23:44.225386 systemd[1]: Starting dracut pre-pivot and cleanup hook... Jan 22 00:23:44.258578 systemd[1]: Finished dracut pre-pivot and cleanup hook. Jan 22 00:23:44.275436 systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Jan 22 00:23:44.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:44.304165 systemd[1]: Stopped target Host and Network Name Lookups. Jan 22 00:23:44.326162 systemd[1]: Stopped target Remote Encrypted Volumes. Jan 22 00:23:44.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:44.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:44.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:44.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:44.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:44.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:44.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:44.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:44.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:44.725850 iscsid[469]: iscsid shutting down. Jan 22 00:23:44.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:44.747000 audit: BPF prog-id=11 op=UNLOAD Jan 22 00:23:44.338363 systemd[1]: Stopped target Timer Units. Jan 22 00:23:44.361616 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jan 22 00:23:44.362447 systemd[1]: Stopped dracut pre-pivot and cleanup hook. Jan 22 00:23:44.389165 systemd[1]: Stopped target Initrd Default Target. Jan 22 00:23:44.414305 systemd[1]: Stopped target Basic System. Jan 22 00:23:44.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:44.438516 systemd[1]: Stopped target Initrd Root Device. Jan 22 00:23:44.449615 systemd[1]: Stopped target Path Units. Jan 22 00:23:44.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:44.450279 systemd[1]: Stopped target Remote File Systems. Jan 22 00:23:44.460269 systemd[1]: Stopped target Preparation for Remote File Systems. Jan 22 00:23:44.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:44.479497 systemd[1]: Stopped target Slice Units. Jan 22 00:23:44.484207 systemd[1]: Stopped target Socket Units. Jan 22 00:23:44.970000 audit: BPF prog-id=12 op=UNLOAD Jan 22 00:23:44.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:44.493505 systemd[1]: Stopped target System Initialization. Jan 22 00:23:45.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:44.509456 systemd[1]: Stopped target Local File Systems. Jan 22 00:23:45.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:44.512381 systemd[1]: Stopped target Preparation for Local File Systems. Jan 22 00:23:44.512484 systemd[1]: Stopped target Swaps. Jan 22 00:23:44.517216 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jan 22 00:23:44.517348 systemd[1]: Stopped dracut pre-mount hook. Jan 22 00:23:45.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:45.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:44.531600 systemd[1]: Stopped target Local Encrypted Volumes. Jan 22 00:23:45.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:44.548188 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jan 22 00:23:45.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=rngd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:44.552526 systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Jan 22 00:23:45.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:44.566874 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jan 22 00:23:45.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:45.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:44.567213 systemd[1]: Stopped dracut initqueue hook. Jan 22 00:23:44.583603 systemd[1]: Stopping Open-iSCSI... Jan 22 00:23:44.589177 systemd[1]: Stopping /sysroot/boot... Jan 22 00:23:44.589225 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jan 22 00:23:44.589335 systemd[1]: Stopped Coldplug All udev Devices. Jan 22 00:23:44.589564 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jan 22 00:23:44.589663 systemd[1]: Stopped dracut pre-trigger hook. Jan 22 00:23:44.592450 systemd[1]: iscsid.service: Deactivated successfully. Jan 22 00:23:45.318000 audit: BPF prog-id=15 op=UNLOAD Jan 22 00:23:44.592698 systemd[1]: Stopped Open-iSCSI. Jan 22 00:23:44.607467 systemd[1]: iscsid.socket: Deactivated successfully. Jan 22 00:23:44.607527 systemd[1]: Closed Open-iSCSI iscsid Socket. Jan 22 00:23:44.613457 systemd[1]: Stopping iSCSI UserSpace I/O driver... Jan 22 00:23:44.614619 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jan 22 00:23:44.614867 systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Jan 22 00:23:44.619709 systemd[1]: iscsiuio.service: Deactivated successfully. Jan 22 00:23:44.620239 systemd[1]: Stopped iSCSI UserSpace I/O driver. Jan 22 00:23:44.640145 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jan 22 00:23:44.640444 systemd[1]: Stopped target Network. Jan 22 00:23:44.657323 systemd[1]: iscsiuio.socket: Deactivated successfully. Jan 22 00:23:44.657386 systemd[1]: Closed Open-iSCSI iscsiuio Socket. Jan 22 00:23:44.673532 systemd[1]: Stopping Network Name Resolution... Jan 22 00:23:44.712418 systemd[1]: systemd-resolved.service: Deactivated successfully. Jan 22 00:23:44.712667 systemd[1]: Stopped Network Name Resolution. Jan 22 00:23:44.726226 systemd[1]: sysroot-boot.service: Deactivated successfully. Jan 22 00:23:44.726455 systemd[1]: Stopped /sysroot/boot. Jan 22 00:23:44.746097 systemd[1]: Stopping Network Configuration... Jan 22 00:23:44.750704 systemd-networkd[352]: eth0: DHCP lease lost Jan 22 00:23:44.795345 systemd-networkd[352]: eth0: DHCPv6 lease lost Jan 22 00:23:45.364000 audit: BPF prog-id=18 op=UNLOAD Jan 22 00:23:44.801229 systemd[1]: systemd-networkd.service: Deactivated successfully. Jan 22 00:23:44.801449 systemd[1]: Stopped Network Configuration. Jan 22 00:23:44.835221 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jan 22 00:23:44.835252 systemd[1]: Closed Network Service Netlink Socket. Jan 22 00:23:44.860435 systemd[1]: Stopping Network Cleanup... Jan 22 00:23:44.877884 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jan 22 00:23:44.878119 systemd[1]: Stopped Apply Kernel Variables. Jan 22 00:23:44.891080 systemd[1]: Stopping Rule-based Manager for Device Events and Files... Jan 22 00:23:44.917583 systemd[1]: systemd-udevd.service: Deactivated successfully. Jan 22 00:23:44.918098 systemd[1]: Stopped Rule-based Manager for Device Events and Files. Jan 22 00:23:44.949244 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jan 22 00:23:44.949283 systemd[1]: Closed udev Control Socket. Jan 22 00:23:44.960838 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jan 22 00:23:44.960891 systemd[1]: Closed udev Kernel Socket. Jan 22 00:23:44.961133 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jan 22 00:23:44.961179 systemd[1]: Stopped dracut pre-udev hook. Jan 22 00:23:44.977342 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jan 22 00:23:44.977387 systemd[1]: Stopped dracut cmdline hook. Jan 22 00:23:45.007719 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jan 22 00:23:45.007890 systemd[1]: Stopped dracut ask for additional cmdline parameters. Jan 22 00:23:45.022302 systemd[1]: Starting Cleanup udev Database... Jan 22 00:23:45.052486 systemd[1]: Stopping Hardware RNG Entropy Gatherer Daemon... Jan 22 00:23:45.084328 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jan 22 00:23:45.084408 systemd[1]: Stopped Create Static Device Nodes in /dev. Jan 22 00:23:45.108419 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jan 22 00:23:45.108491 systemd[1]: Stopped Create List of Static Device Nodes. Jan 22 00:23:45.109173 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jan 22 00:23:45.109223 systemd[1]: Stopped Setup Virtual Console. Jan 22 00:23:45.128562 systemd[1]: rngd.service: Deactivated successfully. Jan 22 00:23:45.129416 systemd[1]: Stopped Hardware RNG Entropy Gatherer Daemon. Jan 22 00:23:45.155660 systemd[1]: network-cleanup.service: Deactivated successfully. Jan 22 00:23:45.156285 systemd[1]: Stopped Network Cleanup. Jan 22 00:23:45.178510 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jan 22 00:23:45.178726 systemd[1]: Finished Cleanup udev Database. Jan 22 00:23:45.206533 systemd[1]: Reached target Switch Root. Jan 22 00:23:45.274465 systemd[1]: Starting Switch Root... Jan 22 00:23:45.315304 