Jan 22 00:24:48.986989 kernel: Linux version 5.10.107-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 9.3.0-r1 p3) 9.3.0, GNU ld (Gentoo 2.36.1 p5) 2.36.1) #1 SMP Tue Mar 22 19:39:53 -00 2022 Jan 22 00:24:48.987012 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=15990f5bb88d618f1948b7e8a720f1d5b95900cfecbef00df890bd0a136b39aa Jan 22 00:24:48.987020 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jan 22 00:24:48.987027 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jan 22 00:24:48.987032 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jan 22 00:24:48.987038 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jan 22 00:24:48.987046 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Jan 22 00:24:48.987056 kernel: BIOS-provided physical RAM map: Jan 22 00:24:48.987063 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Jan 22 00:24:48.987071 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Jan 22 00:24:48.987078 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Jan 22 00:24:48.987083 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable Jan 22 00:24:48.987089 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved Jan 22 00:24:48.987095 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Jan 22 00:24:48.987104 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Jan 22 00:24:48.987110 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Jan 22 00:24:48.987294 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Jan 22 00:24:48.987304 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Jan 22 00:24:48.987311 kernel: NX (Execute Disable) protection: active Jan 22 00:24:48.987319 kernel: SMBIOS 2.8 present. Jan 22 00:24:48.987325 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Jan 22 00:24:48.987331 kernel: Hypervisor detected: KVM Jan 22 00:24:48.987337 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jan 22 00:24:48.987343 kernel: kvm-clock: cpu 0, msr 1a6ba001, primary cpu clock Jan 22 00:24:48.987349 kernel: kvm-clock: using sched offset of 19631107348 cycles Jan 22 00:24:48.987358 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jan 22 00:24:48.987365 kernel: tsc: Detected 2445.426 MHz processor Jan 22 00:24:48.987371 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jan 22 00:24:48.987380 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jan 22 00:24:48.987389 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 Jan 22 00:24:48.987396 kernel: MTRR default type: write-back Jan 22 00:24:48.987402 kernel: MTRR fixed ranges enabled: Jan 22 00:24:48.987408 kernel: 00000-9FFFF write-back Jan 22 00:24:48.987414 kernel: A0000-BFFFF uncachable Jan 22 00:24:48.987421 kernel: C0000-FFFFF write-protect Jan 22 00:24:48.987429 kernel: MTRR variable ranges enabled: Jan 22 00:24:48.987435 kernel: 0 base 0000C0000000 mask FFFFC0000000 uncachable Jan 22 00:24:48.987443 kernel: 1 disabled Jan 22 00:24:48.987450 kernel: 2 disabled Jan 22 00:24:48.987459 kernel: 3 disabled Jan 22 00:24:48.987469 kernel: 4 disabled Jan 22 00:24:48.987475 kernel: 5 disabled Jan 22 00:24:48.987481 kernel: 6 disabled Jan 22 00:24:48.987489 kernel: 7 disabled Jan 22 00:24:48.987496 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jan 22 00:24:48.987503 kernel: Using GB pages for direct mapping Jan 22 00:24:48.987510 kernel: ACPI: Early table checksum verification disabled Jan 22 00:24:48.987516 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) Jan 22 00:24:48.987524 kernel: ACPI: RSDT 0x000000009CFE241A 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:24:48.987533 kernel: ACPI: FACP 0x000000009CFE21FA 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:24:48.987541 kernel: ACPI: DSDT 0x000000009CFE0040 0021BA (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:24:48.987550 kernel: ACPI: FACS 0x000000009CFE0000 000040 Jan 22 00:24:48.987557 kernel: ACPI: APIC 0x000000009CFE22EE 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:24:48.987566 kernel: ACPI: HPET 0x000000009CFE237E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:24:48.987572 kernel: ACPI: MCFG 0x000000009CFE23B6 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:24:48.987579 kernel: ACPI: WAET 0x000000009CFE23F2 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:24:48.987585 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21fa-0x9cfe22ed] Jan 22 00:24:48.987592 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21f9] Jan 22 00:24:48.987598 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Jan 22 00:24:48.987607 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22ee-0x9cfe237d] Jan 22 00:24:48.987715 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe237e-0x9cfe23b5] Jan 22 00:24:48.987726 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23b6-0x9cfe23f1] Jan 22 00:24:48.987732 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23f2-0x9cfe2419] Jan 22 00:24:48.987739 kernel: ACPI: Local APIC address 0xfee00000 Jan 22 00:24:48.987745 kernel: No NUMA configuration found Jan 22 00:24:48.987751 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] Jan 22 00:24:48.987758 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] Jan 22 00:24:48.987765 kernel: Zone ranges: Jan 22 00:24:48.987774 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jan 22 00:24:48.987782 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] Jan 22 00:24:48.987790 kernel: Normal empty Jan 22 00:24:48.987797 kernel: Movable zone start for each node Jan 22 00:24:48.987803 kernel: Early memory node ranges Jan 22 00:24:48.987810 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Jan 22 00:24:48.987816 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] Jan 22 00:24:48.987823 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] Jan 22 00:24:48.987832 kernel: On node 0 totalpages: 642938 Jan 22 00:24:48.987840 kernel: DMA zone: 64 pages used for memmap Jan 22 00:24:48.987847 kernel: DMA zone: 21 pages reserved Jan 22 00:24:48.987853 kernel: DMA zone: 3998 pages, LIFO batch:0 Jan 22 00:24:48.987861 kernel: DMA32 zone: 9984 pages used for memmap Jan 22 00:24:48.987868 kernel: DMA32 zone: 638940 pages, LIFO batch:63 Jan 22 00:24:48.987874 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jan 22 00:24:48.987881 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Jan 22 00:24:48.987890 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges Jan 22 00:24:48.987899 kernel: ACPI: PM-Timer IO Port: 0x608 Jan 22 00:24:48.987905 kernel: ACPI: Local APIC address 0xfee00000 Jan 22 00:24:48.987911 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jan 22 00:24:48.987918 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jan 22 00:24:48.987924 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jan 22 00:24:48.987934 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jan 22 00:24:48.987942 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jan 22 00:24:48.987951 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jan 22 00:24:48.987958 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jan 22 00:24:48.987965 kernel: ACPI: IRQ0 used by override. Jan 22 00:24:48.987971 kernel: ACPI: IRQ5 used by override. Jan 22 00:24:48.987977 kernel: ACPI: IRQ9 used by override. Jan 22 00:24:48.987984 kernel: ACPI: IRQ10 used by override. Jan 22 00:24:48.987990 kernel: ACPI: IRQ11 used by override. Jan 22 00:24:48.987997 kernel: Using ACPI (MADT) for SMP configuration information Jan 22 00:24:48.988009 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Jan 22 00:24:48.988016 kernel: TSC deadline timer available Jan 22 00:24:48.988022 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Jan 22 00:24:48.988029 kernel: kvm-guest: KVM setup pv remote TLB flush Jan 22 00:24:48.988035 kernel: kvm-guest: setup PV sched yield Jan 22 00:24:48.988042 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Jan 22 00:24:48.988048 kernel: Booting paravirtualized kernel on KVM Jan 22 00:24:48.988057 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jan 22 00:24:48.988067 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Jan 22 00:24:48.988076 kernel: percpu: Embedded 58 pages/cpu s199704 r8192 d29672 u524288 Jan 22 00:24:48.988083 kernel: pcpu-alloc: s199704 r8192 d29672 u524288 alloc=1*2097152 Jan 22 00:24:48.988089 kernel: pcpu-alloc: [0] 0 1 2 3 Jan 22 00:24:48.988095 kernel: kvm-guest: KVM setup async PF for cpu 0 Jan 22 00:24:48.988102 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c580 Jan 22 00:24:48.988108 kernel: kvm-guest: PV spinlocks enabled Jan 22 00:24:48.988287 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jan 22 00:24:48.988297 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632869 Jan 22 00:24:48.988305 kernel: Policy zone: DMA32 Jan 22 00:24:48.988320 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=15990f5bb88d618f1948b7e8a720f1d5b95900cfecbef00df890bd0a136b39aa Jan 22 00:24:48.988328 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jan 22 00:24:48.988335 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jan 22 00:24:48.988343 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jan 22 00:24:48.988350 kernel: Memory: 2449516K/2571752K available (10246K kernel code, 2239K rwdata, 11640K rodata, 42228K init, 1436K bss, 121976K reserved, 0K cma-reserved) Jan 22 00:24:48.988357 kernel: random: get_random_u64 called from __kmem_cache_create+0x26/0x400 with crng_init=0 Jan 22 00:24:48.988369 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Jan 22 00:24:48.988378 kernel: ftrace: allocating 34378 entries in 135 pages Jan 22 00:24:48.988385 kernel: ftrace: allocated 135 pages with 4 groups Jan 22 00:24:48.988392 kernel: rcu: Hierarchical RCU implementation. Jan 22 00:24:48.988399 kernel: rcu: RCU event tracing is enabled. Jan 22 00:24:48.988406 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Jan 22 00:24:48.988414 kernel: Rude variant of Tasks RCU enabled. Jan 22 00:24:48.988421 kernel: Tracing variant of Tasks RCU enabled. Jan 22 00:24:48.988429 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jan 22 00:24:48.988438 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Jan 22 00:24:48.988447 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Jan 22 00:24:48.988454 kernel: Console: colour VGA+ 80x25 Jan 22 00:24:48.988461 kernel: printk: console [ttyS0] enabled Jan 22 00:24:48.988467 kernel: ACPI: Core revision 20200925 Jan 22 00:24:48.988474 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Jan 22 00:24:48.988481 kernel: APIC: Switch to symmetric I/O mode setup Jan 22 00:24:48.988490 kernel: x2apic enabled Jan 22 00:24:48.988499 kernel: Switched APIC routing to physical x2apic. Jan 22 00:24:48.988506 kernel: kvm-guest: setup PV IPIs Jan 22 00:24:48.988513 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Jan 22 00:24:48.988522 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Jan 22 00:24:48.988529 kernel: Calibrating delay loop (skipped) preset value.. 4890.85 BogoMIPS (lpj=2445426) Jan 22 00:24:48.988535 kernel: pid_max: default: 32768 minimum: 301 Jan 22 00:24:48.988542 kernel: LSM: Security Framework initializing Jan 22 00:24:48.988551 kernel: SELinux: Initializing. Jan 22 00:24:48.988561 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jan 22 00:24:48.988568 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jan 22 00:24:48.988575 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Jan 22 00:24:48.988582 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Jan 22 00:24:48.988591 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Jan 22 00:24:48.988598 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jan 22 00:24:48.988606 kernel: Spectre V2 : Mitigation: Retpolines Jan 22 00:24:48.988711 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jan 22 00:24:48.988720 kernel: Speculative Store Bypass: Vulnerable Jan 22 00:24:48.988729 kernel: Freeing SMP alternatives memory: 28K Jan 22 00:24:48.988736 kernel: smpboot: CPU0: AMD EPYC 7763 64-Core Processor (family: 0x19, model: 0x1, stepping: 0x1) Jan 22 00:24:48.988743 kernel: Performance Events: PMU not available due to virtualization, using software events only. Jan 22 00:24:48.988750 kernel: rcu: Hierarchical SRCU implementation. Jan 22 00:24:48.988757 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Jan 22 00:24:48.988765 kernel: smp: Bringing up secondary CPUs ... Jan 22 00:24:48.988775 kernel: x86: Booting SMP configuration: Jan 22 00:24:48.988786 kernel: .... node #0, CPUs: #1 Jan 22 00:24:48.988793 kernel: kvm-clock: cpu 1, msr 1a6ba041, secondary cpu clock Jan 22 00:24:48.988802 kernel: kvm-guest: KVM setup async PF for cpu 1 Jan 22 00:24:48.988809 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c580 Jan 22 00:24:48.988816 kernel: #2 Jan 22 00:24:48.988824 kernel: kvm-clock: cpu 2, msr 1a6ba081, secondary cpu clock Jan 22 00:24:48.988833 kernel: kvm-guest: KVM setup async PF for cpu 2 Jan 22 00:24:48.988842 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c580 Jan 22 00:24:48.988849 kernel: #3 Jan 22 00:24:48.988855 kernel: kvm-clock: cpu 3, msr 1a6ba0c1, secondary cpu clock Jan 22 00:24:48.988862 kernel: kvm-guest: KVM setup async PF for cpu 3 Jan 22 00:24:48.988869 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c580 Jan 22 00:24:48.988878 kernel: smp: Brought up 1 node, 4 CPUs Jan 22 00:24:48.988886 kernel: smpboot: Max logical packages: 1 Jan 22 00:24:48.988896 kernel: smpboot: Total of 4 processors activated (19563.40 BogoMIPS) Jan 22 00:24:48.988904 kernel: devtmpfs: initialized Jan 22 00:24:48.988910 kernel: x86/mm: Memory block size: 128MB Jan 22 00:24:48.988917 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jan 22 00:24:48.988924 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Jan 22 00:24:48.988931 kernel: pinctrl core: initialized pinctrl subsystem Jan 22 00:24:48.988938 kernel: NET: Registered protocol family 16 Jan 22 00:24:48.988948 kernel: audit: initializing netlink subsys (disabled) Jan 22 00:24:48.988958 kernel: thermal_sys: Registered thermal governor 'step_wise' Jan 22 00:24:48.988965 kernel: audit: type=2000 audit(1769041476.417:1): state=initialized audit_enabled=0 res=1 Jan 22 00:24:48.988971 kernel: thermal_sys: Registered thermal governor 'user_space' Jan 22 00:24:48.988978 kernel: cpuidle: using governor menu Jan 22 00:24:48.988985 kernel: ACPI: bus type PCI registered Jan 22 00:24:48.988992 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jan 22 00:24:48.988998 kernel: dca service started, version 1.12.1 Jan 22 00:24:48.989008 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Jan 22 00:24:48.989017 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Jan 22 00:24:48.989026 kernel: PCI: Using configuration type 1 for base access Jan 22 00:24:48.989032 kernel: Kprobes globally optimized Jan 22 00:24:48.989039 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jan 22 00:24:48.989046 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jan 22 00:24:48.989053 kernel: ACPI: Added _OSI(Module Device) Jan 22 00:24:48.989062 kernel: ACPI: Added _OSI(Processor Device) Jan 22 00:24:48.989071 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jan 22 00:24:48.989078 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jan 22 00:24:48.989085 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jan 22 00:24:48.989093 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jan 22 00:24:48.989100 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jan 22 00:24:48.989107 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jan 22 00:24:48.989283 kernel: ACPI: Interpreter enabled Jan 22 00:24:48.989295 kernel: ACPI: (supports S0 S3 S5) Jan 22 00:24:48.989303 kernel: ACPI: Using IOAPIC for interrupt routing Jan 22 00:24:48.989310 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jan 22 00:24:48.989317 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Jan 22 00:24:48.989324 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jan 22 00:24:48.989450 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jan 22 00:24:48.989531 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Jan 22 00:24:48.989602 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Jan 22 00:24:48.989720 kernel: PCI host bridge to bus 0000:00 Jan 22 00:24:48.989800 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jan 22 00:24:48.989958 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jan 22 00:24:48.990024 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jan 22 00:24:48.990090 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Jan 22 00:24:48.990339 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Jan 22 00:24:48.990502 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] Jan 22 00:24:48.990569 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jan 22 00:24:48.990767 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Jan 22 00:24:48.990850 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Jan 22 00:24:48.990924 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Jan 22 00:24:48.991001 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Jan 22 00:24:48.991074 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Jan 22 00:24:48.991342 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Jan 22 00:24:48.991423 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] Jan 22 00:24:48.991499 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Jan 22 00:24:48.991572 