Jan 22 00:57:32.465717 kernel: Linux version 5.10.107-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 9.3.0-r1 p3) 9.3.0, GNU ld (Gentoo 2.36.1 p5) 2.36.1) #1 SMP Tue Mar 22 19:39:53 -00 2022 Jan 22 00:57:32.465746 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=15990f5bb88d618f1948b7e8a720f1d5b95900cfecbef00df890bd0a136b39aa Jan 22 00:57:32.465756 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jan 22 00:57:32.465764 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jan 22 00:57:32.465771 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jan 22 00:57:32.465780 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jan 22 00:57:32.465787 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Jan 22 00:57:32.465795 kernel: BIOS-provided physical RAM map: Jan 22 00:57:32.465801 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Jan 22 00:57:32.465808 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Jan 22 00:57:32.465815 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Jan 22 00:57:32.465823 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable Jan 22 00:57:32.465831 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved Jan 22 00:57:32.465837 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Jan 22 00:57:32.465846 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Jan 22 00:57:32.465852 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Jan 22 00:57:32.465859 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Jan 22 00:57:32.465868 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Jan 22 00:57:32.465876 kernel: NX (Execute Disable) protection: active Jan 22 00:57:32.465882 kernel: SMBIOS 2.8 present. Jan 22 00:57:32.465889 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Jan 22 00:57:32.465894 kernel: Hypervisor detected: KVM Jan 22 00:57:32.465901 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jan 22 00:57:32.465908 kernel: kvm-clock: cpu 0, msr 376ba001, primary cpu clock Jan 22 00:57:32.465917 kernel: kvm-clock: using sched offset of 9486685506 cycles Jan 22 00:57:32.465926 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jan 22 00:57:32.465933 kernel: tsc: Detected 2445.426 MHz processor Jan 22 00:57:32.465940 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jan 22 00:57:32.465947 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jan 22 00:57:32.465957 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 Jan 22 00:57:32.465966 kernel: MTRR default type: write-back Jan 22 00:57:32.465973 kernel: MTRR fixed ranges enabled: Jan 22 00:57:32.465979 kernel: 00000-9FFFF write-back Jan 22 00:57:32.465985 kernel: A0000-BFFFF uncachable Jan 22 00:57:32.465992 kernel: C0000-FFFFF write-protect Jan 22 00:57:32.466003 kernel: MTRR variable ranges enabled: Jan 22 00:57:32.466011 kernel: 0 base 0000C0000000 mask FFFFC0000000 uncachable Jan 22 00:57:32.466018 kernel: 1 disabled Jan 22 00:57:32.466024 kernel: 2 disabled Jan 22 00:57:32.466031 kernel: 3 disabled Jan 22 00:57:32.466041 kernel: 4 disabled Jan 22 00:57:32.466049 kernel: 5 disabled Jan 22 00:57:32.466058 kernel: 6 disabled Jan 22 00:57:32.466065 kernel: 7 disabled Jan 22 00:57:32.466073 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jan 22 00:57:32.466080 kernel: Using GB pages for direct mapping Jan 22 00:57:32.466088 kernel: ACPI: Early table checksum verification disabled Jan 22 00:57:32.466098 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) Jan 22 00:57:32.466105 kernel: ACPI: RSDT 0x000000009CFE241A 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:57:32.466112 kernel: ACPI: FACP 0x000000009CFE21FA 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:57:32.466119 kernel: ACPI: DSDT 0x000000009CFE0040 0021BA (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:57:32.466126 kernel: ACPI: FACS 0x000000009CFE0000 000040 Jan 22 00:57:32.466134 kernel: ACPI: APIC 0x000000009CFE22EE 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:57:32.466146 kernel: ACPI: HPET 0x000000009CFE237E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:57:32.466153 kernel: ACPI: MCFG 0x000000009CFE23B6 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:57:32.466160 kernel: ACPI: WAET 0x000000009CFE23F2 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 22 00:57:32.466167 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21fa-0x9cfe22ed] Jan 22 00:57:32.466176 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21f9] Jan 