systemd[1]: Switching root. Jan 22 00:23:45.365887 systemd-journald[192]: Journal stopped Jan 22 00:23:52.882280 systemd-journald[192]: Received SIGTERM from PID 1 (n/a). Jan 22 00:23:52.882361 kernel: SELinux: policy capability network_peer_controls=1 Jan 22 00:23:52.882376 kernel: SELinux: policy capability open_perms=1 Jan 22 00:23:52.882391 kernel: SELinux: policy capability extended_socket_class=1 Jan 22 00:23:52.882405 kernel: SELinux: policy capability always_check_network=0 Jan 22 00:23:52.882415 kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 00:23:52.882425 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 00:23:52.882435 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jan 22 00:23:52.882451 systemd[1]: Successfully loaded SELinux policy in 175.092ms. Jan 22 00:23:52.882472 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.064ms. Jan 22 00:23:52.882484 systemd[1]: systemd 249 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jan 22 00:23:52.882496 systemd[1]: Detected virtualization kvm. Jan 22 00:23:52.882507 systemd[1]: Detected architecture x86-64. Jan 22 00:23:52.882519 systemd[1]: Detected first boot. Jan 22 00:23:52.882530 systemd[1]: Initializing machine ID from VM UUID. Jan 22 00:23:52.882541 kernel: kauditd_printk_skb: 55 callbacks suppressed Jan 22 00:23:52.882553 kernel: audit: type=1400 audit(1769041426.103:88): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jan 22 00:23:52.882565 kernel: audit: type=1400 audit(1769041426.103:89): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jan 22 00:23:52.882575 kernel: audit: type=1334 audit(1769041426.116:90): prog-id=19 op=LOAD Jan 22 00:23:52.882585 kernel: audit: type=1334 audit(1769041426.116:91): prog-id=19 op=UNLOAD Jan 22 00:23:52.882597 kernel: audit: type=1334 audit(1769041426.200:92): prog-id=20 op=LOAD Jan 22 00:23:52.882609 kernel: audit: type=1334 audit(1769041426.200:93): prog-id=20 op=UNLOAD Jan 22 00:23:52.882621 kernel: audit: type=1400 audit(1769041426.482:94): avc: denied { associate } for pid=728 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jan 22 00:23:52.882633 systemd[1]: Populated /etc with preset unit settings. Jan 22 00:23:52.882645 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jan 22 00:23:52.882657 systemd[1]: initrd-switch-root.service: Current command vanished from the unit file, execution of the command list won't be resumed. Jan 22 00:23:52.882667 kernel: audit: type=1334 audit(1769041430.919:95): prog-id=21 op=LOAD Jan 22 00:23:52.882677 kernel: audit: type=1334 audit(1769041430.937:96): prog-id=22 op=LOAD Jan 22 00:23:52.882690 kernel: audit: type=1334 audit(1769041430.939:97): prog-id=23 op=LOAD Jan 22 00:23:52.882700 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jan 22 00:23:52.882711 systemd[1]: Stopped Switch Root. Jan 22 00:23:52.882722 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jan 22 00:23:52.882735 systemd[1]: Created slice Slice /system/addon-config. Jan 22 00:23:52.882747 systemd[1]: Created slice Slice /system/addon-run. Jan 22 00:23:52.882761 systemd[1]: Created slice Slice /system/getty. Jan 22 00:23:52.882772 systemd[1]: Created slice Slice /system/modprobe. Jan 22 00:23:52.882783 systemd[1]: Created slice Slice /system/serial-getty. Jan 22 00:23:52.882795 systemd[1]: Created slice Slice /system/system-cloudinit. Jan 22 00:23:52.882806 systemd[1]: Created slice Slice /system/systemd-fsck. Jan 22 00:23:52.883253 systemd[1]: Created slice User and Session Slice. Jan 22 00:23:52.883271 systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Jan 22 00:23:52.883286 systemd[1]: Started Forward Password Requests to Wall Directory Watch. Jan 22 00:23:52.883298 systemd[1]: Set up automount Boot partition Automount Point. Jan 22 00:23:52.883309 systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Jan 22 00:23:52.883324 systemd[1]: Stopped target Switch Root. Jan 22 00:23:52.883335 systemd[1]: Stopped target Initrd File Systems. Jan 22 00:23:52.883347 systemd[1]: Stopped target Initrd Root File System. Jan 22 00:23:52.883360 systemd[1]: Reached target Remote Encrypted Volumes. Jan 22 00:23:52.883371 systemd[1]: Reached target Remote File Systems. Jan 22 00:23:52.883382 systemd[1]: Reached target Slice Units. Jan 22 00:23:52.883393 systemd[1]: Reached target Swaps. Jan 22 00:23:52.883403 systemd[1]: Reached target Verify torcx succeeded. Jan 22 00:23:52.883416 systemd[1]: Reached target Local Verity Protected Volumes. Jan 22 00:23:52.883427 systemd[1]: Listening on Process Core Dump Socket. Jan 22 00:23:52.883438 systemd[1]: Listening on initctl Compatibility Named Pipe. Jan 22 00:23:52.883448 systemd[1]: Listening on Network Service Netlink Socket. Jan 22 00:23:52.883459 systemd[1]: Listening on udev Control Socket. Jan 22 00:23:52.883472 systemd[1]: Listening on udev Kernel Socket. Jan 22 00:23:52.883483 systemd[1]: Mounting Huge Pages File System... Jan 22 00:23:52.883494 systemd[1]: Mounting POSIX Message Queue File System... Jan 22 00:23:52.883505 systemd[1]: Mounting External Media Directory... Jan 22 00:23:52.883520 systemd[1]: Condition check resulted in /proc/xen being skipped. Jan 22 00:23:52.883531 systemd[1]: Mounting Kernel Debug File System... Jan 22 00:23:52.883542 systemd[1]: Mounting Kernel Trace File System... Jan 22 00:23:52.883556 systemd[1]: Mounting Temporary Directory /tmp... Jan 22 00:23:52.883566 systemd[1]: Starting Create missing system files... Jan 22 00:23:52.883579 systemd[1]: Starting Create List of Static Device Nodes... Jan 22 00:23:52.883590 systemd[1]: Starting Load Kernel Module configfs... Jan 22 00:23:52.883600 systemd[1]: Starting Load Kernel Module drm... Jan 22 00:23:52.883611 systemd[1]: Starting Load Kernel Module fuse... Jan 22 00:23:52.883622 systemd[1]: Condition check resulted in Create /etc/nsswitch.conf being skipped. Jan 22 00:23:52.883633 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jan 22 00:23:52.883644 kernel: fuse: init (API version 7.32) Jan 22 00:23:52.883654 systemd[1]: Stopped File System Check on Root Device. Jan 22 00:23:52.883664 kernel: kauditd_printk_skb: 12 callbacks suppressed Jan 22 00:23:52.883675 kernel: audit: type=1131 audit(1769041432.258:110): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:52.883691 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jan 22 00:23:52.883702 systemd[1]: Stopped systemd-fsck-usr.service. Jan 22 00:23:52.883715 kernel: audit: type=1131 audit(1769041432.359:111): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:52.883726 systemd[1]: Stopped Journal Service. Jan 22 00:23:52.883737 systemd[1]: systemd-journald.service: Consumed 3.464s CPU time. Jan 22 00:23:52.883748 kernel: audit: type=1130 audit(1769041432.436:112): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:52.883759 kernel: audit: type=1131 audit(1769041432.436:113): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:52.883771 kernel: audit: type=1334 audit(1769041432.573:114): prog-id=27 op=LOAD Jan 22 00:23:52.883781 kernel: audit: type=1334 audit(1769041432.606:115): prog-id=28 op=LOAD Jan 22 00:23:52.883791 kernel: audit: type=1334 audit(1769041432.650:116): prog-id=29 op=LOAD Jan 22 00:23:52.883801 kernel: audit: type=1334 audit(1769041432.664:117): prog-id=25 op=UNLOAD Jan 22 00:23:52.883812 systemd[1]: Starting Journal Service... Jan 22 00:23:52.884082 kernel: audit: type=1334 audit(1769041432.664:118): prog-id=26 op=UNLOAD Jan 22 00:23:52.884096 systemd[1]: Condition check resulted in Load Kernel Modules being skipped. Jan 22 00:23:52.884110 systemd[1]: Starting Remount Root and Kernel File Systems... Jan 22 00:23:52.884122 systemd[1]: Starting Apply Kernel Variables... Jan 22 00:23:52.884134 kernel: audit: type=1305 audit(1769041432.844:119): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jan 22 00:23:52.884158 systemd-journald[782]: Journal started Jan 22 00:23:52.884200 systemd-journald[782]: Runtime Journal (/run/log/journal/1a8e0eb2b121448da543757784405e48) is 6.0M, max 48.7M, 42.6M free. Jan 22 00:23:45.821000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jan 22 00:23:46.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jan 22 00:23:46.