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Jan 22 00:24:48.991756 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Jan 22 00:24:48.991837 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] Jan 22 00:24:48.991912 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Jan 22 00:24:48.991985 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Jan 22 00:24:48.992072 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Jan 22 00:24:48.992324 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] Jan 22 00:24:48.992403 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Jan 22 00:24:48.992481 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Jan 22 00:24:48.992556 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Jan 22 00:24:48.992748 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Jan 22 00:24:48.992822 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Jan 22 00:24:48.992900 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Jan 22 00:24:48.992971 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] Jan 22 00:24:48.993040 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] Jan 22 00:24:48.993296 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Jan 22 00:24:48.993384 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Jan 22 00:24:48.993396 kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 5 *10 11) Jan 22 00:24:48.993404 kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs 5 *10 11) Jan 22 00:24:48.993411 kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 5 10 *11) Jan 22 00:24:48.993418 kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs 5 10 *11) Jan 22 00:24:48.993429 kernel: ACPI: PCI Interrupt Link [LNKE] (IRQs 5 *10 11) Jan 22 00:24:48.993438 kernel: ACPI: PCI Interrupt Link [LNKF] (IRQs 5 *10 11) Jan 22 00:24:48.993445 kernel: ACPI: PCI Interrupt Link [LNKG] (IRQs 5 10 *11) Jan 22 00:24:48.993455 kernel: ACPI: PCI Interrupt Link [LNKH] (IRQs 5 10 *11) Jan 22 00:24:48.993462 kernel: ACPI: PCI Interrupt Link [GSIA] (IRQs *16) Jan 22 00:24:48.993469 kernel: ACPI: PCI Interrupt Link [GSIB] (IRQs *17) Jan 22 00:24:48.993476 kernel: ACPI: PCI Interrupt Link [GSIC] (IRQs *18) Jan 22 00:24:48.993483 kernel: ACPI: PCI Interrupt Link [GSID] (IRQs *19) Jan 22 00:24:48.993491 kernel: ACPI: PCI Interrupt Link [GSIE] (IRQs *20) Jan 22 00:24:48.993500 kernel: ACPI: PCI Interrupt Link [GSIF] (IRQs *21) Jan 22 00:24:48.993510 kernel: ACPI: PCI Interrupt Link [GSIG] (IRQs *22) Jan 22 00:24:48.993517 kernel: ACPI: PCI Interrupt Link [GSIH] (IRQs *23) Jan 22 00:24:48.993524 kernel: iommu: Default domain type: Translated Jan 22 00:24:48.993600 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Jan 22 00:24:48.993781 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jan 22 00:24:48.993853 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Jan 22 00:24:48.993865 kernel: vgaarb: loaded Jan 22 00:24:48.993872 kernel: PCI: Using ACPI for IRQ routing Jan 22 00:24:48.993879 kernel: PCI: pci_cache_line_size set to 64 bytes Jan 22 00:24:48.993886 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Jan 22 00:24:48.993893 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] Jan 22 00:24:48.993904 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Jan 22 00:24:48.993913 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Jan 22 00:24:48.993923 kernel: clocksource: Switched to clocksource kvm-clock Jan 22 00:24:48.993930 kernel: VFS: Disk quotas dquot_6.6.0 Jan 22 00:24:48.993937 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jan 22 00:24:48.993945 kernel: pnp: PnP ACPI init Jan 22 00:24:48.994025 kernel: pnp 00:00: Plug and Play ACPI device, IDs PNP0303 (active) Jan 22 00:24:48.994098 kernel: pnp 00:01: Plug and Play ACPI device, IDs PNP0f13 (active) Jan 22 00:24:48.994435 kernel: pnp 00:02: Plug and Play ACPI device, IDs PNP0400 (active) Jan 22 00:24:48.994611 kernel: pnp 00:03: Plug and Play ACPI device, IDs PNP0501 (active) Jan 22 00:24:48.994795 kernel: pnp 00:04: Plug and Play ACPI device, IDs PNP0b00 (active) Jan 22 00:24:48.994865 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Jan 22 00:24:48.995022 kernel: system 00:05: Plug and Play ACPI device, IDs PNP0c01 (active) Jan 22 00:24:48.995037 kernel: pnp: PnP ACPI: found 6 devices Jan 22 00:24:48.995046 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jan 22 00:24:48.995054 kernel: NET: Registered protocol family 2 Jan 22 00:24:48.995064 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jan 22 00:24:48.995072 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jan 22 00:24:48.995080 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jan 22 00:24:48.995087 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jan 22 00:24:48.995094 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jan 22 00:24:48.995101 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jan 22 00:24:48.995110 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jan 22 00:24:48.995299 kernel: NET: Registered protocol family 1 Jan 22 00:24:48.995308 kernel: NET: Registered protocol family 44 Jan 22 00:24:48.995379 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jan 22 00:24:48.995445 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jan 22 00:24:48.995509 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jan 22 00:24:48.995572 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Jan 22 00:24:48.995746 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Jan 22 00:24:48.995907 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] Jan 22 00:24:48.995984 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jan 22 00:24:48.996056 kernel: pci 0000:00:01.0: pci_fixup_video+0x0/0xe0 took 38679 usecs Jan 22 00:24:48.996067 kernel: PCI: CLS 0 bytes, default 64 Jan 22 00:24:48.996074 kernel: Initialise system trusted keyrings Jan 22 00:24:48.996083 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jan 22 00:24:48.996093 kernel: Key type asymmetric registered Jan 22 00:24:48.996101 kernel: Asymmetric key parser 'x509' registered Jan 22 00:24:48.996108 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 251) Jan 22 00:24:48.996296 kernel: io scheduler mq-deadline registered Jan 22 00:24:48.996308 kernel: io scheduler kyber registered Jan 22 00:24:48.996315 kernel: io scheduler bfq registered Jan 22 00:24:48.996322 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jan 22 00:24:48.996330 kernel: PCI Interrupt Link [GSIG] enabled at IRQ 22 Jan 22 00:24:48.996339 kernel: PCI Interrupt Link [GSIH] enabled at IRQ 23 Jan 22 00:24:48.996349 kernel: PCI Interrupt Link [GSIE] enabled at IRQ 20 Jan 22 00:24:48.996356 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jan 22 00:24:48.996363 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jan 22 00:24:48.996370 kernel: random: fast init done Jan 22 00:24:48.996377 kernel: random: crng init done Jan 22 00:24:48.996386 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jan 22 00:24:48.996393 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jan 22 00:24:48.996401 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jan 22 00:24:48.996411 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jan 22 00:24:48.996420 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jan 22 00:24:48.996494 kernel: rtc_cmos 00:04: RTC can wake from S4 Jan 22 00:24:48.996505 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jan 22 00:24:48.996570 kernel: rtc_cmos 00:04: registered as rtc0 Jan 22 00:24:48.996583 kernel: hpet: Lost 1 RTC interrupts Jan 22 00:24:48.996748 kernel: rtc_cmos 00:04: setting system clock to 2026-01-22T00:24:47 UTC (1769041487) Jan 22 00:24:48.996815 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Jan 22 00:24:48.996825 kernel: NET: Registered protocol family 10 Jan 22 00:24:48.996832 kernel: Segment Routing with IPv6 Jan 22 00:24:48.996841 kernel: NET: Registered protocol family 17 Jan 22 00:24:48.996851 kernel: Key type dns_resolver registered Jan 22 00:24:48.996859 kernel: IPI shorthand broadcast: enabled Jan 22 00:24:48.996866 kernel: sched_clock: Marking stable (7290424362, 1030323329)->(11695271717, -3374524026) Jan 22 00:24:48.996873 kernel: registered taskstats version 1 Jan 22 00:24:48.996882 kernel: Loading compiled-in X.509 certificates Jan 22 00:24:48.996890 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.10.107-flatcar: 5866c780451a04cc08b278527846e2b48fb1aa10' Jan 22 00:24:48.996897 kernel: Key type ._fscrypt registered Jan 22 00:24:48.996907 kernel: Key type .fscrypt registered Jan 22 00:24:48.996916 kernel: Key type fscrypt-provisioning registered Jan 22 00:24:48.996924 kernel: ima: No TPM chip found, activating TPM-bypass! Jan 22 00:24:48.996931 kernel: ima: Allocated hash algorithm: sha1 Jan 22 00:24:48.996938 kernel: ima: No architecture policies found Jan 22 00:24:48.996948 kernel: Freeing unused kernel image (initmem) memory: 42228K Jan 22 00:24:48.996964 kernel: Write protecting the kernel read-only data: 24576k Jan 22 00:24:48.996976 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jan 22 00:24:48.996985 kernel: Freeing unused kernel image (rodata/data gap) memory: 648K Jan 22 00:24:48.996994 kernel: Run /init as init process Jan 22 00:24:48.997001 kernel: with arguments: Jan 22 00:24:48.997008 kernel: /init Jan 22 00:24:48.997016 kernel: with environment: Jan 22 00:24:48.997023 kernel: HOME=/ Jan 22 00:24:48.997034 kernel: TERM=linux Jan 22 00:24:48.997041 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jan 22 00:24:48.997051 systemd[1]: systemd 249 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jan 22 00:24:48.997063 systemd[1]: Detected virtualization kvm. Jan 22 00:24:48.997072 systemd[1]: Detected architecture x86-64. Jan 22 00:24:48.997080 systemd[1]: Running in initial RAM disk. Jan 22 00:24:48.997090 systemd[1]: No hostname configured, using default hostname. Jan 22 00:24:48.997099 systemd[1]: Hostname set to . Jan 22 00:24:48.997107 systemd[1]: Initializing machine ID from VM UUID. Jan 22 00:24:48.997362 systemd[1]: Queued start job for default target Initrd Default Target. Jan 22 00:24:48.997373 systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Jan 22 00:24:48.997381 systemd[1]: Reached target Local Encrypted Volumes. Jan 22 00:24:48.997395 systemd[1]: Reached target Path Units. Jan 22 00:24:48.997405 systemd[1]: Reached target Slice Units. Jan 22 00:24:48.997413 systemd[1]: Reached target Swaps. Jan 22 00:24:48.997420 systemd[1]: Reached target Timer Units. Jan 22 00:24:48.997429 systemd[1]: Listening on Open-iSCSI iscsid Socket. Jan 22 00:24:48.997437 systemd[1]: Listening on Open-iSCSI iscsiuio Socket. Jan 22 00:24:48.997445 systemd[1]: Listening on Journal Audit Socket. Jan 22 00:24:48.997455 systemd[1]: Listening on Journal Socket (/dev/log). Jan 22 00:24:48.997465 systemd[1]: Listening on Journal Socket. Jan 22 00:24:48.997475 systemd[1]: Listening on Network Service Netlink Socket. Jan 22 00:24:48.997483 systemd[1]: Listening on udev Control Socket. Jan 22 00:24:48.997491 systemd[1]: Listening on udev Kernel Socket. Jan 22 00:24:48.997498 systemd[1]: Reached target Socket Units. Jan 22 00:24:48.997506 systemd[1]: Starting Create List of Static Device Nodes... Jan 22 00:24:48.997514 systemd[1]: Finished Network Cleanup. Jan 22 00:24:48.997523 systemd[1]: Started Hardware RNG Entropy Gatherer Daemon. Jan 22 00:24:48.997533 systemd[1]: Starting Journal Service... Jan 22 00:24:48.997544 systemd[1]: Condition check resulted in Load Kernel Modules being skipped. Jan 22 00:24:48.997552 systemd[1]: Starting Apply Kernel Variables... Jan 22 00:24:48.997560 systemd[1]: Starting Setup Virtual Console... Jan 22 00:24:48.997568 systemd[1]: Finished Create List of Static Device Nodes. Jan 22 00:24:48.997579 systemd-journald[192]: Journal started Jan 22 00:24:48.997737 systemd-journald[192]: Runtime Journal (/run/log/journal/22650f9910aa4127a8f82257a2f615fa) is 6.0M, max 48.7M, 42.6M free. Jan 22 00:24:49.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:49.981470 kernel: audit: type=1130 audit(1769041489.925:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:49.981785 systemd[1]: Started Journal Service. Jan 22 00:24:50.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:50.007047 systemd[1]: Finished Apply Kernel Variables. Jan 22 00:24:50.081523 kernel: audit: type=1130 audit(1769041490.005:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:50.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:50.082539 systemd[1]: Finished Setup Virtual Console. Jan 22 00:24:50.132504 kernel: audit: type=1130 audit(1769041490.081:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:50.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:50.157809 systemd[1]: Starting dracut ask for additional cmdline parameters... Jan 22 00:24:50.215775 kernel: audit: type=1130 audit(1769041490.154:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:50.227853 systemd[1]: Starting Create Static Device Nodes in /dev... Jan 22 00:24:50.244470 systemd[1]: Finished Create Static Device Nodes in /dev. Jan 22 00:24:50.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:50.307479 kernel: audit: type=1130 audit(1769041490.250:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:50.361909 systemd[1]: Finished dracut ask for additional cmdline parameters. Jan 22 00:24:50.447022 kernel: audit: type=1130 audit(1769041490.375:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:50.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:50.378020 systemd[1]: Starting dracut cmdline hook... Jan 22 00:24:50.460895 dracut-cmdline[211]: dracut-dracut-053 Jan 22 00:24:50.460895 dracut-cmdline[211]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Jan 22 00:24:50.460895 dracut-cmdline[211]: BEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=15990f5bb88d618f1948b7e8a720f1d5b95900cfecbef00df890bd0a136b39aa Jan 22 00:24:50.580584 kernel: SCSI subsystem initialized Jan 22 00:24:50.608525 kernel: Loading iSCSI transport class v2.0-870. Jan 22 00:24:50.639553 kernel: iscsi: registered transport (tcp) Jan 22 00:24:50.691777 kernel: iscsi: registered transport (qla4xxx) Jan 22 00:24:50.692563 kernel: QLogic iSCSI HBA Driver Jan 22 00:24:50.717053 systemd[1]: Finished dracut cmdline hook. Jan 22 00:24:50.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:50.739006 systemd[1]: Starting dracut pre-udev hook... Jan 22 00:24:50.826478 kernel: audit: type=1130 audit(1769041490.736:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:50.826519 kernel: device-mapper: uevent: version 1.0.3 Jan 22 00:24:50.851456 kernel: device-mapper: ioctl: 4.43.0-ioctl (2020-10-01) initialised: dm-devel@redhat.com Jan 22 00:24:50.951549 kernel: raid6: avx2x4 gen() 18563 MB/s Jan 22 00:24:50.979386 kernel: raid6: avx2x4 xor() 3845 MB/s Jan 22 00:24:51.006416 kernel: raid6: avx2x2 gen() 17468 MB/s Jan 22 00:24:51.034406 kernel: raid6: avx2x2 xor() 13297 MB/s Jan 22 00:24:51.063407 kernel: raid6: avx2x1 gen() 9083 MB/s Jan 22 00:24:51.090417 kernel: raid6: avx2x1 xor() 9638 MB/s Jan 22 00:24:51.118432 kernel: raid6: sse2x4 gen() 8992 MB/s Jan 22 00:24:51.146893 kernel: raid6: sse2x4 xor() 2928 MB/s Jan 22 00:24:51.174392 kernel: raid6: sse2x2 gen() 2175 MB/s Jan 22 00:24:51.201394 kernel: raid6: sse2x2 xor() 7152 MB/s Jan 22 00:24:51.228545 kernel: raid6: sse2x1 gen() 770 MB/s Jan 22 00:24:51.270563 kernel: raid6: sse2x1 xor() 5139 MB/s Jan 22 00:24:51.270611 kernel: raid6: using algorithm avx2x4 gen() 18563 MB/s Jan 22 00:24:51.270745 kernel: raid6: .... xor() 3845 MB/s, rmw enabled Jan 22 00:24:51.283294 kernel: raid6: using avx2x2 recovery algorithm Jan 22 00:24:51.347868 kernel: xor: automatically using best checksumming function avx Jan 22 00:24:51.544520 kernel: Btrfs loaded, crc32c=crc32c-intel Jan 22 00:24:51.574429 systemd[1]: Finished dracut pre-udev hook. Jan 22 00:24:51.670790 kernel: audit: type=1130 audit(1769041491.574:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:51.670821 kernel: audit: type=1334 audit(1769041491.636:10): prog-id=6 op=LOAD Jan 22 00:24:51.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:51.636000 audit: BPF prog-id=6 op=LOAD Jan 22 00:24:51.667000 audit: BPF prog-id=7 op=LOAD Jan 22 00:24:51.669000 audit: BPF prog-id=8 op=LOAD Jan 22 00:24:51.671460 systemd[1]: Starting Rule-based Manager for Device Events and Files... Jan 22 00:24:51.762349 systemd-udevd[331]: /usr/lib64/udev/rules.d/50-udev-default.rules:42 Unknown group 'sgx', ignoring Jan 22 00:24:51.765823 systemd[1]: Started Rule-based Manager for Device Events and Files. Jan 22 00:24:51.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:51.802845 systemd[1]: Starting dracut pre-trigger hook... Jan 22 00:24:51.848000 audit: BPF prog-id=9 op=LOAD Jan 22 00:24:51.850369 systemd[1]: Starting Network Configuration... Jan 22 00:24:51.881749 dracut-pre-trigger[351]: rd.md=0: removing MD RAID activation Jan 22 00:24:51.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:51.922812 systemd[1]: Finished dracut pre-trigger hook. Jan 22 00:24:51.934382 systemd[1]: Starting Coldplug All udev Devices... Jan 22 00:24:51.957879 systemd-networkd[364]: lo: Link UP Jan 22 00:24:51.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:51.984000 audit: BPF prog-id=10 op=LOAD Jan 22 00:24:51.957884 systemd-networkd[364]: lo: Gained carrier Jan 22 00:24:51.958312 systemd-networkd[364]: Enumeration completed Jan 22 00:24:51.958769 systemd[1]: Started Network Configuration. Jan 22 00:24:52.