22 00:57:32.466185 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Jan 22 00:57:32.466193 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22ee-0x9cfe237d] Jan 22 00:57:32.466200 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe237e-0x9cfe23b5] Jan 22 00:57:32.466208 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23b6-0x9cfe23f1] Jan 22 00:57:32.466215 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23f2-0x9cfe2419] Jan 22 00:57:32.466225 kernel: ACPI: Local APIC address 0xfee00000 Jan 22 00:57:32.466234 kernel: No NUMA configuration found Jan 22 00:57:32.466241 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] Jan 22 00:57:32.466248 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] Jan 22 00:57:32.466254 kernel: Zone ranges: Jan 22 00:57:32.466261 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jan 22 00:57:32.466271 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] Jan 22 00:57:32.466280 kernel: Normal empty Jan 22 00:57:32.466288 kernel: Movable zone start for each node Jan 22 00:57:32.466295 kernel: Early memory node ranges Jan 22 00:57:32.466301 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Jan 22 00:57:32.466310 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] Jan 22 00:57:32.466319 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] Jan 22 00:57:32.466327 kernel: On node 0 totalpages: 642938 Jan 22 00:57:32.466333 kernel: DMA zone: 64 pages used for memmap Jan 22 00:57:32.466340 kernel: DMA zone: 21 pages reserved Jan 22 00:57:32.466347 kernel: DMA zone: 3998 pages, LIFO batch:0 Jan 22 00:57:32.466355 kernel: DMA32 zone: 9984 pages used for memmap Jan 22 00:57:32.466367 kernel: DMA32 zone: 638940 pages, LIFO batch:63 Jan 22 00:57:32.466444 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jan 22 00:57:32.466455 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Jan 22 00:57:32.466464 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges Jan 22 00:57:32.466473 kernel: ACPI: PM-Timer IO Port: 0x608 Jan 22 00:57:32.466481 kernel: ACPI: Local APIC address 0xfee00000 Jan 22 00:57:32.466487 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jan 22 00:57:32.466494 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jan 22 00:57:32.466501 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jan 22 00:57:32.466511 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jan 22 00:57:32.466520 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jan 22 00:57:32.466529 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jan 22 00:57:32.466536 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jan 22 00:57:32.466543 kernel: ACPI: IRQ0 used by override. Jan 22 00:57:32.466549 kernel: ACPI: IRQ5 used by override. Jan 22 00:57:32.466557 kernel: ACPI: IRQ9 used by override. Jan 22 00:57:32.466566 kernel: ACPI: IRQ10 used by override. Jan 22 00:57:32.466575 kernel: ACPI: IRQ11 used by override. Jan 22 00:57:32.466581 kernel: Using ACPI (MADT) for SMP configuration information Jan 22 00:57:32.466590 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Jan 22 00:57:32.466596 kernel: TSC deadline timer available Jan 22 00:57:32.466605 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Jan 22 00:57:32.466727 kernel: kvm-guest: KVM setup pv remote TLB flush Jan 22 00:57:32.466737 kernel: kvm-guest: setup PV sched yield Jan 22 00:57:32.466744 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Jan 22 00:57:32.466751 kernel: Booting paravirtualized kernel on KVM Jan 22 00:57:32.466758 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jan 22 00:57:32.466765 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Jan 22 00:57:32.466772 kernel: percpu: Embedded 58 pages/cpu s199704 r8192 d29672 u524288 Jan 22 00:57:32.466785 kernel: pcpu-alloc: s199704 r8192 d29672 u524288 alloc=1*2097152 Jan 22 00:57:32.466793 kernel: pcpu-alloc: [0] 0 1 2 3 Jan 22 00:57:32.466800 kernel: kvm-guest: KVM setup async PF for cpu 0 Jan 22 00:57:32.466807 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c580 Jan 22 00:57:32.466814 kernel: kvm-guest: PV spinlocks enabled Jan 22 00:57:32.466821 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jan 22 00:57:32.466830 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632869 Jan 22 00:57:32.466840 kernel: Policy zone: DMA32 Jan 22 00:57:32.466853 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=15990f5bb88d618f1948b7e8a720f1d5b95900cfecbef00df890bd0a136b39aa