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jan 22 00:23:46.116000 audit: BPF prog-id=19 op=LOAD Jan 22 00:23:46.116000 audit: BPF prog-id=19 op=UNLOAD Jan 22 00:23:46.200000 audit: BPF prog-id=20 op=LOAD Jan 22 00:23:46.200000 audit: BPF prog-id=20 op=UNLOAD Jan 22 00:23:46.482000 audit[728]: AVC avc: denied { associate } for pid=728 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jan 22 00:23:50.919000 audit: BPF prog-id=21 op=LOAD Jan 22 00:23:50.937000 audit: BPF prog-id=22 op=LOAD Jan 22 00:23:50.939000 audit: BPF prog-id=23 op=LOAD Jan 22 00:23:50.939000 audit: BPF prog-id=16 op=UNLOAD Jan 22 00:23:50.939000 audit: BPF prog-id=17 op=UNLOAD Jan 22 00:23:50.987000 audit: BPF prog-id=24 op=LOAD Jan 22 00:23:50.988000 audit: BPF prog-id=21 op=UNLOAD Jan 22 00:23:50.988000 audit: BPF prog-id=25 op=LOAD Jan 22 00:23:50.992000 audit: BPF prog-id=26 op=LOAD Jan 22 00:23:50.993000 audit: BPF prog-id=22 op=UNLOAD Jan 22 00:23:50.993000 audit: BPF prog-id=23 op=UNLOAD Jan 22 00:23:50.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:51.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:51.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:51.044000 audit: BPF prog-id=24 op=UNLOAD Jan 22 00:23:52.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:52.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:52.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:52.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:52.573000 audit: BPF prog-id=27 op=LOAD Jan 22 00:23:52.606000 audit: BPF prog-id=28 op=LOAD Jan 22 00:23:52.650000 audit: BPF prog-id=29 op=LOAD Jan 22 00:23:52.664000 audit: BPF prog-id=25 op=UNLOAD Jan 22 00:23:52.664000 audit: BPF prog-id=26 op=UNLOAD Jan 22 00:23:52.844000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jan 22 00:23:46.457362 /usr/lib64/systemd/system-generators/torcx-generator[728]: time="2026-01-22T00:23:46Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3033.2.4 /usr/share/oem/torcx/store /var/lib/torcx/store/3033.2.4 /var/lib/torcx/store]" Jan 22 00:23:50.917438 systemd[1]: Queued start job for default target Multi-User System. Jan 22 00:23:46.465150 /usr/lib64/systemd/system-generators/torcx-generator[728]: time="2026-01-22T00:23:46Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jan 22 00:23:50.995177 systemd[1]: systemd-journald.service: Deactivated successfully. Jan 22 00:23:46.465172 /usr/lib64/systemd/system-generators/torcx-generator[728]: time="2026-01-22T00:23:46Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jan 22 00:23:50.996204 systemd[1]: systemd-journald.service: Consumed 3.464s CPU time. Jan 22 00:23:46.465549 /usr/lib64/systemd/system-generators/torcx-generator[728]: time="2026-01-22T00:23:46Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jan 22 00:23:46.465562 /usr/lib64/systemd/system-generators/torcx-generator[728]: time="2026-01-22T00:23:46Z" level=debug msg="skipped missing lower profile" missing profile=oem Jan 22 00:23:46.466115 /usr/lib64/systemd/system-generators/torcx-generator[728]: time="2026-01-22T00:23:46Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jan 22 00:23:46.466131 /usr/lib64/systemd/system-generators/torcx-generator[728]: time="2026-01-22T00:23:46Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jan 22 00:23:46.466348 /usr/lib64/systemd/system-generators/torcx-generator[728]: time="2026-01-22T00:23:46Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jan 22 00:23:46.466385 /usr/lib64/systemd/system-generators/torcx-generator[728]: time="2026-01-22T00:23:46Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jan 22 00:23:46.466400 /usr/lib64/systemd/system-generators/torcx-generator[728]: time="2026-01-22T00:23:46Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jan 22 00:23:46.471590 /usr/lib64/systemd/system-generators/torcx-generator[728]: time="2026-01-22T00:23:46Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jan 22 00:23:46.471627 /usr/lib64/systemd/system-generators/torcx-generator[728]: time="2026-01-22T00:23:46Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jan 22 00:23:46.471647 /usr/lib64/systemd/system-generators/torcx-generator[728]: time="2026-01-22T00:23:46Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3033.2.4: no such file or directory" path=/usr/share/oem/torcx/store/3033.2.4 Jan 22 00:23:46.471663 /usr/lib64/systemd/system-generators/torcx-generator[728]: time="2026-01-22T00:23:46Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jan 22 00:23:46.471681 /usr/lib64/systemd/system-generators/torcx-generator[728]: time="2026-01-22T00:23:46Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3033.2.4: no such file or directory" path=/var/lib/torcx/store/3033.2.4 Jan 22 00:23:46.471696 /usr/lib64/systemd/system-generators/torcx-generator[728]: time="2026-01-22T00:23:46Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jan 22 00:23:50.193643 /usr/lib64/systemd/system-generators/torcx-generator[728]: time="2026-01-22T00:23:50Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jan 22 00:23:50.194237 /usr/lib64/systemd/system-generators/torcx-generator[728]: time="2026-01-22T00:23:50Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jan 22 00:23:50.194362 /usr/lib64/systemd/system-generators/torcx-generator[728]: time="2026-01-22T00:23:50Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jan 22 00:23:50.194508 /usr/lib64/systemd/system-generators/torcx-generator[728]: time="2026-01-22T00:23:50Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jan 22 00:23:50.194567 /usr/lib64/systemd/system-generators/torcx-generator[728]: time="2026-01-22T00:23:50Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jan 22 00:23:50.194630 /usr/lib64/systemd/system-generators/torcx-generator[728]: time="2026-01-22T00:23:50Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jan 22 00:23:52.903414 systemd[1]: Starting Coldplug All udev Devices... Jan 22 00:23:52.953354 systemd[1]: verity-setup.service: Deactivated successfully. Jan 22 00:23:52.963380 systemd[1]: Stopped verity-setup.service. Jan 22 00:23:52.963402 systemd[1]: Condition check resulted in Set fake PV driver version for XenServer being skipped. Jan 22 00:23:52.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:53.022587 systemd[1]: Started Journal Service. Jan 22 00:23:53.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:53.023667 systemd[1]: Mounted Huge Pages File System. Jan 22 00:23:53.039656 systemd[1]: Mounted POSIX Message Queue File System. Jan 22 00:23:53.057702 systemd[1]: Mounted External Media Directory. Jan 22 00:23:53.076143 systemd[1]: Mounted Kernel Debug File System. Jan 22 00:23:53.090418 systemd[1]: Mounted Kernel Trace File System. Jan 22 00:23:53.103238 systemd[1]: Mounted Temporary Directory /tmp. Jan 22 00:23:53.115770 systemd[1]: Finished Create missing system files. Jan 22 00:23:53.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:53.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:53.128419 systemd[1]: Finished Create List of Static Device Nodes. Jan 22 00:23:53.140763 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jan 22 00:23:53.141578 systemd[1]: Finished Load Kernel Module configfs. Jan 22 00:23:53.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:53.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:53.168543 systemd[1]: modprobe@drm.service: Deactivated successfully. Jan 22 00:23:53.169192 systemd[1]: Finished Load Kernel Module drm. Jan 22 00:23:53.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:53.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:53.183252 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jan 22 00:23:53.183536 systemd[1]: Finished Load Kernel Module fuse. Jan 22 00:23:53.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:53.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:53.196756 systemd[1]: Finished Remount Root and Kernel File Systems. Jan 22 00:23:53.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:53.211801 systemd[1]: Finished Apply Kernel Variables. Jan 22 00:23:53.