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:51.961545 systemd-udevd[331]: /usr/lib64/udev/rules.d/50-udev-default.rules:42 Unknown group 'sgx', ignoring Jan 22 00:24:51.986043 systemd[1]: Starting Network Name Resolution... Jan 22 00:24:52.126825 kernel: virtio_blk virtio1: [vda] 9289728 512-byte logical blocks (4.76 GB/4.43 GiB) Jan 22 00:24:52.126948 kernel: vda: detected capacity change from 0 to 4756340736 Jan 22 00:24:52.126960 kernel: cryptd: max_cpu_qlen set to 1000 Jan 22 00:24:52.000450 systemd[1]: Finished Coldplug All udev Devices. Jan 22 00:24:52.194869 systemd-resolved[393]: Positive Trust Anchors: Jan 22 00:24:52.246755 kernel: AVX2 version of gcm_enc/dec engaged. Jan 22 00:24:52.246783 kernel: libata version 3.00 loaded. Jan 22 00:24:52.246794 kernel: AES CTR mode by8 optimization enabled Jan 22 00:24:52.246803 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jan 22 00:24:52.197884 systemd-resolved[393]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jan 22 00:24:53.945925 kernel: ahci 0000:00:1f.2: version 3.0 Jan 22 00:24:53.946300 kernel: PCI Interrupt Link [GSIA] enabled at IRQ 16 Jan 22 00:24:53.946317 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Jan 22 00:24:53.946403 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Jan 22 00:24:53.946480 kernel: scsi host0: ahci Jan 22 00:24:53.946577 kernel: scsi host1: ahci Jan 22 00:24:53.946649 kernel: scsi host2: ahci Jan 22 00:24:53.946848 kernel: scsi host3: ahci Jan 22 00:24:53.946938 kernel: scsi host4: ahci Jan 22 00:24:53.947040 kernel: scsi host5: ahci Jan 22 00:24:53.947305 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 Jan 22 00:24:53.947319 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 Jan 22 00:24:53.947326 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 Jan 22 00:24:53.947333 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 Jan 22 00:24:53.947339 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 Jan 22 00:24:53.947346 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 Jan 22 00:24:53.947352 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/vda6 scanned by systemd-udevd (421) Jan 22 00:24:53.947359 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Jan 22 00:24:53.947365 kernel: ata1: SATA link down (SStatus 0 SControl 300) Jan 22 00:24:53.947374 kernel: ata6: SATA link down (SStatus 0 SControl 300) Jan 22 00:24:53.947380 kernel: ata2: SATA link down (SStatus 0 SControl 300) Jan 22 00:24:53.947388 kernel: ata5: SATA link down (SStatus 0 SControl 300) Jan 22 00:24:53.947394 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Jan 22 00:24:53.947401 kernel: ata3.00: applying bridge limits Jan 22 00:24:53.947407 kernel: ata4: SATA link down (SStatus 0 SControl 300) Jan 22 00:24:53.947413 kernel: ata3.00: configured for UDMA/100 Jan 22 00:24:53.947419 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Jan 22 00:24:53.947489 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Jan 22 00:24:53.947543 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jan 22 00:24:53.947552 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jan 22 00:24:53.947559 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Jan 22 00:24:53.947611 kernel: kauditd_printk_skb: 8 callbacks suppressed Jan 22 00:24:53.947618 kernel: audit: type=1130 audit(1769041493.849:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:53.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:52.197920 systemd-resolved[393]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jan 22 00:24:52.198443 systemd-resolved[393]: Defaulting to hostname 'linux'. Jan 22 00:24:52.199506 systemd[1]: Started Network Name Resolution. Jan 22 00:24:52.274822 systemd-udevd[385]: Using default interface naming scheme 'v249'. Jan 22 00:24:52.333914 systemd-networkd[364]: eth0: Link UP Jan 22 00:24:53.321070 systemd-networkd[364]: eth0: Gained carrier Jan 22 00:24:53.642429 systemd-networkd[364]: eth0: DHCPv4 address 10.0.0.3/16 via 10.0.0.1 Jan 22 00:24:53.869388 systemd[1]: Found device /dev/disk/by-label/OEM. Jan 22 00:24:54.198442 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jan 22 00:24:53.949378 systemd[1]: Found device /dev/disk/by-partlabel/USR-A. Jan 22 00:24:54.294831 kernel: audit: type=1130 audit(1769041494.235:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:54.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:54.033504 systemd[1]: Found device /dev/disk/by-partuuid/7130c94a-213a-4e5a-8e26-6cce9662f132. Jan 22 00:24:54.373054 kernel: audit: type=1130 audit(1769041494.310:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:54.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:54.373316 iscsid[470]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jan 22 00:24:54.373316 iscsid[470]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jan 22 00:24:54.373316 iscsid[470]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jan 22 00:24:54.373316 iscsid[470]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jan 22 00:24:54.373316 iscsid[470]: If using hardware iscsi like qla4xxx this message can be ignored. Jan 22 00:24:54.373316 iscsid[470]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jan 22 00:24:54.373316 iscsid[470]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jan 22 00:24:54.603631 kernel: audit: type=1130 audit(1769041494.439:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:54.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:54.050920 systemd[1]: Found device /dev/disk/by-label/ROOT. Jan 22 00:24:54.083831 systemd[1]: Found device /dev/disk/by-label/EFI-SYSTEM. Jan 22 00:24:54.095482 systemd[1]: Reached target Initrd Root Device. Jan 22 00:24:54.104868 systemd[1]: Reached target Network. Jan 22 00:24:54.113447 systemd[1]: Reached target Host and Network Name Lookups. Jan 22 00:24:54.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:54.136486 systemd[1]: Starting Generate new UUID for disk GPT if necessary... Jan 22 00:24:54.746941 kernel: audit: type=1130 audit(1769041494.669:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:54.157417 systemd[1]: Starting iSCSI UserSpace I/O driver... Jan 22 00:24:54.210858 systemd[1]: Started iSCSI UserSpace I/O driver. Jan 22 00:24:54.243878 systemd[1]: Starting Open-iSCSI... Jan 22 00:24:54.302391 systemd[1]: Started Open-iSCSI. Jan 22 00:24:54.366511 systemd[1]: Starting dracut initqueue hook... Jan 22 00:24:54.397878 systemd[1]: Finished dracut initqueue hook. Jan 22 00:24:54.409814 systemd-networkd[364]: eth0: Gained IPv6LL Jan 22 00:24:54.439805 systemd[1]: Reached target Preparation for Remote File Systems. Jan 22 00:24:54.579474 systemd[1]: Reached target Remote Encrypted Volumes. Jan 22 00:24:54.579794 systemd[1]: Reached target Remote File Systems. Jan 22 00:24:54.615396 systemd[1]: Starting dracut pre-mount hook... Jan 22 00:24:54.650770 systemd[1]: Finished dracut pre-mount hook. Jan 22 00:24:55.247420 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jan 22 00:24:55.255408 disk-uuid[468]: The operation has completed successfully. Jan 22 00:24:55.351839 systemd[1]: disk-uuid.service: Deactivated successfully. Jan 22 00:24:55.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:55.352063 systemd[1]: Finished Generate new UUID for disk GPT if necessary. Jan 22 00:24:55.520476 kernel: audit: type=1130 audit(1769041495.367:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:55.520507 kernel: BTRFS info (device vda6): disk space caching is enabled Jan 22 00:24:55.520516 kernel: audit: type=1131 audit(1769041495.367:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:55.520532 kernel: BTRFS info (device vda6): has skinny extents Jan 22 00:24:55.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:55.370331 systemd[1]: Starting Ignition (setup)... Jan 22 00:24:55.559529 systemd[1]: mnt-oem.mount: Deactivated successfully. Jan 22 00:24:55.598045 systemd[1]: ignition-setup.service: Deactivated successfully. Jan 22 00:24:55.598631 systemd[1]: Finished Ignition (setup). Jan 22 00:24:55.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:55.632581 systemd[1]: Starting Ignition (disks)... Jan 22 00:24:55.758077 kernel: audit: type=1130 audit(1769041495.630:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:55.758104 kernel: audit: type=1131 audit(1769041495.630:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:55.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:55.900805 ignition[519]: Ignition v0.36.1-15-gde4e6cc9 Jan 22 00:24:55.900915 ignition[519]: Stage: disks Jan 22 00:24:55.900928 ignition[519]: reading system config file "/usr/lib/ignition/base.ign" Jan 22 00:24:55.900974 ignition[519]: no config at "/usr/lib/ignition/base.ign" Jan 22 00:24:55.901465 ignition[519]: parsed url from cmdline: "" Jan 22 00:24:55.901470 ignition[519]: no config URL provided Jan 22 00:24:55.901476 ignition[519]: reading system config file "/usr/lib/ignition/user.ign" Jan 22 00:24:55.901485 ignition[519]: no config at "/usr/lib/ignition/user.ign" Jan 22 00:24:55.901508 ignition[519]: op(1): [started] loading QEMU firmware config module Jan 22 00:24:55.901514 ignition[519]: op(1): executing: "modprobe" "qemu_fw_cfg" Jan 22 00:24:55.968004 ignition[519]: op(1): [finished] loading QEMU firmware config module Jan 22 00:24:56.351416 ignition[519]: parsing config with SHA512: 9582a29c47c767a07745604b66245e4b0c56d6dde3cd48d96f4ae7cd08e4db935adfcd9bc75c49c57d822bc9673167b3d0d9d3dc3c287a0172d8d4af905c46ca Jan 22 00:24:56.419515 ignition[519]: disks: disks passed Jan 22 00:24:56.420062 ignition[519]: Ignition finished successfully Jan 22 00:24:56.422485 systemd[1]: ignition-disks.service: Deactivated successfully. Jan 22 00:24:56.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:56.422809 systemd[1]: Finished Ignition (disks). Jan 22 00:24:56.532845 kernel: audit: type=1130 audit(1769041496.450:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:56.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:56.451327 systemd[1]: Reached target Preparation for Local File Systems. Jan 22 00:24:56.515524 systemd[1]: Starting File System Check on /dev/disk/by-label/ROOT... Jan 22 00:24:56.535565 systemd[1]: Starting Verity Setup for /dev/mapper/usr... Jan 22 00:24:56.572966 systemd-fsck[530]: ROOT: clean, 556/553792 files, 37783/553472 blocks Jan 22 00:24:56.582968 systemd[1]: Finished File System Check on /dev/disk/by-label/ROOT. Jan 22 00:24:56.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:56.611988 systemd[1]: Mounting /sysroot... Jan 22 00:24:56.741467 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Jan 22 00:24:57.060884 systemd[1]: Found device /dev/mapper/usr. Jan 22 00:24:57.063495 systemd[1]: Starting File System Check on /dev/mapper/usr... Jan 22 00:24:57.081458 systemd[1]: Finished Verity Setup for /dev/mapper/usr. Jan 22 00:24:57.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:57.164967 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null) Jan 22 00:24:57.165034 kernel: ext4 filesystem being mounted at /sysroot supports timestamps until 2038 (0x7fffffff) Jan 22 00:24:57.165851 systemd[1]: Mounted /sysroot. Jan 22 00:24:57.188092 systemd[1]: Reached target Initrd Root File System. Jan 22 00:24:57.225859 systemd-fsck[548]: fsck.ext4: Operation not permitted while trying to open /dev/mapper/usr Jan 22 00:24:57.225859 systemd-fsck[548]: You must have r/w access to the filesystem or be root Jan 22 00:24:57.227838 systemd-fsck[545]: fsck failed with exit status 8. Jan 22 00:24:57.227945 systemd-fsck[545]: Ignoring error. Jan 22 00:24:57.294897 systemd[1]: Finished File System Check on /dev/mapper/usr. Jan 22 00:24:57.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:57.333411 systemd[1]: Mounting /sysusr/usr... Jan 22 00:24:57.392443 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: (null) Jan 22 00:24:57.393912 systemd[1]: Mounted /sysusr/usr. Jan 22 00:24:57.394552 systemd[1]: Reached target Local File Systems. Jan 22 00:24:57.433592 systemd[1]: Reached target System Initialization. Jan 22 00:24:57.448868 systemd[1]: Reached target Basic System. Jan 22 00:24:57.464994 systemd[1]: Mounting /sysroot/usr... Jan 22 00:24:57.481000 systemd[1]: Mounted /sysroot/usr. Jan 22 00:24:57.522966 systemd[1]: Starting Root filesystem setup... Jan 22 00:24:57.751931 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jan 22 00:24:57.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:57.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:57.752451 systemd[1]: Finished Root filesystem setup. Jan 22 00:24:57.780503 systemd[1]: Starting Ignition (files)... Jan 22 00:24:57.797452 systemd[1]: Starting /sysroot/boot... Jan 22 00:24:57.922471 ignition[561]: Ignition v0.36.1-15-gde4e6cc9 Jan 22 00:24:57.922577 ignition[561]: Stage: files Jan 22 00:24:57.922589 ignition[561]: reading system config file "/usr/lib/ignition/base.ign" Jan 22 00:24:57.922604 ignition[561]: no config at "/usr/lib/ignition/base.ign" Jan 22 00:24:57.923584 ignition[561]: files: compiled without relabeling support, skipping Jan 22 00:24:57.983700 systemd[1]: Finished /sysroot/boot. Jan 22 00:24:57.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:58.232963 ignition[561]: files: createUsers: op(1): [started] creating or modifying user "core" Jan 22 00:24:58.233081 ignition[561]: files: createUsers: op(1): executing: "/usr/sbin/usermod" "--root" "/sysroot" "core" Jan 22 00:24:58.261371 ignition[561]: files: createUsers: op(1): [finished] creating or modifying user "core" Jan 22 00:24:58.261466 ignition[561]: files: createUsers: op(2): [started] adding ssh keys to user "core" Jan 22 00:24:58.280620 ignition[561]: files: createUsers: op(2): [finished] adding ssh keys to user "core" Jan 22 00:24:58.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:58.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:58.288826 systemd[1]: ignition-files.service: Deactivated successfully. Jan 22 00:24:58.281319 ignition[561]: files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/etc/flatcar/update.conf" Jan 22 00:24:58.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:58.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:58.289051 systemd[1]: Finished Ignition (files). Jan 22 00:24:58.284971 ignition[561]: files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/etc/flatcar/update.conf" Jan 22 00:24:58.320985 systemd[1]: Condition check resulted in Populate torcx store to satisfy profile being skipped. Jan 22 00:24:58.459000 audit: BPF prog-id=10 op=UNLOAD Jan 22 00:24:58.462000 audit: BPF prog-id=6 op=UNLOAD Jan 22 00:24:58.284981 ignition[561]: files: op(4): [started] processing unit "coreos-metadata.service" Jan 22 00:24:58.467000 audit: BPF prog-id=3 op=UNLOAD Jan 22 00:24:58.467000 audit: BPF prog-id=9 op=UNLOAD Jan 22 00:24:58.325358 systemd[1]: Starting Ignition (record completion)... Jan 22 00:24:58.285308 ignition[561]: files: op(4): op(5): [started] writing unit "coreos-metadata.service" at "etc/systemd/system/coreos-metadata.service" Jan 22 00:24:58.333088 systemd[1]: Starting Reload Configuration from the Real Root... Jan 22 00:24:58.286432 ignition[561]: files: op(4): op(5): [finished] writing unit "coreos-metadata.service" at "etc/systemd/system/coreos-metadata.service" Jan 22 00:24:58.362519 systemd[1]: ignition-quench.service: Deactivated successfully. Jan 22 00:24:58.286437 ignition[561]: files: op(4): [finished] processing unit "coreos-metadata.service" Jan 22 00:24:58.364490 systemd[1]: Finished Ignition (record completion). Jan 22 00:24:58.286441 ignition[561]: files: files passed Jan 22 00:24:58.410641 systemd[1]: Reloading. Jan 22 00:24:58.286444 ignition[561]: Ignition finished successfully Jan 22 00:24:58.822000 audit: BPF prog-id=11 op=LOAD Jan 22 00:24:58.826000 audit: BPF prog-id=12 op=LOAD Jan 22 00:24:58.828000 audit: BPF prog-id=13 op=LOAD Jan 22 00:24:58.830000 audit: BPF prog-id=14 op=LOAD Jan 22 00:24:58.830000 audit: BPF prog-id=7 op=UNLOAD Jan 22 00:24:58.830000 audit: BPF prog-id=8 op=UNLOAD Jan 22 00:24:58.831000 audit: BPF prog-id=15 op=LOAD Jan 22 00:24:58.833000 audit: BPF prog-id=16 op=LOAD Jan 22 00:24:58.835000 audit: BPF prog-id=17 op=LOAD Jan 22 00:24:58.835000 audit: BPF prog-id=4 op=UNLOAD Jan 22 00:24:58.835000 audit: BPF prog-id=5 op=UNLOAD Jan 22 00:24:58.836000 audit: BPF prog-id=18 op=LOAD Jan 22 00:24:58.912626 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jan 22 00:24:58.913046 systemd[1]: Finished Reload Configuration from the Real Root. Jan 22 00:24:58.930104 systemd[1]: Reached target Initrd File Systems. Jan 22 00:24:58.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:58.978909 systemd[1]: Reached target Initrd Default Target. Jan 22 00:24:59.140460 kernel: kauditd_printk_skb: 27 callbacks suppressed Jan 22 00:24:59.140511 kernel: audit: type=1130 audit(1769041498.929:56): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:59.140526 kernel: audit: type=1131 audit(1769041498.929:57): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:58.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:59.057877 systemd[1]: Condition check resulted in dracut mount hook being skipped. Jan 22 00:24:59.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:59.063607 systemd[1]: Starting dracut pre-pivot and cleanup hook... Jan 22 00:24:59.244537 kernel: audit: type=1130 audit(1769041499.169:58): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:59.141314 systemd[1]: Finished dracut pre-pivot and cleanup hook. Jan 22 00:24:59.171478 systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Jan 22 00:24:59.269454 systemd[1]: Stopped target Host and Network Name Lookups. Jan 22 00:24:59.420433 kernel: audit: type=1131 audit(1769041499.341:59): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:59.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:59.283902 systemd[1]: Stopped target Remote Encrypted Volumes. Jan 22 00:24:59.295500 systemd[1]: Stopped target Timer Units. Jan 22 00:24:59.321363 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jan 22 00:24:59.321534 systemd[1]: Stopped dracut pre-pivot and cleanup hook. Jan 22 00:24:59.341865 systemd[1]: Stopped target Initrd Default Target. Jan 22 00:24:59.400852 systemd[1]: Stopped target Basic System. Jan 22 00:24:59.420593 systemd[1]: Stopped target Initrd Root Device. Jan 22 00:24:59.720077 kernel: audit: type=1131 audit(1769041499.616:60): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:59.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:59.444331 systemd[1]: Stopped target Path Units. Jan 22 00:24:59.783598 kernel: audit: type=1131 audit(1769041499.719:61): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:59.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:59.783686 iscsid[470]: iscsid shutting down. Jan 22 00:24:59.478928 systemd[1]: Stopped target Remote File Systems. Jan 22 00:24:59.886101 kernel: audit: type=1131 audit(1769041499.804:62): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:59.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:59.489697 systemd[1]: Stopped target Preparation for Remote File Systems. Jan 22 00:24:59.516001 systemd[1]: Stopped target Slice Units. Jan 22 00:24:59.978484 kernel: audit: type=1131 audit(1769041499.909:63): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:59.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:59.528943 systemd[1]: Stopped target Socket Units. Jan 22 00:25:00.037072 kernel: audit: type=1131 audit(1769041499.978:64): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:59.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:59.540574 systemd[1]: Stopped target System Initialization. Jan 22 00:25:00.126902 kernel: audit: type=1131 audit(1769041500.049:65): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:00.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:59.564008 systemd[1]: Stopped target Local File Systems. Jan 22 00:24:59.584547 systemd[1]: Stopped target Preparation for Local File Systems. Jan 22 00:25:00.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:00.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:00.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:59.597015 systemd[1]: Stopped target Swaps. Jan 22 00:24:59.605685 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jan 22 00:24:59.605936 systemd[1]: Stopped dracut pre-mount hook. Jan 22 00:24:59.617032 systemd[1]: Stopped target Local Encrypted Volumes. Jan 22 00:25:00.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:59.691947 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jan 22 00:24:59.693026 systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Jan 22 00:25:00.296000 audit: BPF prog-id=11 op=UNLOAD Jan 22 00:24:59.708102 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jan 22 00:24:59.708578 systemd[1]: Stopped dracut initqueue hook. Jan 22 00:24:59.728491 systemd[1]: Stopping Open-iSCSI... Jan 22 00:25:00.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:59.801392 systemd[1]: Stopping /sysroot/boot... Jan 22 00:24:59.804693 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jan 22 00:25:00.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:59.804983 systemd[1]: Stopped Coldplug All udev Devices. Jan 22 00:24:59.805425 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jan 22 00:25:00.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:59.805527 systemd[1]: Stopped dracut pre-trigger hook. Jan 22 00:25:00.497000 audit: BPF prog-id=12 op=UNLOAD Jan 22 00:24:59.912933 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jan 22 00:25:00.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:00.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:00.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:00.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:00.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:00.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:00.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=rngd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:00.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:00.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:00.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:24:59.913714 systemd[1]: iscsid.service: Deactivated successfully. Jan 22 00:24:59.914001 systemd[1]: Stopped Open-iSCSI. Jan 22 00:25:00.702000 audit: BPF prog-id=15 op=UNLOAD Jan 22 00:24:59.979481 systemd[1]: sysroot-boot.service: Deactivated successfully. Jan 22 00:24:59.979700 systemd[1]: Stopped /sysroot/boot. Jan 22 00:25:00.050568 systemd[1]: iscsid.socket: Deactivated successfully. Jan 22 00:25:00.050663 systemd[1]: Closed Open-iSCSI iscsid Socket. Jan 22 00:25:00.127671 systemd[1]: Stopping iSCSI UserSpace I/O driver... Jan 22 00:25:00.150341 systemd[1]: iscsiuio.service: Deactivated successfully. Jan 22 00:25:00.150579 systemd[1]: Stopped iSCSI UserSpace I/O driver. Jan 22 00:25:00.173466 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jan 22 00:25:00.173678 systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Jan 22 00:25:00.189026 systemd[1]: Stopped target Network. Jan 22 00:25:00.203569 systemd[1]: iscsiuio.socket: Deactivated successfully. Jan 22 00:25:00.203677 systemd[1]: Closed Open-iSCSI iscsiuio Socket. Jan 22 00:25:00.214097 systemd[1]: Stopping Network Name Resolution... Jan 22 00:25:00.251976 systemd[1]: systemd-resolved.service: Deactivated successfully. Jan 22 00:25:00.252491 systemd[1]: Stopped Network Name Resolution. Jan 22 00:25:00.274663 systemd[1]: Stopping Network Configuration... Jan 22 00:25:00.277890 systemd-networkd[364]: eth0: DHCP lease lost Jan 22 00:25:00.333406 systemd-networkd[364]: eth0: DHCPv6 lease lost Jan 22 00:25:00.337430 systemd[1]: systemd-networkd.service: Deactivated successfully. Jan 22 00:25:00.337674 systemd[1]: Stopped Network Configuration. Jan 22 00:25:00.373477 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jan 22 00:25:00.755000 audit: BPF prog-id=18 op=UNLOAD Jan 22 00:25:00.373530 systemd[1]: Closed Network Service Netlink Socket. Jan 22 00:25:00.393674 systemd[1]: Stopping Network Cleanup... Jan 22 00:25:00.416523 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jan 22 00:25:00.416611 systemd[1]: Stopped Apply Kernel Variables. Jan 22 00:25:00.426465 systemd[1]: Stopping Rule-based Manager for Device Events and Files... Jan 22 00:25:00.453037 systemd[1]: systemd-udevd.service: Deactivated successfully. Jan 22 00:25:00.453943 systemd[1]: Stopped Rule-based Manager for Device Events and Files. Jan 22 00:25:00.468378 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jan 22 00:25:00.468428 systemd[1]: Closed udev Control Socket. Jan 22 00:25:00.501034 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jan 22 00:25:00.501087 systemd[1]: Closed udev Kernel Socket. Jan 22 00:25:00.501354 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jan 22 00:25:00.501403 systemd[1]: Stopped dracut pre-udev hook. Jan 22 00:25:00.501590 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jan 22 00:25:00.501628 systemd[1]: Stopped dracut cmdline hook. Jan 22 00:25:00.501890 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jan 22 00:25:00.501935 systemd[1]: Stopped dracut ask for additional cmdline parameters. Jan 22 00:25:00.523648 systemd[1]: Starting Cleanup udev Database... Jan 22 00:25:00.540381 systemd[1]: Stopping Hardware RNG Entropy Gatherer Daemon... Jan 22 00:25:00.548962 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jan 22 00:25:00.549031 systemd[1]: Stopped Create Static Device Nodes in /dev. Jan 22 00:25:00.566675 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jan 22 00:25:00.566728 systemd[1]: Stopped Create List of Static Device Nodes. Jan 22 00:25:00.582653 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jan 22 00:25:00.582713 systemd[1]: Stopped Setup Virtual Console. Jan 22 00:25:00.599676 systemd[1]: rngd.service: Deactivated successfully. Jan 22 00:25:00.599966 systemd[1]: Stopped Hardware RNG Entropy Gatherer Daemon. Jan 22 00:25:00.613884 systemd[1]: network-cleanup.service: Deactivated successfully. Jan 22 00:25:00.614295 systemd[1]: Stopped Network Cleanup. Jan 22 00:25:00.632941 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jan 22 00:25:00.633412 systemd[1]: Finished Cleanup udev Database. Jan 22 00:25:00.633843 systemd[1]: Reached target Switch Root. Jan 22 00:25:00.635460 systemd[1]: Starting Switch Root... Jan 22 00:25:00.697997 systemd[1]: Switching root. Jan 22 00:25:00.760349 systemd-journald[192]: Journal stopped Jan 22 00:25:12.867488 systemd-journald[192]: Received SIGTERM from PID 1 (n/a). Jan 22 00:25:12.867540 kernel: SELinux: policy capability network_peer_controls=1 Jan 22 00:25:12.867680 kernel: SELinux: policy capability open_perms=1 Jan 22 00:25:12.867692 kernel: SELinux: policy capability extended_socket_class=1 Jan 22 00:25:12.867703 kernel: SELinux: policy capability always_check_network=0 Jan 22 00:25:12.867713 kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 00:25:12.867723 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 00:25:12.867733 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jan 22 00:25:12.867747 systemd[1]: Successfully loaded SELinux policy in 232.634ms. Jan 22 00:25:12.867770 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 17.400ms. Jan 22 00:25:12.867783 systemd[1]: systemd 249 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jan 22 00:25:12.867798 systemd[1]: Detected virtualization kvm. Jan 22 00:25:12.867811 systemd[1]: Detected architecture x86-64. Jan 22 00:25:12.867822 systemd[1]: Detected first boot. Jan 22 00:25:12.867832 systemd[1]: Initializing machine ID from VM UUID. Jan 22 00:25:12.868041 kernel: hrtimer: interrupt took 4934040 ns Jan 22 00:25:12.868064 systemd[1]: Populated /etc with preset unit settings. Jan 22 00:25:12.868080 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jan 22 00:25:12.868098 systemd[1]: initrd-switch-root.service: Current command vanished from the unit file, execution of the command list won't be resumed. Jan 22 00:25:12.868110 kernel: kauditd_printk_skb: 29 callbacks suppressed Jan 22 00:25:12.868310 kernel: audit: type=1334 audit(1769041510.841:95): prog-id=21 op=LOAD Jan 22 00:25:12.868323 kernel: audit: type=1334 audit(1769041510.858:96): prog-id=22 op=LOAD Jan 22 00:25:12.868333 kernel: audit: type=1334 audit(1769041510.893:97): prog-id=23 op=LOAD Jan 22 00:25:12.868446 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jan 22 00:25:12.868458 kernel: audit: type=1334 audit(1769041510.893:98): prog-id=16 op=UNLOAD Jan 22 00:25:12.868470 systemd[1]: Stopped Switch Root. Jan 22 00:25:12.868481 kernel: audit: type=1334 audit(1769041510.893:99): prog-id=17 op=UNLOAD Jan 22 00:25:12.868492 kernel: audit: type=1131 audit(1769041510.899:100): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:12.868503 kernel: audit: type=1130 audit(1769041511.044:101): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:12.868513 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jan 22 00:25:12.868525 kernel: audit: type=1131 audit(1769041511.044:102): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:12.868536 systemd[1]: Created slice Slice /system/addon-config. Jan 22 00:25:12.868547 kernel: audit: type=1334 audit(1769041511.049:103): prog-id=21 op=UNLOAD Jan 22 00:25:12.868559 systemd[1]: Created slice Slice /system/addon-run. Jan 22 00:25:12.868569 systemd[1]: Created slice Slice /system/getty. Jan 22 00:25:12.868580 systemd[1]: Created slice Slice /system/modprobe. Jan 22 00:25:12.868591 systemd[1]: Created slice Slice /system/serial-getty. Jan 22 00:25:12.868602 systemd[1]: Created slice Slice /system/system-cloudinit. Jan 22 00:25:12.868612 systemd[1]: Created slice Slice /system/systemd-fsck. Jan 22 00:25:12.868623 systemd[1]: Created slice User and Session Slice. Jan 22 00:25:12.868635 systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Jan 22 00:25:12.868649 systemd[1]: Started Forward Password Requests to Wall Directory Watch. Jan 22 00:25:12.868660 systemd[1]: Set up automount Boot partition Automount Point. Jan 22 00:25:12.868673 systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Jan 22 00:25:12.868794 systemd[1]: Stopped target Switch Root. Jan 22 00:25:12.868806 systemd[1]: Stopped target Initrd File Systems. Jan 22 00:25:12.868817 systemd[1]: Stopped target Initrd Root File System. Jan 22 00:25:12.868828 systemd[1]: Reached target Remote Encrypted Volumes. Jan 22 00:25:12.868949 systemd[1]: Reached target Remote File Systems. Jan 22 00:25:12.868965 systemd[1]: Reached target Slice Units. Jan 22 00:25:12.868976 systemd[1]: Reached target Swaps. Jan 22 00:25:12.868987 systemd[1]: Reached target Verify torcx succeeded. Jan 22 00:25:12.869000 systemd[1]: Reached target Local Verity Protected Volumes. Jan 22 00:25:12.869012 systemd[1]: Listening on Process Core Dump Socket. Jan 22 00:25:12.869022 systemd[1]: Listening on initctl Compatibility Named Pipe. Jan 22 00:25:12.869033 systemd[1]: Listening on Network Service Netlink Socket. Jan 22 00:25:12.869044 systemd[1]: Listening on udev Control Socket. Jan 22 00:25:12.869054 systemd[1]: Listening on udev Kernel Socket. Jan 22 00:25:12.869069 systemd[1]: Mounting Huge Pages File System... Jan 22 00:25:12.869081 systemd[1]: Mounting POSIX Message Queue File System... Jan 22 00:25:12.869091 systemd[1]: Mounting External Media Directory... Jan 22 00:25:12.869102 systemd[1]: Condition check resulted in /proc/xen being skipped. Jan 22 00:25:12.869291 systemd[1]: Mounting Kernel Debug File System... Jan 22 00:25:12.869306 systemd[1]: Mounting Kernel Trace File System... Jan 22 00:25:12.869317 systemd[1]: Mounting Temporary Directory /tmp... Jan 22 00:25:12.869425 systemd[1]: Starting Create missing system files... Jan 22 00:25:12.869438 systemd[1]: Starting Create List of Static Device Nodes... Jan 22 00:25:12.869448 systemd[1]: Starting Load Kernel Module configfs... Jan 22 00:25:12.869459 systemd[1]: Starting Load Kernel Module drm... Jan 22 00:25:12.869470 systemd[1]: Starting Load Kernel Module fuse... Jan 22 00:25:12.869480 systemd[1]: Condition check resulted in Create /etc/nsswitch.conf being skipped. Jan 22 00:25:12.869494 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jan 22 00:25:12.869505 kernel: fuse: init (API version 7.32) Jan 22 00:25:12.869515 systemd[1]: Stopped File System Check on Root Device. Jan 22 00:25:12.869526 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jan 22 00:25:12.869537 kernel: audit: type=1131 audit(1769041512.480:104): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:12.869547 systemd[1]: Stopped systemd-fsck-usr.service. Jan 22 00:25:12.869559 systemd[1]: Stopped Journal Service. Jan 22 00:25:12.869569 systemd[1]: systemd-journald.service: Consumed 3.550s CPU time. Jan 22 00:25:12.869580 systemd[1]: Starting Journal Service... Jan 22 00:25:12.869592 systemd[1]: Condition check resulted in Load Kernel Modules being skipped. Jan 22 00:25:12.869603 systemd[1]: Starting Remount Root and Kernel File Systems... Jan 22 00:25:12.869613 systemd[1]: Starting Apply Kernel Variables... Jan 22 00:25:12.869624 systemd[1]: Starting Coldplug All udev Devices... Jan 22 00:25:12.869635 systemd[1]: verity-setup.service: Deactivated successfully. Jan 22 00:25:12.869645 systemd[1]: Stopped verity-setup.service. Jan 22 00:25:12.869752 systemd-journald[780]: Journal started Jan 22 00:25:12.870064 systemd-journald[780]: Runtime Journal (/run/log/journal/22650f9910aa4127a8f82257a2f615fa) is 6.0M, max 48.7M, 42.6M free. Jan 22 00:25:01.303000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jan 22 00:25:01.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jan 22 00:25:01.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jan 22 00:25:01.625000 audit: BPF prog-id=19 op=LOAD Jan 22 00:25:01.625000 audit: BPF prog-id=19 op=UNLOAD Jan 22 00:25:01.626000 audit: BPF prog-id=20 op=LOAD Jan 22 00:25:01.626000 audit: BPF prog-id=20 op=UNLOAD Jan 22 00:25:01.930000 audit[726]: AVC avc: denied { associate } for pid=726 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jan 22 00:25:10.841000 audit: BPF prog-id=21 op=LOAD Jan 22 00:25:10.858000 audit: BPF prog-id=22 op=LOAD Jan 22 00:25:10.893000 audit: BPF prog-id=23 op=LOAD Jan 22 00:25:10.893000 audit: BPF prog-id=16 op=UNLOAD Jan 22 00:25:10.893000 audit: BPF prog-id=17 op=UNLOAD Jan 22 00:25:10.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:11.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:11.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:11.049000 audit: BPF prog-id=21 op=UNLOAD Jan 22 00:25:12.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:12.