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:53.237230 systemd[1]: Mounting FUSE Control File System... Jan 22 00:23:53.255183 systemd[1]: Mounting Kernel Configuration File System... Jan 22 00:23:53.268730 systemd[1]: Condition check resulted in Remount Root File System being skipped. Jan 22 00:23:53.283550 systemd[1]: Starting Rebuild Hardware Database... Jan 22 00:23:53.299518 systemd[1]: Starting Flush Journal to Persistent Storage... Jan 22 00:23:53.315802 systemd[1]: Condition check resulted in Platform Persistent Storage Archival being skipped. Jan 22 00:23:53.318673 systemd[1]: Starting Load/Save Random Seed... Jan 22 00:23:53.338186 systemd[1]: Starting Create System Users... Jan 22 00:23:53.344317 systemd-journald[782]: Time spent on flushing to /var/log/journal/1a8e0eb2b121448da543757784405e48 is 30.021ms for 1009 entries. Jan 22 00:23:53.344317 systemd-journald[782]: System Journal (/var/log/journal/1a8e0eb2b121448da543757784405e48) is 8.0M, max 203.0M, 195.0M free. Jan 22 00:23:53.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:53.384319 systemd[1]: Finished Coldplug All udev Devices. Jan 22 00:23:53.401667 systemd[1]: Mounted FUSE Control File System. Jan 22 00:23:53.421622 systemd[1]: Mounted Kernel Configuration File System. Jan 22 00:23:53.448721 systemd[1]: Finished Flush Journal to Persistent Storage. Jan 22 00:23:53.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:53.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:53.482198 systemd[1]: Finished Load/Save Random Seed. Jan 22 00:23:53.497818 systemd[1]: Reached target First Boot Complete. Jan 22 00:23:53.520718 systemd[1]: Starting Wait for udev To Complete Device Initialization... Jan 22 00:23:53.537596 systemd-sysusers[793]: Creating group sgx with gid 999. Jan 22 00:23:53.544802 systemd-sysusers[793]: Creating group systemd-oom with gid 998. Jan 22 00:23:53.551651 systemd-sysusers[793]: Creating user systemd-oom (systemd Userspace OOM Killer) with uid 998 and gid 998. Jan 22 00:23:53.557465 systemd-sysusers[793]: Creating group systemd-timesync with gid 997. Jan 22 00:23:53.560763 systemd-sysusers[793]: Creating user systemd-timesync (systemd Time Synchronization) with uid 997 and gid 997. Jan 22 00:23:53.568775 systemd-sysusers[793]: Creating group systemd-coredump with gid 996. Jan 22 00:23:53.573754 systemd-sysusers[793]: Creating user systemd-coredump (systemd Core Dumper) with uid 996 and gid 996. Jan 22 00:23:53.649212 systemd[1]: Finished Create System Users. Jan 22 00:23:53.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:53.677615 systemd[1]: Starting Create Static Device Nodes in /dev... Jan 22 00:23:53.778350 systemd[1]: Finished Create Static Device Nodes in /dev. Jan 22 00:23:53.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:53.937603 systemd[1]: Finished Rebuild Hardware Database. Jan 22 00:23:53.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:53.965000 audit: BPF prog-id=30 op=LOAD Jan 22 00:23:53.969000 audit: BPF prog-id=31 op=LOAD Jan 22 00:23:53.970000 audit: BPF prog-id=32 op=LOAD Jan 22 00:23:53.970000 audit: BPF prog-id=13 op=UNLOAD Jan 22 00:23:53.970000 audit: BPF prog-id=14 op=UNLOAD Jan 22 00:23:53.971805 systemd[1]: Starting Rule-based Manager for Device Events and Files... Jan 22 00:23:54.187704 systemd[1]: Started Rule-based Manager for Device Events and Files. Jan 22 00:23:54.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:54.223000 audit: BPF prog-id=33 op=LOAD Jan 22 00:23:54.227148 systemd[1]: Starting Network Configuration... Jan 22 00:23:54.362508 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Jan 22 00:23:54.376519 systemd-udevd[819]: Using default interface naming scheme 'v249'. Jan 22 00:23:54.400276 kernel: ACPI: Power Button [PWRF] Jan 22 00:23:54.411000 audit[817]: AVC avc: denied { confidentiality } for pid=817 comm="systemd-udevd" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jan 22 00:23:54.503756 systemd-networkd[814]: lo: Link UP Jan 22 00:23:54.504291 systemd-networkd[814]: lo: Gained carrier Jan 22 00:23:54.504654 systemd-networkd[814]: Enumeration completed Jan 22 00:23:54.505420 systemd[1]: Started Network Configuration. Jan 22 00:23:54.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:54.513476 systemd-networkd[814]: eth0: Link UP Jan 22 00:23:54.527284 systemd-networkd[814]: eth0: Gained carrier Jan 22 00:23:54.540342 systemd-networkd[814]: eth0: DHCPv4 address 10.0.0.2/16 via 10.0.0.1 Jan 22 00:23:54.589650 udevadm[797]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Jan 22 00:23:54.616644 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Jan 22 00:23:54.678120 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Jan 22 00:23:54.678310 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Jan 22 00:23:54.700456 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Jan 22 00:23:54.834302 kernel: mousedev: PS/2 mouse device common for all mice Jan 22 00:23:54.863451 kernel: kvm: Nested Virtualization enabled Jan 22 00:23:54.863519 kernel: SVM: kvm: Nested Paging enabled Jan 22 00:23:54.863538 kernel: SVM: Virtual VMLOAD VMSAVE supported Jan 22 00:23:54.902559 kernel: EDAC MC: Ver: 3.0.0 Jan 22 00:23:55.554160 systemd-networkd[814]: eth0: Gained IPv6LL Jan 22 00:23:55.897552 systemd[1]: Finished Wait for udev To Complete Device Initialization. Jan 22 00:23:55.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:55.933286 systemd[1]: Starting Activation of LVM2 logical volumes... Jan 22 00:23:56.005754 lvm[831]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jan 22 00:23:56.047773 systemd[1]: Finished Activation of LVM2 logical volumes. Jan 22 00:23:56.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:56.064607 systemd[1]: Reached target Local Encrypted Volumes. Jan 22 00:23:56.087227 systemd[1]: Starting Activation of LVM2 logical volumes... Jan 22 00:23:56.099349 lvm[832]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jan 22 00:23:56.139648 systemd[1]: Finished Activation of LVM2 logical volumes. Jan 22 00:23:56.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:56.157540 systemd[1]: Reached target Preparation for Local File Systems. Jan 22 00:23:56.176612 systemd[1]: Condition check resulted in Virtual Machine and Container Storage (Compatibility) being skipped. Jan 22 00:23:56.176835 systemd[1]: Reached target Containers. Jan 22 00:23:56.197845 systemd[1]: Starting File System Check on /dev/disk/by-label/OEM... Jan 22 00:23:56.265625 systemd[1]: Finished File System Check on /dev/disk/by-label/OEM. Jan 22 00:23:56.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:56.301282 systemd[1]: Mounting /usr/share/oem... Jan 22 00:23:56.376522 kernel: BTRFS info (device vda6): disk space caching is enabled Jan 22 00:23:56.376638 kernel: BTRFS info (device vda6): has skinny extents Jan 22 00:23:56.440825 systemd[1]: Mounted /usr/share/oem. Jan 22 00:23:56.457760 systemd[1]: Reached target Local File Systems. Jan 22 00:23:56.489275 systemd[1]: Starting Rebuild Dynamic Linker Cache... Jan 22 00:23:56.512110 systemd[1]: Condition check resulted in Set Up Additional Binary Formats being skipped. Jan 22 00:23:56.512244 systemd[1]: Condition check resulted in Store a System Token in an EFI Variable being skipped. Jan 22 00:23:56.515246 systemd[1]: Starting Commit a transient machine-id on disk... Jan 22 00:23:56.535505 systemd[1]: Starting Create Volatile Files and Directories... Jan 22 00:23:56.567169 systemd-tmpfiles[857]: /usr/lib64/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jan 22 00:23:56.569409 systemd-tmpfiles[857]: /usr/lib64/tmpfiles.d/systemd.conf:33: Duplicate line for path "/var/lib/systemd", ignoring. Jan 22 00:23:56.595644 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jan 22 00:23:56.597184 systemd[1]: Finished Commit a transient machine-id on disk. Jan 22 00:23:56.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:56.689461 systemd-tmpfiles[857]: Detected autofs mount point /boot during canonicalization of /boot. Jan 22 00:23:56.689472 systemd-tmpfiles[857]: Skipping /boot Jan 22 00:23:56.699658 systemd-tmpfiles[857]: Detected autofs mount point /boot during canonicalization of /boot. Jan 22 00:23:56.699788 systemd-tmpfiles[857]: Skipping /boot Jan 22 00:23:56.772451 systemd[1]: Finished Create Volatile Files and Directories. Jan 22 00:23:56.