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:12.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:12.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:12.640000 audit: BPF prog-id=24 op=LOAD Jan 22 00:25:12.642000 audit: BPF prog-id=25 op=LOAD Jan 22 00:25:12.644000 audit: BPF prog-id=26 op=LOAD Jan 22 00:25:12.644000 audit: BPF prog-id=22 op=UNLOAD Jan 22 00:25:12.644000 audit: BPF prog-id=23 op=UNLOAD Jan 22 00:25:12.848000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jan 22 00:25:01.910862 /usr/lib64/systemd/system-generators/torcx-generator[726]: time="2026-01-22T00:25:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3033.2.4 /usr/share/oem/torcx/store /var/lib/torcx/store/3033.2.4 /var/lib/torcx/store]" Jan 22 00:25:10.820975 systemd[1]: Queued start job for default target Multi-User System. Jan 22 00:25:01.912742 /usr/lib64/systemd/system-generators/torcx-generator[726]: time="2026-01-22T00:25:01Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jan 22 00:25:10.895976 systemd[1]: systemd-journald.service: Deactivated successfully. Jan 22 00:25:01.912868 /usr/lib64/systemd/system-generators/torcx-generator[726]: time="2026-01-22T00:25:01Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jan 22 00:25:10.900318 systemd[1]: systemd-journald.service: Consumed 3.550s CPU time. Jan 22 00:25:01.914012 /usr/lib64/systemd/system-generators/torcx-generator[726]: time="2026-01-22T00:25:01Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jan 22 00:25:01.914026 /usr/lib64/systemd/system-generators/torcx-generator[726]: time="2026-01-22T00:25:01Z" level=debug msg="skipped missing lower profile" missing profile=oem Jan 22 00:25:01.914068 /usr/lib64/systemd/system-generators/torcx-generator[726]: time="2026-01-22T00:25:01Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jan 22 00:25:01.914086 /usr/lib64/systemd/system-generators/torcx-generator[726]: time="2026-01-22T00:25:01Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jan 22 00:25:01.916333 /usr/lib64/systemd/system-generators/torcx-generator[726]: time="2026-01-22T00:25:01Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jan 22 00:25:01.916376 /usr/lib64/systemd/system-generators/torcx-generator[726]: time="2026-01-22T00:25:01Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jan 22 00:25:01.916395 /usr/lib64/systemd/system-generators/torcx-generator[726]: time="2026-01-22T00:25:01Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jan 22 00:25:01.926037 /usr/lib64/systemd/system-generators/torcx-generator[726]: time="2026-01-22T00:25:01Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jan 22 00:25:01.926079 /usr/lib64/systemd/system-generators/torcx-generator[726]: time="2026-01-22T00:25:01Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jan 22 00:25:01.926104 /usr/lib64/systemd/system-generators/torcx-generator[726]: time="2026-01-22T00:25:01Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3033.2.4: no such file or directory" path=/usr/share/oem/torcx/store/3033.2.4 Jan 22 00:25:01.926546 /usr/lib64/systemd/system-generators/torcx-generator[726]: time="2026-01-22T00:25:01Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jan 22 00:25:01.926572 /usr/lib64/systemd/system-generators/torcx-generator[726]: time="2026-01-22T00:25:01Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3033.2.4: no such file or directory" path=/var/lib/torcx/store/3033.2.4 Jan 22 00:25:01.926591 /usr/lib64/systemd/system-generators/torcx-generator[726]: time="2026-01-22T00:25:01Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jan 22 00:25:09.970316 /usr/lib64/systemd/system-generators/torcx-generator[726]: time="2026-01-22T00:25:09Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jan 22 00:25:09.971351 /usr/lib64/systemd/system-generators/torcx-generator[726]: time="2026-01-22T00:25:09Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jan 22 00:25:09.971678 /usr/lib64/systemd/system-generators/torcx-generator[726]: time="2026-01-22T00:25:09Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jan 22 00:25:09.972525 /usr/lib64/systemd/system-generators/torcx-generator[726]: time="2026-01-22T00:25:09Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jan 22 00:25:09.972635 /usr/lib64/systemd/system-generators/torcx-generator[726]: time="2026-01-22T00:25:09Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jan 22 00:25:09.973042 /usr/lib64/systemd/system-generators/torcx-generator[726]: time="2026-01-22T00:25:09Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jan 22 00:25:12.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:12.925512 systemd[1]: Condition check resulted in Set fake PV driver version for XenServer being skipped. Jan 22 00:25:12.940446 systemd[1]: Started Journal Service. Jan 22 00:25:12.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:12.951663 systemd[1]: Mounted Huge Pages File System. Jan 22 00:25:12.962409 systemd[1]: Mounted POSIX Message Queue File System. Jan 22 00:25:12.974655 systemd[1]: Mounted External Media Directory. Jan 22 00:25:12.985782 systemd[1]: Mounted Kernel Debug File System. Jan 22 00:25:12.997081 systemd[1]: Mounted Kernel Trace File System. Jan 22 00:25:13.008047 systemd[1]: Mounted Temporary Directory /tmp. Jan 22 00:25:13.020695 systemd[1]: Finished Create missing system files. Jan 22 00:25:13.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:13.040579 systemd[1]: Finished Create List of Static Device Nodes. Jan 22 00:25:13.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:13.058501 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jan 22 00:25:13.077982 systemd[1]: Finished Load Kernel Module configfs. Jan 22 00:25:13.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:13.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:13.094622 systemd[1]: modprobe@drm.service: Deactivated successfully. Jan 22 00:25:13.095103 systemd[1]: Finished Load Kernel Module drm. Jan 22 00:25:13.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:13.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:13.109063 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jan 22 00:25:13.110525 systemd[1]: Finished Load Kernel Module fuse. Jan 22 00:25:13.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:13.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:13.125834 systemd[1]: Finished Remount Root and Kernel File Systems. Jan 22 00:25:13.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:13.144483 systemd[1]: Finished Apply Kernel Variables. Jan 22 00:25:13.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:13.177346 systemd[1]: Mounting FUSE Control File System... Jan 22 00:25:13.196748 systemd[1]: Mounting Kernel Configuration File System... Jan 22 00:25:13.212610 systemd[1]: Condition check resulted in Remount Root File System being skipped. Jan 22 00:25:13.227613 systemd[1]: Starting Rebuild Hardware Database... Jan 22 00:25:13.240732 systemd[1]: Starting Flush Journal to Persistent Storage... Jan 22 00:25:13.256727 systemd[1]: Condition check resulted in Platform Persistent Storage Archival being skipped. Jan 22 00:25:13.261701 systemd-journald[780]: Time spent on flushing to /var/log/journal/22650f9910aa4127a8f82257a2f615fa is 42.200ms for 1000 entries. Jan 22 00:25:13.261701 systemd-journald[780]: System Journal (/var/log/journal/22650f9910aa4127a8f82257a2f615fa) is 8.0M, max 203.0M, 195.0M free. Jan 22 00:25:13.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:13.261070 systemd[1]: Starting Load/Save Random Seed... Jan 22 00:25:13.299811 systemd[1]: Starting Create System Users... Jan 22 00:25:13.320641 systemd[1]: Finished Coldplug All udev Devices. Jan 22 00:25:13.339615 systemd[1]: Mounted FUSE Control File System. Jan 22 00:25:13.357057 systemd[1]: Mounted Kernel Configuration File System. Jan 22 00:25:13.377065 systemd[1]: Finished Flush Journal to Persistent Storage. Jan 22 00:25:13.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:13.398647 systemd[1]: Finished Load/Save Random Seed. Jan 22 00:25:13.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:13.416994 systemd[1]: Reached target First Boot Complete. Jan 22 00:25:13.440442 systemd[1]: Starting Wait for udev To Complete Device Initialization... Jan 22 00:25:13.460653 systemd-sysusers[792]: Creating group sgx with gid 999. Jan 22 00:25:13.465331 systemd-sysusers[792]: Creating group systemd-oom with gid 998. Jan 22 00:25:13.468698 systemd-sysusers[792]: Creating user systemd-oom (systemd Userspace OOM Killer) with uid 998 and gid 998. Jan 22 00:25:13.472603 systemd-sysusers[792]: Creating group systemd-timesync with gid 997. Jan 22 00:25:13.476032 systemd-sysusers[792]: Creating user systemd-timesync (systemd Time Synchronization) with uid 997 and gid 997. Jan 22 00:25:13.481021 systemd-sysusers[792]: Creating group systemd-coredump with gid 996. Jan 22 00:25:13.486484 systemd-sysusers[792]: Creating user systemd-coredump (systemd Core Dumper) with uid 996 and gid 996. Jan 22 00:25:13.577578 systemd[1]: Finished Create System Users. Jan 22 00:25:13.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:13.609704 systemd[1]: Starting Create Static Device Nodes in /dev... Jan 22 00:25:13.763682 systemd[1]: Finished Create Static Device Nodes in /dev. Jan 22 00:25:13.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:14.989608 systemd[1]: Finished Rebuild Hardware Database. Jan 22 00:25:15.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:15.013000 audit: BPF prog-id=27 op=LOAD Jan 22 00:25:15.015000 audit: BPF prog-id=28 op=LOAD Jan 22 00:25:15.018000 audit: BPF prog-id=29 op=LOAD Jan 22 00:25:15.019000 audit: BPF prog-id=13 op=UNLOAD Jan 22 00:25:15.019000 audit: BPF prog-id=14 op=UNLOAD Jan 22 00:25:15.021444 systemd[1]: Starting Rule-based Manager for Device Events and Files... Jan 22 00:25:15.328630 systemd[1]: Started Rule-based Manager for Device Events and Files. Jan 22 00:25:15.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:15.363000 audit: BPF prog-id=30 op=LOAD Jan 22 00:25:15.365809 systemd[1]: Starting Network Configuration... Jan 22 00:25:15.424509 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Jan 22 00:25:15.443353 kernel: ACPI: Power Button [PWRF] Jan 22 00:25:15.541599 systemd-udevd[805]: Using default interface naming scheme 'v249'. Jan 22 00:25:15.565000 audit[804]: AVC avc: denied { confidentiality } for pid=804 comm="systemd-udevd" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jan 22 00:25:15.651471 systemd-networkd[811]: lo: Link UP Jan 22 00:25:15.651483 systemd-networkd[811]: lo: Gained carrier Jan 22 00:25:15.653479 systemd-networkd[811]: Enumeration completed Jan 22 00:25:15.654003 systemd[1]: Started Network Configuration. Jan 22 00:25:15.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:15.677561 systemd-networkd[811]: eth0: Link UP Jan 22 00:25:15.684051 systemd-networkd[811]: eth0: Gained carrier Jan 22 00:25:15.699373 systemd-networkd[811]: eth0: DHCPv4 address 10.0.0.3/16 via 10.0.0.1 Jan 22 00:25:15.812655 udevadm[796]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jan 22 00:25:15.877625 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Jan 22 00:25:15.935826 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Jan 22 00:25:15.936390 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Jan 22 00:25:15.955763 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Jan 22 00:25:15.978550 kernel: mousedev: PS/2 mouse device common for all mice Jan 22 00:25:16.337455 kernel: kvm: Nested Virtualization enabled Jan 22 00:25:16.337663 kernel: SVM: kvm: Nested Paging enabled Jan 22 00:25:16.337692 kernel: SVM: Virtual VMLOAD VMSAVE supported Jan 22 00:25:16.370482 kernel: EDAC MC: Ver: 3.0.0 Jan 22 00:25:17.269532 systemd[1]: Finished Wait for udev To Complete Device Initialization. Jan 22 00:25:17.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:17.310731 kernel: kauditd_printk_skb: 36 callbacks suppressed Jan 22 00:25:17.310996 kernel: audit: type=1130 audit(1769041517.290:141): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:17.382860 systemd[1]: Starting Activation of LVM2 logical volumes... Jan 22 00:25:17.515737 systemd-networkd[811]: eth0: Gained IPv6LL Jan 22 00:25:17.640742 lvm[829]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jan 22 00:25:17.800569 systemd[1]: Finished Activation of LVM2 logical volumes. Jan 22 00:25:17.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:17.814752 systemd[1]: Reached target Local Encrypted Volumes. Jan 22 00:25:17.892738 kernel: audit: type=1130 audit(1769041517.813:142): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:17.900855 systemd[1]: Starting Activation of LVM2 logical volumes... Jan 22 00:25:17.939361 lvm[830]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jan 22 00:25:17.981060 systemd[1]: Finished Activation of LVM2 logical volumes. Jan 22 00:25:17.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:17.996815 systemd[1]: Reached target Preparation for Local File Systems. Jan 22 00:25:18.069505 kernel: audit: type=1130 audit(1769041517.995:143): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:18.083424 systemd[1]: Condition check resulted in Virtual Machine and Container Storage (Compatibility) being skipped. Jan 22 00:25:18.083614 systemd[1]: Reached target Containers. Jan 22 00:25:18.105087 systemd[1]: Starting File System Check on /dev/disk/by-label/OEM... Jan 22 00:25:18.203005 systemd[1]: Finished File System Check on /dev/disk/by-label/OEM. Jan 22 00:25:18.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:18.297515 kernel: audit: type=1130 audit(1769041518.219:144): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:18.305402 systemd[1]: Mounting /usr/share/oem... Jan 22 00:25:18.375809 kernel: BTRFS info (device vda6): disk space caching is enabled Jan 22 00:25:18.376975 kernel: BTRFS info (device vda6): has skinny extents Jan 22 00:25:18.441839 systemd[1]: Mounted /usr/share/oem. Jan 22 00:25:18.457679 systemd[1]: Reached target Local File Systems. Jan 22 00:25:18.492637 systemd[1]: Starting Rebuild Dynamic Linker Cache... Jan 22 00:25:18.514695 systemd[1]: Condition check resulted in Set Up Additional Binary Formats being skipped. Jan 22 00:25:18.515367 systemd[1]: Condition check resulted in Store a System Token in an EFI Variable being skipped. Jan 22 00:25:18.536721 systemd[1]: Starting Commit a transient machine-id on disk... Jan 22 00:25:18.559755 systemd[1]: Starting Create Volatile Files and Directories... Jan 22 00:25:18.586604 systemd-tmpfiles[855]: /usr/lib64/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jan 22 00:25:18.588600 systemd-tmpfiles[855]: /usr/lib64/tmpfiles.d/systemd.conf:33: Duplicate line for path "/var/lib/systemd", ignoring. Jan 22 00:25:18.649489 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jan 22 00:25:18.650793 systemd[1]: Finished Commit a transient machine-id on disk. Jan 22 00:25:18.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:18.741520 kernel: audit: type=1130 audit(1769041518.648:145): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:18.758354 systemd-tmpfiles[855]: Detected autofs mount point /boot during canonicalization of /boot. Jan 22 00:25:18.758469 systemd-tmpfiles[855]: Skipping /boot Jan 22 00:25:18.773408 systemd-tmpfiles[855]: Detected autofs mount point /boot during canonicalization of /boot. Jan 22 00:25:18.773530 systemd-tmpfiles[855]: Skipping /boot Jan 22 00:25:18.892718 systemd[1]: Finished Create Volatile Files and Directories. Jan 22 00:25:18.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:18.980555 kernel: audit: type=1130 audit(1769041518.910:146): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:18.992753 systemd[1]: Starting Load Security Auditing Rules... Jan 22 00:25:19.013058 systemd[1]: Starting Clean up broken links in /etc/ssl/certs... Jan 22 00:25:19.029681 systemd[1]: Starting Rebuild Journal Catalog... Jan 22 00:25:19.045000 audit: BPF prog-id=31 op=LOAD Jan 22 00:25:19.050533 systemd[1]: Starting Network Name Resolution... Jan 22 00:25:19.077354 kernel: audit: type=1334 audit(1769041519.045:147): prog-id=31 op=LOAD Jan 22 00:25:19.100000 audit: BPF prog-id=32 op=LOAD Jan 22 00:25:19.108351 systemd[1]: Starting Network Time Synchronization... Jan 22 00:25:19.126757 kernel: audit: type=1334 audit(1769041519.100:148): prog-id=32 op=LOAD Jan 22 00:25:19.158102 systemd[1]: Starting Record System Boot/Shutdown in UTMP... Jan 22 00:25:19.172106 systemd[1]: Finished Clean up broken links in /etc/ssl/certs. Jan 22 00:25:19.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:19.255344 kernel: audit: type=1130 audit(1769041519.186:149): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:19.255463 kernel: audit: type=1127 audit(1769041519.235:150): pid=867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib64/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jan 22 00:25:19.235000 audit[867]: SYSTEM_BOOT pid=867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib64/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jan 22 00:25:19.187015 systemd[1]: Condition check resulted in Update CA bundle at /etc/ssl/certs/ca-certificates.crt being skipped. Jan 22 00:25:19.243616 systemd[1]: Finished Record System Boot/Shutdown in UTMP. Jan 22 00:25:19.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:19.352566 systemd[1]: Finished Rebuild Journal Catalog. Jan 22 00:25:19.