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:56.799799 systemd[1]: Starting Load Security Auditing Rules... Jan 22 00:23:56.812160 systemd[1]: Starting Clean up broken links in /etc/ssl/certs... Jan 22 00:23:56.827753 systemd[1]: Starting Rebuild Journal Catalog... Jan 22 00:23:56.845000 audit: BPF prog-id=34 op=LOAD Jan 22 00:23:56.847636 systemd[1]: Starting Network Name Resolution... Jan 22 00:23:56.862000 audit: BPF prog-id=35 op=LOAD Jan 22 00:23:56.865611 systemd[1]: Starting Network Time Synchronization... Jan 22 00:23:56.891000 audit[869]: SYSTEM_BOOT pid=869 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib64/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jan 22 00:23:56.878867 systemd[1]: Starting Record System Boot/Shutdown in UTMP... Jan 22 00:23:56.893752 systemd[1]: Finished Clean up broken links in /etc/ssl/certs. Jan 22 00:23:56.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:56.926725 systemd[1]: Finished Rebuild Journal Catalog. Jan 22 00:23:56.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:56.941653 systemd[1]: Condition check resulted in Update CA bundle at /etc/ssl/certs/ca-certificates.crt being skipped. Jan 22 00:23:56.951286 systemd[1]: Finished Record System Boot/Shutdown in UTMP. Jan 22 00:23:56.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:23:57.011000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jan 22 00:23:57.017166 augenrules[879]: No rules Jan 22 00:23:57.018536 systemd[1]: Finished Load Security Auditing Rules. Jan 22 00:23:57.132708 systemd[1]: Started Network Time Synchronization. Jan 22 00:23:57.134366 systemd-resolved[865]: Positive Trust Anchors: Jan 22 00:23:57.134585 systemd-resolved[865]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jan 22 00:23:57.134685 systemd-resolved[865]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jan 22 00:23:57.140810 systemd-resolved[865]: Defaulting to hostname 'linux'. Jan 22 00:23:57.145389 systemd[1]: Reached target System Time Set. Jan 22 00:23:57.156798 systemd[1]: Started Network Name Resolution. Jan 22 00:23:57.169827 systemd[1]: Reached target Network. Jan 22 00:23:57.651906 systemd-resolved[865]: Clock change detected. Flushing caches. Jan 22 00:23:57.651967 systemd-timesyncd[868]: Initial synchronization to time server 10.0.0.1:123 (10.0.0.1). Jan 22 00:23:57.652154 systemd[1]: Reached target Host and Network Name Lookups. Jan 22 00:23:57.921447 systemd[1]: Finished Rebuild Dynamic Linker Cache. Jan 22 00:23:57.945928 systemd[1]: Starting Update is Completed... Jan 22 00:23:57.969323 systemd[1]: Finished Update is Completed. Jan 22 00:23:57.980117 systemd[1]: Reached target System Initialization. Jan 22 00:23:57.991970 systemd[1]: Started Watch for update engine configuration changes. Jan 22 00:23:58.005808 systemd[1]: Started Watch for a cloud-config at /var/lib/flatcar-install/user_data. Jan 22 00:23:58.020356 systemd[1]: Started Daily Log Rotation. Jan 22 00:23:58.030904 systemd[1]: Started Weekly check for MD array's redundancy information.. Jan 22 00:23:58.046755 systemd[1]: Started Daily Cleanup of Temporary Directories. Jan 22 00:23:58.060105 systemd[1]: Condition check resulted in Update Engine Stub Timer being skipped. Jan 22 00:23:58.060236 systemd[1]: Reached target Path Units. Jan 22 00:23:58.069871 systemd[1]: Reached target Timer Units. Jan 22 00:23:58.081328 systemd[1]: Listening on D-Bus System Message Bus Socket. Jan 22 00:23:58.101430 systemd[1]: Starting Docker Socket for the API... Jan 22 00:23:58.123020 systemd[1]: Listening on OpenSSH Server Socket. Jan 22 00:23:58.134153 systemd[1]: Listening on Docker Socket for the API. Jan 22 00:23:58.144900 systemd[1]: Reached target Socket Units. Jan 22 00:23:58.154324 systemd[1]: Reached target Basic System. Jan 22 00:23:58.163853 systemd[1]: Condition check resulted in Configure Addon /usr/share/oem being skipped. Jan 22 00:23:58.163992 systemd[1]: Condition check resulted in Run Addon /usr/share/oem being skipped. Jan 22 00:23:58.166033 systemd[1]: Started D-Bus System Message Bus. Jan 22 00:23:58.180957 systemd[1]: Starting Extend Filesystems... Jan 22 00:23:58.191248 systemd[1]: Condition check resulted in Modifies /etc/environment for CoreOS being skipped. Jan 22 00:23:58.193187 systemd[1]: Starting Generate /run/flatcar/motd... Jan 22 00:23:58.208159 systemd[1]: Starting Install an ssh key from /proc/cmdline... Jan 22 00:23:58.213899 extend-filesystems[890]: Found sr0 Jan 22 00:23:58.230443 extend-filesystems[890]: Found vda Jan 22 00:23:58.230443 extend-filesystems[890]: Found vda1 Jan 22 00:23:58.230443 extend-filesystems[890]: Found vda2 Jan 22 00:23:58.230443 extend-filesystems[890]: Found vda3 Jan 22 00:23:58.230443 extend-filesystems[890]: Found usr Jan 22 00:23:58.230443 extend-filesystems[890]: Found vda4 Jan 22 00:23:58.230443 extend-filesystems[890]: Found vda6 Jan 22 00:23:58.230443 extend-filesystems[890]: Found vda7 Jan 22 00:23:58.230443 extend-filesystems[890]: Found vda9 Jan 22 00:23:58.230443 extend-filesystems[890]: Checking size of /dev/vda9 Jan 22 00:23:58.270230 systemd[1]: Starting Generate sshd host keys... Jan 22 00:23:58.440994 extend-filesystems[890]: Old size kept for /dev/vda9 Jan 22 00:23:58.288024 systemd[1]: Condition check resulted in Load cloud-config from /usr/share/oem/cloud-config.yml being skipped. Jan 22 00:23:58.288058 systemd[1]: Reached target Load system-provided cloud configs. Jan 22 00:23:58.322171 systemd[1]: Starting User Login Management... Jan 22 00:23:58.322391 systemd[1]: Condition check resulted in TCG Core Services Daemon being skipped. Jan 22 00:23:58.323055 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jan 22 00:23:58.324934 systemd[1]: Starting Update Engine... Jan 22 00:23:58.332908 systemd[1]: Condition check resulted in Load cloud-config from url defined in /proc/cmdline being skipped. Jan 22 00:23:58.332931 systemd[1]: Reached target Load user-provided cloud configs. Jan 22 00:23:58.333836 systemd[1]: extend-filesystems.service: Deactivated successfully. Jan 22 00:23:58.334169 systemd[1]: Finished Extend Filesystems. Jan 22 00:23:58.347286 systemd[1]: motdgen.service: Deactivated successfully. Jan 22 00:23:58.347881 systemd[1]: Finished Generate /run/flatcar/motd. Jan 22 00:23:58.363271 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jan 22 00:23:58.365985 systemd[1]: Finished Install an ssh key from /proc/cmdline. Jan 22 00:23:58.519378 systemd-logind[917]: Watching system buttons on /dev/input/event1 (Power Button) Jan 22 00:23:58.519783 systemd-logind[917]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jan 22 00:23:58.521162 systemd-logind[917]: New seat seat0. Jan 22 00:23:58.525291 systemd[1]: Started User Login Management. Jan 22 00:23:58.544372 update_engine[918]: I0122 00:23:58.540138 918 main.cc:89] Flatcar Update Engine starting Jan 22 00:23:58.552823 systemd[1]: Started Update Engine. Jan 22 00:23:58.554212 update_engine[918]: I0122 00:23:58.554069 918 update_check_scheduler.cc:74] Next update check in 8m25s Jan 22 00:23:58.574157 systemd[1]: Started Cluster reboot manager. Jan 22 00:23:58.660829 sshd_keygen[915]: ssh-keygen: generating new host keys: RSA DSA ECDSA ED25519 Jan 22 00:23:58.727078 systemd[1]: Finished Generate sshd host keys. Jan 22 00:23:58.749143 systemd[1]: Starting Generate /run/issue... Jan 22 00:23:58.787027 systemd[1]: issuegen.service: Deactivated successfully. Jan 22 00:23:58.787438 systemd[1]: Finished Generate /run/issue. Jan 22 00:23:58.814311 systemd[1]: Starting Permit User Sessions... Jan 22 00:23:58.831449 systemd[1]: Finished Permit User Sessions. Jan 22 00:23:58.862077 systemd[1]: Started Getty on tty1. Jan 22 00:23:58.874942 systemd[1]: Started Serial Getty on ttyS0. Jan 22 00:23:58.890303 systemd[1]: Reached target Login Prompts. Jan 22 00:23:58.902903 systemd[1]: Reached target Multi-User System. Jan 22 00:23:58.925138 systemd[1]: Starting Record Runlevel Change in UTMP... Jan 22 00:23:58.947211 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jan 22 00:23:58.947778 systemd[1]: Finished Record Runlevel Change in UTMP. Jan 22 00:23:58.963136 systemd[1]: Startup finished in 6.099s (kernel) + 11.718s (initrd) + 12.865s (userspace) = 30.684s. Jan 22 00:23:58.974463 locksmithd[923]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jan 22 00:24:05.325417 systemd[1]: Created slice Slice /system/sshd. Jan 22 00:24:05.328467 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:50776). Jan 22 00:24:05.466063 sshd[945]: Accepted publickey for core from 10.0.0.1 port 50776 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:24:05.471023 sshd[945]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:24:05.500187 systemd[1]: Created slice User Slice of UID 500. Jan 22 00:24:05.502461 systemd[1]: Starting User Runtime Directory /run/user/500... Jan 22 00:24:05.508375 systemd-logind[917]: New session 1 of user core. Jan 22 00:24:05.525907 systemd[1]: Finished User Runtime Directory /run/user/500. Jan 22 00:24:05.537438 systemd[1]: Starting User Manager for UID 500... Jan 22 00:24:05.543391 systemd[948]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:24:05.688499 systemd[948]: Queued start job for default target Main User Target. Jan 22 00:24:05.689157 systemd[948]: Reached target Paths. Jan 22 00:24:05.689272 systemd[948]: Reached target Sockets. Jan 22 00:24:05.689285 systemd[948]: Reached target Timers. Jan 22 00:24:05.689299 systemd[948]: Reached target Basic System. Jan 22 00:24:05.689344 systemd[948]: Reached target Main User Target. Jan 22 00:24:05.689360 systemd[948]: Startup finished in 129ms. Jan 22 00:24:05.690331 systemd[1]: Started User Manager for UID 500. Jan 22 00:24:05.700387 systemd[1]: Started Session 1 of User core. Jan 22 00:24:05.796335 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:50788). Jan 22 00:24:05.861291 sshd[957]: Accepted publickey for core from 10.0.0.1 port 50788 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:24:05.863085 sshd[957]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:24:05.874942 systemd-logind[917]: New session 2 of user core. Jan 22 00:24:05.887240 systemd[1]: Started Session 2 of User core. Jan 22 00:24:06.012153 sshd[957]: pam_unix(sshd:session): session closed for user core Jan 22 00:24:06.021134 systemd[1]: sshd@1-10.0.0.2:22-10.0.0.1:50788.service: Deactivated successfully. Jan 22 00:24:06.022497 systemd[1]: session-2.scope: Deactivated successfully. Jan 22 00:24:06.025210 systemd-logind[917]: Session 2 logged out. Waiting for processes to exit. Jan 22 00:24:06.028095 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:50800). Jan 22 00:24:06.032119 systemd-logind[917]: Removed session 2. Jan 22 00:24:06.083332 sshd[963]: Accepted publickey for core from 10.0.0.1 port 50800 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:24:06.086275 sshd[963]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:24:06.102119 systemd-logind[917]: New session 3 of user core. Jan 22 00:24:06.112290 systemd[1]: Started Session 3 of User core. Jan 22 00:24:06.209020 sshd[963]: pam_unix(sshd:session): session closed for user core Jan 22 00:24:06.217515 systemd[1]: sshd@2-10.0.0.2:22-10.0.0.1:50800.service: Deactivated successfully. Jan 22 00:24:06.219402 systemd[1]: session-3.scope: Deactivated successfully. Jan 22 00:24:06.221386 systemd-logind[917]: Session 3 logged out. Waiting for processes to exit. Jan 22 00:24:06.223165 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:50808). Jan 22 00:24:06.226870 systemd-logind[917]: Removed session 3. Jan 22 00:24:06.275414 sshd[969]: Accepted publickey for core from 10.0.0.1 port 50808 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:24:06.278082 sshd[969]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:24:06.289475 systemd-logind[917]: New session 4 of user core. Jan 22 00:24:06.303334 systemd[1]: Started Session 4 of User core. Jan 22 00:24:06.411510 sshd[969]: pam_unix(sshd:session): session closed for user core Jan 22 00:24:06.427274 systemd[1]: sshd@3-10.0.0.2:22-10.0.0.1:50808.service: Deactivated successfully. Jan 22 00:24:06.429153 systemd[1]: session-4.scope: Deactivated successfully. Jan 22 00:24:06.431429 systemd-logind[917]: Session 4 logged out. Waiting for processes to exit. Jan 22 00:24:06.434104 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:50812). Jan 22 00:24:06.436203 systemd-logind[917]: Removed session 4. Jan 22 00:24:06.483057 sshd[975]: Accepted publickey for core from 10.0.0.1 port 50812 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:24:06.485476 sshd[975]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:24:06.498955 systemd-logind[917]: New session 5 of user core. Jan 22 00:24:06.507066 systemd[1]: Started Session 5 of User core. Jan 22 00:24:06.652161 sudo[978]: core : PWD=/home/core ; USER=root ; COMMAND=/sbin/setenforce 1 Jan 22 00:24:06.652476 sudo[978]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:24:06.684483 sudo[978]: pam_unix(sudo:session): session closed for user root Jan 22 00:24:06.690086 sshd[975]: pam_unix(sshd:session): session closed for user core Jan 22 00:24:06.704996 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:50818). Jan 22 00:24:06.711949 dbus-daemon[889]: [system] Reloaded configuration Jan 22 00:24:06.719251 systemd[1]: sshd@4-10.0.0.2:22-10.0.0.1:50812.service: Deactivated successfully. Jan 22 00:24:06.721440 systemd[1]: session-5.scope: Deactivated successfully. Jan 22 00:24:06.725527 systemd-logind[917]: Session 5 logged out. Waiting for processes to exit. Jan 22 00:24:06.729432 systemd-logind[917]: Removed session 5. Jan 22 00:24:06.758107 sshd[981]: Accepted publickey for core from 10.0.0.1 port 50818 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:24:06.760110 sshd[981]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:24:06.770301 systemd-logind[917]: New session 6 of user core. Jan 22 00:24:06.778260 systemd[1]: Started Session 6 of User core. Jan 22 00:24:06.874968 sudo[986]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jan 22 00:24:06.875280 sudo[986]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:24:06.890153 sudo[986]: pam_unix(sudo:session): session closed for user root Jan 22 00:24:06.906229 sudo[985]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/systemctl restart audit-rules Jan 22 00:24:06.906968 sudo[985]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:24:06.944297 systemd[1]: Stopping Load Security Auditing Rules... Jan 22 00:24:06.953000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jan 22 00:24:06.956010 auditctl[989]: No rules Jan 22 00:24:06.957376 systemd[1]: audit-rules.service: Deactivated successfully. Jan 22 00:24:06.958259 systemd[1]: Stopped Load Security Auditing Rules. Jan 22 00:24:06.963167 systemd[1]: Starting Load Security Auditing Rules... Jan 22 00:24:06.969437 kernel: kauditd_printk_skb: 40 callbacks suppressed Jan 22 00:24:06.969487 kernel: audit: type=1305 audit(1769041446.953:160): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jan 22 00:24:07.004125 kernel: audit: type=1131 audit(1769041446.957:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:06.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:07.055302 augenrules[1006]: No rules Jan 22 00:24:07.057280 systemd[1]: Finished Load Security Auditing Rules. Jan 22 00:24:07.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:07.059182 sudo[985]: pam_unix(sudo:session): session closed for user root Jan 22 00:24:07.062214 sshd[981]: pam_unix(sshd:session): session closed for user core Jan 22 00:24:07.069495 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:50830). Jan 22 00:24:07.071355 systemd[1]: sshd@5-10.0.0.2:22-10.0.0.1:50818.service: Deactivated successfully. Jan 22 00:24:07.073021 systemd[1]: session-6.scope: Deactivated successfully. Jan 22 00:24:07.075349 systemd-logind[917]: Session 6 logged out. Waiting for processes to exit. Jan 22 00:24:07.082024 systemd-logind[917]: Removed session 6. Jan 22 00:24:07.110962 kernel: audit: type=1130 audit(1769041447.057:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:07.111070 kernel: audit: type=1106 audit(1769041447.058:163): pid=985 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:07.058000 audit[985]: USER_END pid=985 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:07.141902 sshd[1011]: Accepted publickey for core from 10.0.0.1 port 50830 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:24:07.058000 audit[985]: CRED_DISP pid=985 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:07.169091 sshd[1011]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:24:07.180000 systemd-logind[917]: New session 7 of user core. Jan 22 00:24:07.180452 systemd[1]: Started Session 7 of User core. Jan 22 00:24:07.222008 kernel: audit: type=1104 audit(1769041447.058:164): pid=985 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:07.222088 