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:19.410000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jan 22 00:25:19.411469 augenrules[876]: No rules Jan 22 00:25:19.414561 systemd[1]: Finished Load Security Auditing Rules. Jan 22 00:25:19.541475 systemd[1]: Started Network Time Synchronization. Jan 22 00:25:19.554601 systemd[1]: Reached target System Time Set. Jan 22 00:25:19.569592 systemd-timesyncd[866]: Initial synchronization to time server 10.0.0.1:123 (10.0.0.1). Jan 22 00:25:19.621825 systemd-resolved[860]: Positive Trust Anchors: Jan 22 00:25:19.622020 systemd-resolved[860]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jan 22 00:25:19.622044 systemd-resolved[860]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jan 22 00:25:19.629756 systemd-resolved[860]: Defaulting to hostname 'linux'. Jan 22 00:25:19.634064 systemd[1]: Started Network Name Resolution. Jan 22 00:25:19.650516 systemd[1]: Reached target Network. Jan 22 00:25:19.664623 systemd[1]: Reached target Host and Network Name Lookups. Jan 22 00:25:20.568651 systemd[1]: Finished Rebuild Dynamic Linker Cache. Jan 22 00:25:20.591756 systemd[1]: Starting Update is Completed... Jan 22 00:25:20.664023 systemd[1]: Finished Update is Completed. Jan 22 00:25:20.680585 systemd[1]: Reached target System Initialization. Jan 22 00:25:20.697345 systemd[1]: Started Watch for update engine configuration changes. Jan 22 00:25:20.716539 systemd[1]: Started Watch for a cloud-config at /var/lib/flatcar-install/user_data. Jan 22 00:25:20.736783 systemd[1]: Started Daily Log Rotation. Jan 22 00:25:20.751394 systemd[1]: Started Weekly check for MD array's redundancy information.. Jan 22 00:25:20.769905 systemd[1]: Started Daily Cleanup of Temporary Directories. Jan 22 00:25:20.789546 systemd[1]: Condition check resulted in Update Engine Stub Timer being skipped. Jan 22 00:25:20.789714 systemd[1]: Reached target Path Units. Jan 22 00:25:20.803813 systemd[1]: Reached target Timer Units. Jan 22 00:25:20.819468 systemd[1]: Listening on D-Bus System Message Bus Socket. Jan 22 00:25:20.845681 systemd[1]: Starting Docker Socket for the API... Jan 22 00:25:20.871413 systemd[1]: Listening on OpenSSH Server Socket. Jan 22 00:25:20.889522 systemd[1]: Listening on Docker Socket for the API. Jan 22 00:25:20.904598 systemd[1]: Reached target Socket Units. Jan 22 00:25:20.917936 systemd[1]: Reached target Basic System. Jan 22 00:25:20.932035 systemd[1]: Condition check resulted in Configure Addon /usr/share/oem being skipped. Jan 22 00:25:20.932476 systemd[1]: Condition check resulted in Run Addon /usr/share/oem being skipped. Jan 22 00:25:20.945755 systemd[1]: Started D-Bus System Message Bus. Jan 22 00:25:20.965646 systemd[1]: Starting Extend Filesystems... Jan 22 00:25:20.976570 systemd[1]: Condition check resulted in Modifies /etc/environment for CoreOS being skipped. Jan 22 00:25:20.979931 systemd[1]: Starting Generate /run/flatcar/motd... Jan 22 00:25:20.997952 systemd[1]: Starting Install an ssh key from /proc/cmdline... Jan 22 00:25:21.019051 systemd[1]: Starting Generate sshd host keys... Jan 22 00:25:21.030990 systemd[1]: Condition check resulted in Load cloud-config from /usr/share/oem/cloud-config.yml being skipped. Jan 22 00:25:21.031308 systemd[1]: Reached target Load system-provided cloud configs. Jan 22 00:25:21.043753 extend-filesystems[886]: Found sr0 Jan 22 00:25:21.055924 extend-filesystems[886]: Found vda Jan 22 00:25:21.055924 extend-filesystems[886]: Found vda1 Jan 22 00:25:21.055924 extend-filesystems[886]: Found vda2 Jan 22 00:25:21.055924 extend-filesystems[886]: Found vda3 Jan 22 00:25:21.055924 extend-filesystems[886]: Found usr Jan 22 00:25:21.055924 extend-filesystems[886]: Found vda4 Jan 22 00:25:21.055924 extend-filesystems[886]: Found vda6 Jan 22 00:25:21.055924 extend-filesystems[886]: Found vda7 Jan 22 00:25:21.055924 extend-filesystems[886]: Found vda9 Jan 22 00:25:21.055924 extend-filesystems[886]: Checking size of /dev/vda9 Jan 22 00:25:21.159416 systemd[1]: Starting User Login Management... Jan 22 00:25:21.169022 systemd[1]: Condition check resulted in TCG Core Services Daemon being skipped. Jan 22 00:25:21.172848 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jan 22 00:25:21.177792 systemd[1]: Starting Update Engine... Jan 22 00:25:21.183672 extend-filesystems[886]: Old size kept for /dev/vda9 Jan 22 00:25:21.187033 systemd[1]: Condition check resulted in Load cloud-config from url defined in /proc/cmdline being skipped. Jan 22 00:25:21.191859 systemd[1]: Reached target Load user-provided cloud configs. Jan 22 00:25:21.219716 systemd[1]: extend-filesystems.service: Deactivated successfully. Jan 22 00:25:21.220444 systemd[1]: Finished Extend Filesystems. Jan 22 00:25:21.236695 systemd[1]: motdgen.service: Deactivated successfully. Jan 22 00:25:21.237621 systemd[1]: Finished Generate /run/flatcar/motd. Jan 22 00:25:21.361655 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jan 22 00:25:21.362578 systemd[1]: Finished Install an ssh key from /proc/cmdline. Jan 22 00:25:21.505942 systemd-logind[903]: Watching system buttons on /dev/input/event1 (Power Button) Jan 22 00:25:21.507469 systemd-logind[903]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jan 22 00:25:21.514456 systemd-logind[903]: New seat seat0. Jan 22 00:25:21.549680 systemd[1]: Started User Login Management. Jan 22 00:25:21.714069 update_engine[906]: I0122 00:25:21.711011 906 main.cc:89] Flatcar Update Engine starting Jan 22 00:25:21.727001 systemd[1]: Started Update Engine. Jan 22 00:25:21.729879 update_engine[906]: I0122 00:25:21.729723 906 update_check_scheduler.cc:74] Next update check in 11m52s Jan 22 00:25:21.754124 systemd[1]: Started Cluster reboot manager. Jan 22 00:25:21.967865 sshd_keygen[902]: ssh-keygen: generating new host keys: RSA DSA ECDSA ED25519 Jan 22 00:25:22.049919 systemd[1]: Finished Generate sshd host keys. Jan 22 00:25:22.102916 systemd[1]: Starting Generate /run/issue... Jan 22 00:25:22.142524 systemd[1]: issuegen.service: Deactivated successfully. Jan 22 00:25:22.143375 systemd[1]: Finished Generate /run/issue. Jan 22 00:25:22.191730 systemd[1]: Starting Permit User Sessions... Jan 22 00:25:22.240833 systemd[1]: Finished Permit User Sessions. Jan 22 00:25:22.264946 locksmithd[918]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jan 22 00:25:22.279744 systemd[1]: Started Getty on tty1. Jan 22 00:25:22.303129 systemd[1]: Started Serial Getty on ttyS0. Jan 22 00:25:22.327810 systemd[1]: Reached target Login Prompts. Jan 22 00:25:22.338107 systemd[1]: Reached target Multi-User System. Jan 22 00:25:22.363575 systemd[1]: Starting Record Runlevel Change in UTMP... Jan 22 00:25:22.389032 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jan 22 00:25:22.389980 systemd[1]: Finished Record Runlevel Change in UTMP. Jan 22 00:25:22.402704 systemd[1]: Startup finished in 7.580s (kernel) + 13.146s (initrd) + 21.359s (userspace) = 42.086s. Jan 22 00:25:26.153952 systemd[1]: Created slice Slice /system/sshd. Jan 22 00:25:26.156608 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:42714). Jan 22 00:25:26.354492 sshd[940]: Accepted publickey for core from 10.0.0.1 port 42714 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:25:26.364828 sshd[940]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:25:26.427602 systemd[1]: Created slice User Slice of UID 500. Jan 22 00:25:26.430736 systemd[1]: Starting User Runtime Directory /run/user/500... Jan 22 00:25:26.436428 systemd-logind[903]: New session 1 of user core. Jan 22 00:25:26.472572 systemd[1]: Finished User Runtime Directory /run/user/500. Jan 22 00:25:26.487998 systemd[1]: Starting User Manager for UID 500... Jan 22 00:25:26.498109 systemd[943]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:25:26.679843 systemd[943]: Queued start job for default target Main User Target. Jan 22 00:25:26.680859 systemd[943]: Reached target Paths. Jan 22 00:25:26.680884 systemd[943]: Reached target Sockets. Jan 22 00:25:26.680901 systemd[943]: Reached target Timers. Jan 22 00:25:26.680919 systemd[943]: Reached target Basic System. Jan 22 00:25:26.680990 systemd[943]: Reached target Main User Target. Jan 22 00:25:26.681008 systemd[943]: Startup finished in 158ms. Jan 22 00:25:26.681593 systemd[1]: Started User Manager for UID 500. Jan 22 00:25:26.688637 systemd[1]: Started Session 1 of User core. Jan 22 00:25:26.796015 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:42718). Jan 22 00:25:26.895952 sshd[952]: Accepted publickey for core from 10.0.0.1 port 42718 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:25:26.901713 sshd[952]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:25:26.921394 systemd-logind[903]: New session 2 of user core. Jan 22 00:25:26.928473 systemd[1]: Started Session 2 of User core. Jan 22 00:25:27.087837 sshd[952]: pam_unix(sshd:session): session closed for user core Jan 22 00:25:27.108745 systemd[1]: sshd@1-10.0.0.3:22-10.0.0.1:42718.service: Deactivated successfully. Jan 22 00:25:27.111887 systemd[1]: session-2.scope: Deactivated successfully. Jan 22 00:25:27.118622 systemd-logind[903]: Session 2 logged out. Waiting for processes to exit. Jan 22 00:25:27.128052 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:42722). Jan 22 00:25:27.131911 systemd-logind[903]: Removed session 2. Jan 22 00:25:27.191111 sshd[958]: Accepted publickey for core from 10.0.0.1 port 42722 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:25:27.193983 sshd[958]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:25:27.216347 systemd-logind[903]: New session 3 of user core. Jan 22 00:25:27.222931 systemd[1]: Started Session 3 of User core. Jan 22 00:25:27.336070 sshd[958]: pam_unix(sshd:session): session closed for user core Jan 22 00:25:27.345744 systemd[1]: sshd@2-10.0.0.3:22-10.0.0.1:42722.service: Deactivated successfully. Jan 22 00:25:27.347090 systemd[1]: session-3.scope: Deactivated successfully. Jan 22 00:25:27.352671 systemd-logind[903]: Session 3 logged out. Waiting for processes to exit. Jan 22 00:25:27.355019 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:42724). Jan 22 00:25:27.362834 systemd-logind[903]: Removed session 3. Jan 22 00:25:27.415694 sshd[964]: Accepted publickey for core from 10.0.0.1 port 42724 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:25:27.419989 sshd[964]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:25:27.435799 systemd-logind[903]: New session 4 of user core. Jan 22 00:25:27.446701 systemd[1]: Started Session 4 of User core. Jan 22 00:25:27.572561 sshd[964]: pam_unix(sshd:session): session closed for user core Jan 22 00:25:27.584013 systemd[1]: sshd@3-10.0.0.3:22-10.0.0.1:42724.service: Deactivated successfully. Jan 22 00:25:27.585777 systemd[1]: session-4.scope: Deactivated successfully. Jan 22 00:25:27.590998 systemd-logind[903]: Session 4 logged out. Waiting for processes to exit. Jan 22 00:25:27.594607 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:42732). Jan 22 00:25:27.605550 systemd-logind[903]: Removed session 4. Jan 22 00:25:27.661731 sshd[970]: Accepted publickey for core from 10.0.0.1 port 42732 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:25:27.664838 sshd[970]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:25:27.679853 systemd-logind[903]: New session 5 of user core. Jan 22 00:25:27.688480 systemd[1]: Started Session 5 of User core. Jan 22 00:25:27.854596 sudo[973]: core : PWD=/home/core ; USER=root ; COMMAND=/sbin/setenforce 1 Jan 22 00:25:27.855061 sudo[973]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:25:27.886409 sudo[973]: pam_unix(sudo:session): session closed for user root Jan 22 00:25:27.896973 sshd[970]: pam_unix(sshd:session): session closed for user core Jan 22 00:25:27.911785 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:42744). Jan 22 00:25:27.916853 dbus-daemon[885]: [system] Reloaded configuration Jan 22 00:25:27.924884 systemd[1]: sshd@4-10.0.0.3:22-10.0.0.1:42732.service: Deactivated successfully. Jan 22 00:25:27.928652 systemd[1]: session-5.scope: Deactivated successfully. Jan 22 00:25:27.935536 systemd-logind[903]: Session 5 logged out. Waiting for processes to exit. Jan 22 00:25:27.944756 systemd-logind[903]: Removed session 5. Jan 22 00:25:27.969786 sshd[976]: Accepted publickey for core from 10.0.0.1 port 42744 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:25:27.972065 sshd[976]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:25:27.989469 systemd-logind[903]: New session 6 of user core. Jan 22 00:25:27.996344 systemd[1]: Started Session 6 of User core. Jan 22 00:25:28.127750 sudo[981]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jan 22 00:25:28.128488 sudo[981]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:25:28.154012 sudo[981]: pam_unix(sudo:session): session closed for user root Jan 22 00:25:28.172413 sudo[980]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/systemctl restart audit-rules Jan 22 00:25:28.172767 sudo[980]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:25:28.213697 systemd[1]: Stopping Load Security Auditing Rules... Jan 22 00:25:28.226000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jan 22 00:25:28.230820 auditctl[984]: No rules Jan 22 00:25:28.232840 systemd[1]: audit-rules.service: Deactivated successfully. Jan 22 00:25:28.234038 systemd[1]: Stopped Load Security Auditing Rules. Jan 22 00:25:28.246585 kernel: kauditd_printk_skb: 3 callbacks suppressed Jan 22 00:25:28.246668 kernel: audit: type=1305 audit(1769041528.226:154): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jan 22 00:25:28.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:28.355928 kernel: audit: type=1131 audit(1769041528.233:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:28.368539 systemd[1]: Starting Load Security Auditing Rules... Jan 22 00:25:28.502716 augenrules[1001]: No rules Jan 22 00:25:28.506477 systemd[1]: Finished Load Security Auditing Rules. Jan 22 00:25:28.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:28.509470 sudo[980]: pam_unix(sudo:session): session closed for user root Jan 22 00:25:28.514545 sshd[976]: pam_unix(sshd:session): session closed for user core Jan 22 00:25:28.507000 audit[980]: USER_END pid=980 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:25:28.649708 kernel: audit: type=1130 audit(1769041528.506:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:28.649822 kernel: audit: type=1106 audit(1769041528.507:157): pid=980 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:25:28.649850 kernel: audit: type=1104 audit(1769041528.507:158): pid=980 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:25:28.507000 audit[980]: CRED_DISP pid=980 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:25:28.717553 kernel: audit: type=1106 audit(1769041528.507:159): pid=976 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:28.507000 audit[976]: USER_END pid=976 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:28.507000 audit[976]: CRED_DISP pid=976 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:28.884698 kernel: audit: type=1104 audit(1769041528.507:160): pid=976 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:28.892765 systemd[1]: sshd@5-10.0.0.3:22-10.0.0.1:42744.service: Deactivated successfully. Jan 22 00:25:28.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.3:22-10.0.0.1:42744 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:28.894941 systemd[1]: session-6.scope: Deactivated successfully. Jan 22 00:25:28.896962 systemd-logind[903]: Session 6 logged out. Waiting for processes to exit. Jan 22 00:25:28.899445 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:42746). Jan 22 00:25:28.903525 systemd-logind[903]: Removed session 6. Jan 22 00:25:28.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.3:22-10.0.0.1:42746 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:29.044075 kernel: audit: type=1131 audit(1769041528.892:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.3:22-10.0.0.1:42744 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:29.045579 kernel: audit: type=1130 audit(1769041528.899:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.3:22-10.0.0.1:42746 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:29.066000 audit[1007]: USER_ACCT pid=1007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:29.067582 sshd[1007]: Accepted publickey for core from 10.0.0.1 port 42746 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:25:29.115041 sshd[1007]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:25:29.151526 systemd-logind[903]: New session 7 of user core. Jan 22 00:25:29.153772 kernel: audit: type=1101 audit(1769041529.066:163): pid=1007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:29.107000 audit[1007]: CRED_ACQ pid=1007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:29.161959 systemd[1]: Started Session 7 of User core. Jan 22 00:25:29.282000 audit[1007]: USER_START pid=1007 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:29.287000 audit[1009]: CRED_ACQ pid=1009 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:29.365000 audit[1010]: USER_ACCT pid=1010 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:25:29.366000 audit[1010]: CRED_REFR pid=1010 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:25:29.368019 sudo[1010]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/bash -c cat >/etc/coreos/update.conf.new </etc/coreos/update-payload-key.pub.pem </etc/coreos/update.conf.new </etc/coreos/update-payload-key.pub.pem < audit_backlog_limit=64 Jan 22 00:25:38.893777 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Jan 22 00:25:38.893793 kernel: audit: backlog limit exceeded Jan 22 00:25:38.893821 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jan 22 00:25:38.893834 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Jan 22 00:25:38.893848 kernel: audit: backlog limit exceeded Jan 22 00:25:38.893860 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jan 22 00:25:38.893873 kernel: audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 Jan 22 00:25:38.893887 kernel: audit: backlog limit exceeded Jan 22 00:25:39.329694 sudo[1191]: pam_unix(sudo:session): session closed for user root Jan 22 00:25:38.