kernel: audit: type=1106 audit(1769041447.068:165): pid=981 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:07.068000 audit[981]: USER_END pid=981 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:07.268005 sudo[1015]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/mkdir -p . Jan 22 00:24:07.268336 sudo[1015]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:24:07.281446 sudo[1015]: pam_unix(sudo:session): session closed for user root Jan 22 00:24:07.285194 sshd[1011]: pam_unix(sshd:session): session closed for user core Jan 22 00:24:07.068000 audit[981]: CRED_DISP pid=981 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:07.291279 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:50838). Jan 22 00:24:07.292069 systemd[1]: sshd@6-10.0.0.2:22-10.0.0.1:50830.service: Deactivated successfully. Jan 22 00:24:07.294170 systemd[1]: session-7.scope: Deactivated successfully. Jan 22 00:24:07.303351 systemd-logind[917]: Session 7 logged out. Waiting for processes to exit. Jan 22 00:24:07.335315 systemd-logind[917]: Removed session 7. Jan 22 00:24:07.348084 kernel: audit: type=1104 audit(1769041447.068:166): pid=981 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:07.348142 kernel: audit: type=1130 audit(1769041447.069:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.2:22-10.0.0.1:50830 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:07.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.2:22-10.0.0.1:50830 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:07.384006 sshd[1018]: Accepted publickey for core from 10.0.0.1 port 50838 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:24:07.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.2:22-10.0.0.1:50818 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:07.402518 sshd[1018]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:24:07.415016 systemd-logind[917]: New session 8 of user core. Jan 22 00:24:07.415449 systemd[1]: Started Session 8 of User core. Jan 22 00:24:07.457332 kernel: audit: type=1131 audit(1769041447.071:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.2:22-10.0.0.1:50818 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:07.140000 audit[1011]: USER_ACCT pid=1011 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:07.516125 sudo[1022]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/install -m 0755 /dev/stdin kolet Jan 22 00:24:07.516413 sudo[1022]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:24:07.530108 kernel: audit: type=1101 audit(1769041447.140:169): pid=1011 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:07.167000 audit[1011]: CRED_ACQ pid=1011 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:07.200000 audit[1011]: USER_START pid=1011 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:07.202000 audit[1014]: CRED_ACQ pid=1014 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:07.266000 audit[1015]: USER_ACCT pid=1015 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:07.266000 audit[1015]: CRED_REFR pid=1015 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:07.272000 audit[1015]: USER_START pid=1015 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:07.281000 audit[1015]: USER_END pid=1015 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:07.281000 audit[1015]: CRED_DISP pid=1015 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:07.287000 audit[1011]: USER_END pid=1011 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:07.287000 audit[1011]: CRED_DISP pid=1011 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:07.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.2:22-10.0.0.1:50838 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:07.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.2:22-10.0.0.1:50830 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:07.382000 audit[1018]: USER_ACCT pid=1018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:07.401000 audit[1018]: CRED_ACQ pid=1018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:07.438000 audit[1018]: USER_START pid=1018 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:07.442000 audit[1021]: CRED_ACQ pid=1021 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:07.515000 audit[1022]: USER_ACCT pid=1022 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:07.515000 audit[1022]: CRED_REFR pid=1022 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:07.522000 audit[1022]: USER_START pid=1022 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:08.199222 sudo[1022]: pam_unix(sudo:session): session closed for user root Jan 22 00:24:08.197000 audit[1022]: USER_END pid=1022 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:08.199000 audit[1022]: CRED_DISP pid=1022 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:08.204340 sshd[1018]: pam_unix(sshd:session): session closed for user core Jan 22 00:24:08.207000 audit[1018]: USER_END pid=1018 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:08.209000 audit[1018]: CRED_DISP pid=1018 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:08.217097 systemd[1]: sshd@7-10.0.0.2:22-10.0.0.1:50838.service: Deactivated successfully. Jan 22 00:24:08.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.2:22-10.0.0.1:50838 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:08.219464 systemd[1]: session-8.scope: Deactivated successfully. Jan 22 00:24:08.223397 systemd-logind[917]: Session 8 logged out. Waiting for processes to exit. Jan 22 00:24:08.231945 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:50846). Jan 22 00:24:08.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.2:22-10.0.0.1:50846 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:08.235268 systemd-logind[917]: Removed session 8. Jan 22 00:24:08.298000 audit[1026]: USER_ACCT pid=1026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:08.301212 sshd[1026]: Accepted publickey for core from 10.0.0.1 port 50846 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:24:08.302000 audit[1026]: CRED_ACQ pid=1026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:08.305447 sshd[1026]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:24:08.321155 systemd-logind[917]: New session 9 of user core. Jan 22 00:24:08.331085 systemd[1]: Started Session 9 of User core. Jan 22 00:24:08.383000 audit[1026]: USER_START pid=1026 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:08.388000 audit[1028]: CRED_ACQ pid=1028 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:08.459000 audit[1029]: USER_ACCT pid=1029 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:08.463000 audit[1029]: CRED_REFR pid=1029 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:08.464378 sudo[1029]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/mkdir -p /updates Jan 22 00:24:08.465438 sudo[1029]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:24:08.481000 audit[1029]: USER_START pid=1029 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:08.493000 audit[1029]: USER_END pid=1029 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:08.494075 sudo[1029]: pam_unix(sudo:session): session closed for user root Jan 22 00:24:08.493000 audit[1029]: CRED_DISP pid=1029 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:08.498500 sshd[1026]: pam_unix(sshd:session): session closed for user core Jan 22 00:24:08.505000 audit[1026]: USER_END pid=1026 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:08.505000 audit[1026]: CRED_DISP pid=1026 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:08.515493 systemd[1]: sshd@8-10.0.0.2:22-10.0.0.1:50846.service: Deactivated successfully. Jan 22 00:24:08.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.2:22-10.0.0.1:50846 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:08.518953 systemd[1]: session-9.scope: Deactivated successfully. Jan 22 00:24:08.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.2:22-10.0.0.1:50862 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:08.523941 systemd-logind[917]: Session 9 logged out. Waiting for processes to exit. Jan 22 00:24:08.525082 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:50862). Jan 22 00:24:08.530218 systemd-logind[917]: Removed session 9. Jan 22 00:24:08.609522 sshd[1033]: Accepted publickey for core from 10.0.0.1 port 50862 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:24:08.608000 audit[1033]: USER_ACCT pid=1033 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:08.613000 audit[1033]: CRED_ACQ pid=1033 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:08.615117 sshd[1033]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:24:08.628031 systemd-logind[917]: New session 10 of user core. Jan 22 00:24:08.636396 systemd[1]: Started Session 10 of User core. Jan 22 00:24:08.687000 audit[1033]: USER_START pid=1033 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:08.692000 audit[1035]: CRED_ACQ pid=1035 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:08.766000 audit[1036]: USER_ACCT pid=1036 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:08.768000 audit[1036]: CRED_REFR pid=1036 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:08.767115 sudo[1036]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/install -m 0755 /dev/stdin /updates/update.gz Jan 22 00:24:08.769473 sudo[1036]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:24:08.774000 audit[1036]: USER_START pid=1036 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:13.277991 sudo[1036]: pam_unix(sudo:session): session closed for user root Jan 22 00:24:13.276000 audit[1036]: USER_END pid=1036 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:13.286220 sshd[1033]: pam_unix(sshd:session): session closed for user core Jan 22 00:24:13.293938 kernel: kauditd_printk_skb: 49 callbacks suppressed Jan 22 00:24:13.294019 kernel: audit: type=1106 audit(1769041453.276:219): pid=1036 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:13.276000 audit[1036]: CRED_DISP pid=1036 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:13.410415 kernel: audit: type=1104 audit(1769041453.276:220): pid=1036 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:13.410839 kernel: audit: type=1106 audit(1769041453.290:221): pid=1033 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:13.290000 audit[1033]: USER_END pid=1033 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:13.290000 audit[1033]: CRED_DISP pid=1033 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:13.541830 kernel: audit: type=1104 audit(1769041453.290:222): pid=1033 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:13.547102 systemd[1]: sshd@9-10.0.0.2:22-10.0.0.1:50862.service: Deactivated successfully. Jan 22 00:24:13.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.2:22-10.0.0.1:50862 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:13.548446 systemd[1]: session-10.scope: Deactivated successfully. Jan 22 00:24:13.549047 systemd[1]: session-10.scope: Consumed 5.446s CPU time. Jan 22 00:24:13.553025 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:50946). Jan 22 00:24:13.567910 systemd-logind[917]: Session 10 logged out. Waiting for processes to exit. Jan 22 00:24:13.574186 systemd-logind[917]: Removed session 10. Jan 22 00:24:13.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.2:22-10.0.0.1:50946 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:13.683302 kernel: audit: type=1131 audit(1769041453.547:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.2:22-10.0.0.1:50862 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:13.683432 kernel: audit: type=1130 audit(1769041453.551:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.2:22-10.0.0.1:50946 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:13.742000 audit[1040]: USER_ACCT pid=1040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:13.747233 sshd[1040]: Accepted publickey for core from 10.0.0.1 port 50946 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:24:13.790446 sshd[1040]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:24:13.822364 systemd-logind[917]: New session 11 of user core. Jan 22 00:24:13.788000 audit[1040]: CRED_ACQ pid=1040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:13.902190 kernel: audit: type=1101 audit(1769041453.742:225): pid=1040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:13.902316 kernel: audit: type=1103 audit(1769041453.788:226): pid=1040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:13.902354 kernel: audit: type=1006 audit(1769041453.788:227): pid=1040 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Jan 22 00:24:13.950863 systemd[1]: Started Session 11 of User core. Jan 22 00:24:13.997000 audit[1040]: USER_START pid=1040 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:14.078324 kernel: audit: type=1105 audit(1769041453.997:228): pid=1040 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:13.999000 audit[1042]: CRED_ACQ pid=1042 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:14.107000 audit[1043]: USER_ACCT pid=1043 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:14.110373 sudo[1043]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/systemd-run --quiet ./kolet run cl.update.payload-boot-part-too-small Omaha Jan 22 00:24:14.108000 audit[1043]: CRED_REFR pid=1043 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:14.111104 sudo[1043]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:24:14.120000 audit[1043]: USER_START pid=1043 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:14.167024 systemd[1]: Started /home/core/./kolet run cl.update.payload-boot-part-too-small Omaha. Jan 22 00:24:14.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=run-r73e9c51e50e14572aab45c2ca374698d comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:14.170000 audit[1043]: USER_END pid=1043 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:14.170000 audit[1043]: CRED_DISP pid=1043 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:24:14.171150 sudo[1043]: pam_unix(sudo:session): session closed for user root Jan 22 00:24:14.174850 sshd[1040]: pam_unix(sshd:session): session closed for user core Jan 22 00:24:14.174000 audit[1040]: USER_END pid=1040 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:14.174000 audit[1040]: CRED_DISP pid=1040 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:14.181114 systemd[1]: sshd@10-10.0.0.2:22-10.0.0.1:50946.service: Deactivated successfully. Jan 22 00:24:14.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.2:22-10.0.0.1:50946 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:14.182187 systemd[1]: session-11.scope: Deactivated successfully. Jan 22 00:24:14.185896 systemd-logind[917]: Session 11 logged out. Waiting for processes to exit. Jan 22 00:24:14.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.2:22-10.0.0.1:50968 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:14.201519 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:50968). Jan 22 00:24:14.206202 systemd-logind[917]: Removed session 11. Jan 22 00:24:14.258391 sshd[1051]: Accepted publickey for core from 10.0.0.1 port 50968 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:24:14.257000 audit[1051]: USER_ACCT pid=1051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:14.259000 audit[1051]: CRED_ACQ pid=1051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:14.261276 sshd[1051]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:24:14.279830 systemd-logind[917]: New session 12 of user core. Jan 22 00:24:14.288162 systemd[1]: Started Session 12 of User core. Jan 22 00:24:14.340000 audit[1051]: USER_START pid=1051 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:14.346000 audit[1055]: CRED_ACQ pid=1055 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:15.791289 sshd[1051]: pam_unix(sshd:session): session closed for user core Jan 22 00:24:15.794000 audit[1051]: USER_END pid=1051 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:15.795000 audit[1051]: CRED_DISP pid=1051 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:24:15.800120 systemd[1]: sshd@11-10.0.0.2:22-10.0.0.1:50968.service: Deactivated successfully. Jan 22 00:24:15.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.2:22-10.0.0.1:50968 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:15.802452 systemd[1]: session-12.scope: Deactivated successfully. Jan 22 00:24:15.806441 systemd-logind[917]: Session 12 logged out. Waiting for processes to exit. Jan 22 00:24:15.818955 systemd-logind[917]: Removed session 12. Jan 22 00:24:44.309355 update_engine[918]: I0122 00:24:44.308274 918 update_attempter.cc:505] Updating boot flags...