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.787000 audit: BPF prog-id=50 op=LOAD Jan 22 00:25:38.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.793000 audit: BPF prog-id=51 op=LOAD Jan 22 00:25:38.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.801000 audit: BPF prog-id=52 op=LOAD Jan 22 00:25:38.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.874000 audit: BPF prog-id=53 op=LOAD Jan 22 00:25:38.874000 audit: BPF prog-id=40 op=UNLOAD Jan 22 00:25:38.874000 audit: BPF prog-id=41 op=UNLOAD Jan 22 00:25:38.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.884000 audit: BPF prog-id=54 op=LOAD Jan 22 00:25:38.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jan 22 00:25:38.891000 audit: BPF prog-id=55 op=LOAD Jan 22 00:25:39.329000 audit[1191]: USER_END pid=1191 uid=500 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:25:39.364000 audit[1191]: CRED_DISP pid=1191 uid=500 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:25:39.375970 sshd[1188]: pam_unix(sshd:session): session closed for user core Jan 22 00:25:39.382000 audit[1188]: USER_END pid=1188 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:39.383000 audit[1188]: CRED_DISP pid=1188 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:39.397005 systemd[1]: sshd@20-10.0.0.3:22-10.0.0.1:36458.service: Deactivated successfully. Jan 22 00:25:39.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.3:22-10.0.0.1:36458 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:39.401823 systemd[1]: session-21.scope: Deactivated successfully. Jan 22 00:25:39.405587 systemd-logind[903]: Session 21 logged out. Waiting for processes to exit. Jan 22 00:25:39.408099 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:36482). Jan 22 00:25:39.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.3:22-10.0.0.1:36482 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:39.415107 systemd-logind[903]: Removed session 21. Jan 22 00:25:39.506000 audit[1254]: USER_ACCT pid=1254 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:39.512593 sshd[1254]: Accepted publickey for core from 10.0.0.1 port 36482 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:25:39.515000 audit[1254]: CRED_ACQ pid=1254 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:39.518397 sshd[1254]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:25:39.544786 systemd-logind[903]: New session 22 of user core. Jan 22 00:25:39.555686 systemd[1]: Started Session 22 of User core. Jan 22 00:25:39.602000 audit[1254]: USER_START pid=1254 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:39.611000 audit[1256]: CRED_ACQ pid=1256 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:39.687968 sudo[1257]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/systemctl reset-failed locksmithd.service Jan 22 00:25:39.688805 sudo[1257]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:25:39.686000 audit[1257]: USER_ACCT pid=1257 uid=500 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:25:39.687000 audit[1257]: CRED_REFR pid=1257 uid=500 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:25:39.703000 audit[1257]: USER_START pid=1257 uid=500 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:25:39.732027 sudo[1257]: pam_unix(sudo:session): session closed for user root Jan 22 00:25:39.732000 audit[1257]: USER_END pid=1257 uid=500 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:25:39.732000 audit[1257]: CRED_DISP pid=1257 uid=500 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:25:39.742483 sshd[1254]: pam_unix(sshd:session): session closed for user core Jan 22 00:25:39.745000 audit[1254]: USER_END pid=1254 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:39.745000 audit[1254]: CRED_DISP pid=1254 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:39.753598 systemd[1]: sshd@21-10.0.0.3:22-10.0.0.1:36482.service: Deactivated successfully. Jan 22 00:25:39.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.3:22-10.0.0.1:36482 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:39.756476 systemd[1]: session-22.scope: Deactivated successfully. Jan 22 00:25:39.759787 systemd-logind[903]: Session 22 logged out. Waiting for processes to exit. Jan 22 00:25:39.761884 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:36498). Jan 22 00:25:39.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.3:22-10.0.0.1:36498 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:39.771990 systemd-logind[903]: Removed session 22. Jan 22 00:25:39.830000 audit[1261]: USER_ACCT pid=1261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:39.832812 sshd[1261]: Accepted publickey for core from 10.0.0.1 port 36498 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:25:39.836000 audit[1261]: CRED_ACQ pid=1261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:39.840011 sshd[1261]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:25:39.864086 systemd-logind[903]: New session 23 of user core. Jan 22 00:25:39.871640 systemd[1]: Started Session 23 of User core. Jan 22 00:25:39.929000 audit[1261]: USER_START pid=1261 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:39.937000 audit[1263]: CRED_ACQ pid=1263 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:40.012892 sudo[1264]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/systemctl restart update-engine.service Jan 22 00:25:40.011000 audit[1264]: USER_ACCT pid=1264 uid=500 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:25:40.012000 audit[1264]: CRED_REFR pid=1264 uid=500 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:25:40.013639 sudo[1264]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:25:40.032000 audit[1264]: USER_START pid=1264 uid=500 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:25:40.061088 systemd[1]: Stopping Update Engine... Jan 22 00:25:40.065823 systemd[1]: update-engine.service: Main process exited, code=exited, status=1/FAILURE Jan 22 00:25:40.066060 systemd[1]: update-engine.service: Failed with result 'exit-code'. Jan 22 00:25:40.070000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=update-engine comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jan 22 00:25:40.071014 systemd[1]: Stopped Update Engine. Jan 22 00:25:40.085797 systemd[1]: Starting Update Engine... Jan 22 00:25:40.135366 update_engine[1266]: I0122 00:25:40.132547 1266 main.cc:89] Flatcar Update Engine starting Jan 22 00:25:40.144410 systemd[1]: Started Update Engine. Jan 22 00:25:40.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=update-engine comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:40.145366 update_engine[1266]: I0122 00:25:40.144972 1266 update_check_scheduler.cc:74] Next update check in 10m18s Jan 22 00:25:40.149578 sudo[1264]: pam_unix(sudo:session): session closed for user root Jan 22 00:25:40.150000 audit[1264]: USER_END pid=1264 uid=500 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:25:40.150000 audit[1264]: CRED_DISP pid=1264 uid=500 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:25:40.161011 sshd[1261]: pam_unix(sshd:session): session closed for user core Jan 22 00:25:40.174000 audit[1261]: USER_END pid=1261 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:40.175000 audit[1261]: CRED_DISP pid=1261 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:40.187635 systemd[1]: sshd@22-10.0.0.3:22-10.0.0.1:36498.service: Deactivated successfully. Jan 22 00:25:40.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.3:22-10.0.0.1:36498 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:40.192810 systemd[1]: session-23.scope: Deactivated successfully. Jan 22 00:25:40.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.3:22-10.0.0.1:36512 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:40.198730 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:36512). Jan 22 00:25:40.200811 systemd-logind[903]: Session 23 logged out. Waiting for processes to exit. Jan 22 00:25:40.210585 systemd-logind[903]: Removed session 23. Jan 22 00:25:40.279000 audit[1269]: USER_ACCT pid=1269 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:40.282712 sshd[1269]: Accepted publickey for core from 10.0.0.1 port 36512 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:25:40.284000 audit[1269]: CRED_ACQ pid=1269 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:40.288600 sshd[1269]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:25:40.309787 systemd-logind[903]: New session 24 of user core. Jan 22 00:25:40.318893 systemd[1]: Started Session 24 of User core. Jan 22 00:25:40.381000 audit[1269]: USER_START pid=1269 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:40.383000 audit[1271]: CRED_ACQ pid=1271 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:40.492370 update_engine[1266]: I0122 00:25:40.491999 1266 dbus_service.cc:57] Attempting interactive update Jan 22 00:25:40.492490 update_engine[1266]: I0122 00:25:40.492446 1266 update_attempter.cc:275] New update check requested Jan 22 00:25:40.494895 update_engine[1266]: I0122 00:25:40.494755 1266 prefs.cc:51] aleph-version not present in /var/lib/update_engine/prefs Jan 22 00:25:40.497589 update_engine[1266]: I0122 00:25:40.495874 1266 omaha_request_params.cc:62] Current group set to developer Jan 22 00:25:40.499736 update_engine[1266]: I0122 00:25:40.498493 1266 update_attempter.cc:505] Updating boot flags... Jan 22 00:25:40.510387 sshd[1269]: pam_unix(sshd:session): session closed for user core Jan 22 00:25:40.514000 audit[1269]: USER_END pid=1269 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:40.514000 audit[1269]: CRED_DISP pid=1269 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:40.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.3:22-10.0.0.1:36512 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:40.520558 systemd[1]: sshd@23-10.0.0.3:22-10.0.0.1:36512.service: Deactivated successfully. Jan 22 00:25:40.523063 systemd[1]: session-24.scope: Deactivated successfully. Jan 22 00:25:40.527015 systemd-logind[903]: Session 24 logged out. Waiting for processes to exit. Jan 22 00:25:40.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.3:22-10.0.0.1:36520 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:40.531932 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:36520). Jan 22 00:25:40.536036 systemd-logind[903]: Removed session 24. Jan 22 00:25:40.610000 audit[1279]: USER_ACCT pid=1279 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:40.613745 sshd[1279]: Accepted publickey for core from 10.0.0.1 port 36520 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:25:40.612000 audit[1279]: CRED_ACQ pid=1279 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:40.614607 sshd[1279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:25:40.636727 systemd-logind[903]: New session 25 of user core. Jan 22 00:25:40.641533 update_engine[1266]: I0122 00:25:40.641505 1266 update_attempter.cc:638] Scheduling an action processor start. Jan 22 00:25:40.641643 update_engine[1266]: I0122 00:25:40.641630 1266 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Jan 22 00:25:40.641739 update_engine[1266]: I0122 00:25:40.641726 1266 prefs.cc:51] previous-version not present in /var/lib/update_engine/prefs Jan 22 00:25:40.643532 update_engine[1266]: I0122 00:25:40.641860 1266 omaha_request_action.cc:268] Posting an Omaha request to http://10.0.0.2:34567/v1/update Jan 22 00:25:40.643532 update_engine[1266]: I0122 00:25:40.642522 1266 omaha_request_action.cc:269] Request: Jan 22 00:25:40.643532 update_engine[1266]: Jan 22 00:25:40.643532 update_engine[1266]: Jan 22 00:25:40.643532 update_engine[1266]: Jan 22 00:25:40.643532 update_engine[1266]: Jan 22 00:25:40.643532 update_engine[1266]: Jan 22 00:25:40.643532 update_engine[1266]: Jan 22 00:25:40.643532 update_engine[1266]: Jan 22 00:25:40.643532 update_engine[1266]: Jan 22 00:25:40.643532 update_engine[1266]: I0122 00:25:40.642535 1266 libcurl_http_fetcher.cc:48] Starting/Resuming transfer Jan 22 00:25:40.644408 systemd[1]: Started Session 25 of User core. Jan 22 00:25:40.656974 update_engine[1266]: I0122 00:25:40.656814 1266 libcurl_http_fetcher.cc:152] Setting up curl options for HTTP Jan 22 00:25:40.659762 update_engine[1266]: I0122 00:25:40.659413 1266 libcurl_http_fetcher.cc:435] Setting up timeout source: 1 seconds. Jan 22 00:25:40.678536 update_engine[1266]: I0122 00:25:40.678002 1266 libcurl_http_fetcher.cc:248] HTTP response code: 200 Jan 22 00:25:40.680525 update_engine[1266]: I0122 00:25:40.679556 1266 libcurl_http_fetcher.cc:305] Transfer completed (200), 791 bytes downloaded Jan 22 00:25:40.680525 update_engine[1266]: I0122 00:25:40.679705 1266 omaha_request_action.cc:619] Omaha request response: Jan 22 00:25:40.680525 update_engine[1266]: Jan 22 00:25:40.680525 update_engine[1266]: Jan 22 00:25:40.680525 update_engine[1266]: Jan 22 00:25:40.680525 update_engine[1266]: Jan 22 00:25:40.680525 update_engine[1266]: Jan 22 00:25:40.680525 update_engine[1266]: Jan 22 00:25:40.680525 update_engine[1266]: Jan 22 00:25:40.680525 update_engine[1266]: Jan 22 00:25:40.680525 update_engine[1266]: Jan 22 00:25:40.680525 update_engine[1266]: Jan 22 00:25:40.680525 update_engine[1266]: Jan 22 00:25:40.680525 update_engine[1266]: Jan 22 00:25:40.680525 update_engine[1266]: Jan 22 00:25:40.680525 update_engine[1266]: Jan 22 00:25:40.680525 update_engine[1266]: Jan 22 00:25:40.680525 update_engine[1266]: Jan 22 00:25:40.680525 update_engine[1266]: Jan 22 00:25:40.680525 update_engine[1266]: Jan 22 00:25:40.680525 update_engine[1266]: Jan 22 00:25:40.680525 update_engine[1266]: Jan 22 00:25:40.697762 update_engine[1266]: I0122 00:25:40.696913 1266 omaha_request_action.cc:447] Omaha Response manifest version = Jan 22 00:25:40.697762 update_engine[1266]: I0122 00:25:40.697077 1266 omaha_request_action.cc:470] Found 1 url(s) Jan 22 00:25:40.697762 update_engine[1266]: I0122 00:25:40.697098 1266 omaha_request_action.cc:506] Processing first of 1 package(s) Jan 22 00:25:40.697762 update_engine[1266]: I0122 00:25:40.697103 1266 omaha_request_action.cc:513] Omaha Response package name = update.gz Jan 22 00:25:40.697762 update_engine[1266]: I0122 00:25:40.697106 1266 omaha_request_action.cc:529] Url0: http://10.0.0.2:34567/packages/update.gz Jan 22 00:25:40.697762 update_engine[1266]: I0122 00:25:40.697113 1266 omaha_request_action.cc:541] Payload size = 476598679 bytes Jan 22 00:25:40.697762 update_engine[1266]: I0122 00:25:40.697413 1266 omaha_request_action.cc:565] Found 1 action(s). Processing the postinstall action. Jan 22 00:25:40.697762 update_engine[1266]: I0122 00:25:40.697428 1266 payload_state.cc:51] Resetting all persisted state as this is a new response Jan 22 00:25:40.697762 update_engine[1266]: I0122 00:25:40.697433 1266 payload_state.cc:360] Current Response Signature = Jan 22 00:25:40.697762 update_engine[1266]: NumURLs = 1 Jan 22 00:25:40.697762 update_engine[1266]: Url0 = http://10.0.0.2:34567/packages/update.gz Jan 22 00:25:40.697762 update_engine[1266]: Payload Size = 476598679 Jan 22 00:25:40.697762 update_engine[1266]: Payload Sha256 Hash = 2MvGJQEsuN7XYb1mTekG3w2j+zE2K1E6zdg6DjrmBms= Jan 22 00:25:40.697762 update_engine[1266]: Is Delta Payload = 0 Jan 22 00:25:40.697762 update_engine[1266]: Max Failure Count Per Url = 10 Jan 22 00:25:40.697762 update_engine[1266]: Disable Payload Backoff = 1 Jan 22 00:25:40.698760 update_engine[1266]: I0122 00:25:40.698019 1266 payload_state.cc:381] Payload Attempt Number = 0 Jan 22 00:25:40.698760 update_engine[1266]: I0122 00:25:40.698488 1266 payload_state.cc:404] Current URL Index = 0 Jan 22 00:25:40.703746 update_engine[1266]: I0122 00:25:40.698877 1266 payload_state.cc:425] Current URL (Url0)'s Failure Count = 0 Jan 22 00:25:40.703746 update_engine[1266]: I0122 00:25:40.699752 1266 payload_state.cc:287] Resetting backoff expiry time as payload backoff is disabled Jan 22 00:25:40.703746 update_engine[1266]: I0122 00:25:40.699761 1266 payload_state.cc:452] Backoff Expiry Time = 01/01/70 00:00:00 UTC Jan 22 00:25:40.703746 update_engine[1266]: I0122 00:25:40.699955 1266 payload_state.cc:203] Payload backoff logic is disabled. Can proceed with the download Jan 22 00:25:40.703746 update_engine[1266]: I0122 00:25:40.699972 1266 action_processor.cc:82] ActionProcessor::ActionComplete: finished OmahaRequestAction, starting OmahaResponseHandlerAction Jan 22 00:25:40.703746 update_engine[1266]: I0122 00:25:40.699978 1266 omaha_response_handler_action.cc:43] Using Url0 as the download url this time Jan 22 00:25:40.703746 update_engine[1266]: I0122 00:25:40.699996 1266 prefs.cc:51] update-state-next-operation not present in /var/lib/update_engine/prefs Jan 22 00:25:40.703746 update_engine[1266]: E0122 00:25:40.700002 1266 payload_processor.cc:488] prefs->GetInt64(kPrefsUpdateStateNextOperation, &next_operation) && next_operation != kUpdateStateOperationInvalid && next_operation > 0 failed. Jan 22 00:25:40.705866 update_engine[1266]: I0122 00:25:40.705463 1266 omaha_response_handler_action.cc:85] Using this install plan: Jan 22 00:25:40.705866 update_engine[1266]: I0122 00:25:40.705729 1266 install_plan.cc:53] InstallPlan: , new_update, url: http://10.0.0.2:34567/packages/update.gz, payload size: 476598679, payload hash: 2MvGJQEsuN7XYb1mTekG3w2j+zE2K1E6zdg6DjrmBms=, partition_path: /dev/vda4, kernel_path: /boot/flatcar/vmlinuz-b, pcr_policy_path: /var/lib/update_engine/pcrs-b.zip, old_partition_path: /dev/vda3, old_kernel_path: /boot/flatcar/vmlinuz-a Jan 22 00:25:40.705866 update_engine[1266]: I0122 00:25:40.705847 1266 action_processor.cc:82] ActionProcessor::ActionComplete: finished OmahaResponseHandlerAction, starting FilesystemCopierAction Jan 22 00:25:40.730832 update_engine[1266]: I0122 00:25:40.730762 1266 filesystem_copier_action.cc:296] Filesystem size: 1073741824 Jan 22 00:25:40.753000 audit[1279]: USER_START pid=1279 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:40.767000 audit[1294]: CRED_ACQ pid=1294 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:40.868767 sshd[1279]: pam_unix(sshd:session): session closed for user core Jan 22 00:25:40.987000 audit[1279]: USER_END pid=1279 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:40.987000 audit[1279]: CRED_DISP pid=1279 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:40.991084 systemd[1]: sshd@24-10.0.0.3:22-10.0.0.1:36520.service: Deactivated successfully. Jan 22 00:25:40.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.3:22-10.0.0.1:36520 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:40.993354 systemd[1]: session-25.scope: Deactivated successfully. Jan 22 00:25:40.996412 systemd-logind[903]: Session 25 logged out. Waiting for processes to exit. Jan 22 00:25:41.002644 systemd-logind[903]: Removed session 25. Jan 22 00:25:50.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.3:22-10.0.0.1:58372 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:50.913403 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:58372). Jan 22 00:25:50.935930 kernel: kauditd_printk_skb: 307 callbacks suppressed Jan 22 00:25:50.936454 kernel: audit: type=1130 audit(1769041550.912:629): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.3:22-10.0.0.1:58372 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:51.226537 sshd[1305]: Accepted publickey for core from 10.0.0.1 port 58372 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:25:51.224000 audit[1305]: USER_ACCT pid=1305 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:51.277881 sshd[1305]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:25:51.315022 systemd-logind[903]: New session 26 of user core. Jan 22 00:25:51.472985 kernel: audit: type=1101 audit(1769041551.224:630): pid=1305 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:51.473037 kernel: audit: type=1103 audit(1769041551.276:631): pid=1305 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:51.473074 kernel: audit: type=1006 audit(1769041551.276:632): pid=1305 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Jan 22 00:25:51.276000 audit[1305]: CRED_ACQ pid=1305 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:51.473003 systemd[1]: Started Session 26 of User core. Jan 22 00:25:51.527000 audit[1305]: USER_START pid=1305 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:51.545000 audit[1307]: CRED_ACQ pid=1307 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:51.660868 sshd[1305]: pam_unix(sshd:session): session closed for user core Jan 22 00:25:51.666807 systemd-logind[903]: Session 26 logged out. Waiting for processes to exit. Jan 22 00:25:51.669496 systemd[1]: sshd@25-10.0.0.3:22-10.0.0.1:58372.service: Deactivated successfully. Jan 22 00:25:51.670982 systemd[1]: session-26.scope: Deactivated successfully. Jan 22 00:25:51.676953 systemd-logind[903]: Removed session 26. Jan 22 00:25:51.754792 kernel: audit: type=1105 audit(1769041551.527:633): pid=1305 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:51.765539 kernel: audit: type=1103 audit(1769041551.545:634): pid=1307 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:51.765845 kernel: audit: type=1106 audit(1769041551.661:635): pid=1305 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:51.661000 audit[1305]: USER_END pid=1305 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:51.868439 kernel: audit: type=1104 audit(1769041551.661:636): pid=1305 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:51.661000 audit[1305]: CRED_DISP pid=1305 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:25:51.964734 kernel: audit: type=1131 audit(1769041551.668:637): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.3:22-10.0.0.1:58372 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:25:51.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.3:22-10.0.0.1:58372 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:26:01.747781 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:33054). Jan 22 00:26:01.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.3:22-10.0.0.1:33054 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:26:01.831091 kernel: audit: type=1130 audit(1769041561.747:638): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.3:22-10.0.0.1:33054 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:26:01.892000 audit[1312]: USER_ACCT pid=1312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:01.895026 sshd[1312]: Accepted publickey for core from 10.0.0.1 port 33054 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:26:02.012635 kernel: audit: type=1101 audit(1769041561.892:639): pid=1312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:02.024000 audit[1312]: CRED_ACQ pid=1312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:02.026110 sshd[1312]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:26:02.062626 systemd-logind[903]: New session 27 of user core. Jan 22 00:26:02.199609 kernel: audit: type=1103 audit(1769041562.024:640): pid=1312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:02.199672 kernel: audit: type=1006 audit(1769041562.024:641): pid=1312 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Jan 22 00:26:02.199745 systemd[1]: Started Session 27 of User core. Jan 22 00:26:02.290000 audit[1312]: USER_START pid=1312 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:02.406945 kernel: audit: type=1105 audit(1769041562.290:642): pid=1312 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:02.426005 kernel: audit: type=1103 audit(1769041562.304:643): pid=1314 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:02.304000 audit[1314]: CRED_ACQ pid=1314 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:02.565492 sshd[1312]: pam_unix(sshd:session): session closed for user core Jan 22 00:26:02.571000 audit[1312]: USER_END pid=1312 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:02.576529 systemd[1]: sshd@26-10.0.0.3:22-10.0.0.1:33054.service: Deactivated successfully. Jan 22 00:26:02.580530 systemd[1]: session-27.scope: Deactivated successfully. Jan 22 00:26:02.585918 systemd-logind[903]: Session 27 logged out. Waiting for processes to exit. Jan 22 00:26:02.596878 systemd-logind[903]: Removed session 27. Jan 22 00:26:02.571000 audit[1312]: CRED_DISP pid=1312 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:02.783046 kernel: audit: type=1106 audit(1769041562.571:644): pid=1312 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:02.786943 kernel: audit: type=1104 audit(1769041562.571:645): pid=1312 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:02.789050 kernel: audit: type=1131 audit(1769041562.571:646): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.3:22-10.0.0.1:33054 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:26:02.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.3:22-10.0.0.1:33054 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:26:12.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.3:22-10.0.0.1:54690 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:26:12.759652 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:54690). Jan 22 00:26:12.852386 kernel: audit: type=1130 audit(1769041572.758:647): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.3:22-10.0.0.1:54690 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:26:12.898000 audit[1321]: USER_ACCT pid=1321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:12.906607 sshd[1321]: Accepted publickey for core from 10.0.0.1 port 54690 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:26:12.923466 sshd[1321]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:26:12.964628 systemd-logind[903]: New session 28 of user core. Jan 22 00:26:13.159650 kernel: audit: type=1101 audit(1769041572.898:648): pid=1321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:13.159706 kernel: audit: type=1103 audit(1769041572.921:649): pid=1321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:13.159739 kernel: audit: type=1006 audit(1769041572.921:650): pid=1321 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Jan 22 00:26:12.921000 audit[1321]: CRED_ACQ pid=1321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:13.159624 systemd[1]: Started Session 28 of User core. Jan 22 00:26:13.220000 audit[1321]: USER_START pid=1321 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:13.229000 audit[1323]: CRED_ACQ pid=1323 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:13.448789 kernel: audit: type=1105 audit(1769041573.220:651): pid=1321 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:13.449389 kernel: audit: type=1103 audit(1769041573.229:652): pid=1323 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:13.465740 sshd[1321]: pam_unix(sshd:session): session closed for user core Jan 22 00:26:13.470000 audit[1321]: USER_END pid=1321 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:13.476899 systemd[1]: sshd@27-10.0.0.3:22-10.0.0.1:54690.service: Deactivated successfully. Jan 22 00:26:13.478950 systemd[1]: session-28.scope: Deactivated successfully. Jan 22 00:26:13.483809 systemd-logind[903]: Session 28 logged out. Waiting for processes to exit. Jan 22 00:26:13.492693 systemd-logind[903]: Removed session 28. Jan 22 00:26:13.471000 audit[1321]: CRED_DISP pid=1321 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:13.663700 kernel: audit: type=1106 audit(1769041573.470:653): pid=1321 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:13.663833 kernel: audit: type=1104 audit(1769041573.471:654): pid=1321 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:13.663867 kernel: audit: type=1131 audit(1769041573.471:655): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.3:22-10.0.0.1:54690 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:26:13.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.3:22-10.0.0.1:54690 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:26:23.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.3:22-10.0.0.1:49240 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:26:23.515454 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:49240). Jan 22 00:26:23.633779 kernel: audit: type=1130 audit(1769041583.514:656): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.3:22-10.0.0.1:49240 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:26:23.695533 sshd[1328]: Accepted publickey for core from 10.0.0.1 port 49240 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:26:23.693000 audit[1328]: USER_ACCT pid=1328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:23.715940 sshd[1328]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:26:23.739982 systemd-logind[903]: New session 29 of user core. Jan 22 00:26:24.005891 kernel: audit: type=1101 audit(1769041583.693:657): pid=1328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:24.006025 kernel: audit: type=1103 audit(1769041583.714:658): pid=1328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:24.006067 kernel: audit: type=1006 audit(1769041583.714:659): pid=1328 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Jan 22 00:26:23.714000 audit[1328]: CRED_ACQ pid=1328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:24.007686 systemd[1]: Started Session 29 of User core. Jan 22 00:26:24.094000 audit[1328]: USER_START pid=1328 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:24.107000 audit[1330]: CRED_ACQ pid=1330 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:24.228089 sshd[1328]: pam_unix(sshd:session): session closed for user core Jan 22 00:26:24.240009 systemd[1]: sshd@28-10.0.0.3:22-10.0.0.1:49240.service: Deactivated successfully. Jan 22 00:26:24.242774 systemd[1]: session-29.scope: Deactivated successfully. Jan 22 00:26:24.244073 systemd-logind[903]: Session 29 logged out. Waiting for processes to exit. Jan 22 00:26:24.261992 systemd-logind[903]: Removed session 29. Jan 22 00:26:24.332664 kernel: audit: type=1105 audit(1769041584.094:660): pid=1328 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:24.333584 kernel: audit: type=1103 audit(1769041584.107:661): pid=1330 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:24.333634 kernel: audit: type=1106 audit(1769041584.232:662): pid=1328 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:24.232000 audit[1328]: USER_END pid=1328 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:24.232000 audit[1328]: CRED_DISP pid=1328 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:24.569079 kernel: audit: type=1104 audit(1769041584.232:663): pid=1328 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:24.569873 kernel: audit: type=1131 audit(1769041584.240:664): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.3:22-10.0.0.1:49240 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:26:24.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.3:22-10.0.0.1:49240 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:26:25.319982 update_engine[1266]: I0122 00:26:25.318612 1266 update_attempter.cc:495] Already updated boot flags. Skipping. Jan 22 00:26:34.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.3:22-10.0.0.1:54144 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:26:34.273405 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:54144). Jan 22 00:26:34.363592 kernel: audit: type=1130 audit(1769041594.272:665): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.3:22-10.0.0.1:54144 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:26:34.418000 audit[1336]: USER_ACCT pid=1336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:34.432997 sshd[1336]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:26:34.456102 sshd[1336]: Accepted publickey for core from 10.0.0.1 port 54144 ssh2: RSA SHA256:478IGuiHiiiluTf8Lgr+M9bZbZDozrh0nnpBhNTjPGY Jan 22 00:26:34.429000 audit[1336]: CRED_ACQ pid=1336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:34.610966 kernel: audit: type=1101 audit(1769041594.418:666): pid=1336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:34.611470 kernel: audit: type=1103 audit(1769041594.429:667): pid=1336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:34.611622 kernel: audit: type=1006 audit(1769041594.429:668): pid=1336 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 Jan 22 00:26:34.625013 systemd-logind[903]: New session 30 of user core. Jan 22 00:26:34.694931 systemd[1]: Started Session 30 of User core. Jan 22 00:26:34.747000 audit[1336]: USER_START pid=1336 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:34.755000 audit[1338]: CRED_ACQ pid=1338 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:34.876097 sshd[1336]: pam_unix(sshd:session): session closed for user core Jan 22 00:26:34.886618 systemd[1]: sshd@29-10.0.0.3:22-10.0.0.1:54144.service: Deactivated successfully. Jan 22 00:26:34.892508 systemd[1]: session-30.scope: Deactivated successfully. Jan 22 00:26:34.896053 systemd-logind[903]: Session 30 logged out. Waiting for processes to exit. Jan 22 00:26:34.905534 systemd-logind[903]: Removed session 30. Jan 22 00:26:34.955900 kernel: audit: type=1105 audit(1769041594.747:669): pid=1336 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:34.956006 kernel: audit: type=1103 audit(1769041594.755:670): pid=1338 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:34.956031 kernel: audit: type=1106 audit(1769041594.881:671): pid=1336 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:34.881000 audit[1336]: USER_END pid=1336 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:35.068100 kernel: audit: type=1104 audit(1769041594.881:672): pid=1336 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:34.881000 audit[1336]: CRED_DISP pid=1336 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:26:35.164045 kernel: audit: type=1131 audit(1769041594.890:673): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.3:22-10.0.0.1:54144 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:26:34.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.3:22-10.0.0.1:54144 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success'