Jan 22 00:57:32.466863 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jan 22 00:57:32.466873 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jan 22 00:57:32.466883 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jan 22 00:57:32.466890 kernel: Memory: 2449516K/2571752K available (10246K kernel code, 2239K rwdata, 11640K rodata, 42228K init, 1436K bss, 121976K reserved, 0K cma-reserved) Jan 22 00:57:32.466898 kernel: random: get_random_u64 called from __kmem_cache_create+0x26/0x400 with crng_init=0 Jan 22 00:57:32.466905 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Jan 22 00:57:32.466915 kernel: ftrace: allocating 34378 entries in 135 pages Jan 22 00:57:32.466925 kernel: ftrace: allocated 135 pages with 4 groups Jan 22 00:57:32.466933 kernel: rcu: Hierarchical RCU implementation. Jan 22 00:57:32.466940 kernel: rcu: RCU event tracing is enabled. Jan 22 00:57:32.466948 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Jan 22 00:57:32.466956 kernel: Rude variant of Tasks RCU enabled. Jan 22 00:57:32.466965 kernel: Tracing variant of Tasks RCU enabled. Jan 22 00:57:32.466975 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jan 22 00:57:32.466982 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Jan 22 00:57:32.466991 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Jan 22 00:57:32.466999 kernel: Console: colour VGA+ 80x25 Jan 22 00:57:32.467008 kernel: printk: console [ttyS0] enabled Jan 22 00:57:32.467018 kernel: ACPI: Core revision 20200925 Jan 22 00:57:32.467025 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Jan 22 00:57:32.467032 kernel: APIC: Switch to symmetric I/O mode setup Jan 22 00:57:32.467039 kernel: x2apic enabled Jan 22 00:57:32.467048 kernel: Switched APIC routing to physical x2apic. Jan 22 00:57:32.467057 kernel: kvm-guest: setup PV IPIs Jan 22 00:57:32.467065 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Jan 22 00:57:32.467074 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Jan 22 00:57:32.467081 kernel: Calibrating delay loop (skipped) preset value.. 4890.85 BogoMIPS (lpj=2445426) Jan 22 00:57:32.467090 kernel: pid_max: default: 32768 minimum: 301 Jan 22 00:57:32.467099 kernel: LSM: Security Framework initializing Jan 22 00:57:32.467108 kernel: SELinux: Initializing. Jan 22 00:57:32.467115 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jan 22 00:57:32.467122 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jan 22 00:57:32.467130 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Jan 22 00:57:32.467139 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Jan 22 00:57:32.467151 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Jan 22 00:57:32.467158 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jan 22 00:57:32.467165 kernel: Spectre V2 : Mitigation: Retpolines Jan 22 00:57:32.467172 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jan 22 00:57:32.467181 kernel: Speculative Store Bypass: Vulnerable Jan 22 00:57:32.467193 kernel: Freeing SMP alternatives memory: 28K Jan 22 00:57:32.467201 kernel: smpboot: CPU0: AMD EPYC 7763 64-Core Processor (family: 0x19, model: 0x1, stepping: 0x1) Jan 22 00:57:32.467208 kernel: Performance Events: PMU not available due to virtualization, using software events only. Jan 22 00:57:32.467215 kernel: rcu: Hierarchical SRCU implementation. Jan 22 00:57:32.467224 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Jan 22 00:57:32.467234 kernel: smp: Bringing up secondary CPUs ... Jan 22 00:57:32.467242 kernel: x86: Booting SMP configuration: Jan 22 00:57:32.467248 kernel: .... node #0, CPUs: #1 Jan 22 00:57:32.467255 kernel: kvm-clock: cpu 1, msr 376ba041, secondary cpu clock Jan 22 00:57:32.467264 kernel: kvm-guest: KVM setup async PF for cpu 1 Jan 22 00:57:32.467276 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c580 Jan 22 00:57:32.467284 kernel: #2 Jan 22 00:57:32.467291 kernel: kvm-clock: cpu 2, msr 376ba081, secondary cpu clock Jan 22 00:57:32.467298 kernel: kvm-guest: KVM setup async PF for cpu 2 Jan 22 00:57:32.467306 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c580 Jan 22 00:57:32.467315 kernel: #3 Jan 22 00:57:32.467325 kernel: kvm-clock: cpu 3, msr 376ba0c1, secondary cpu clock Jan 22 00:57:32.467331 kernel: kvm-guest: KVM setup async PF for cpu 3 Jan 22 00:57:32.467338 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c580 Jan 22 00:57:32.467347 kernel: smp: Brought up 1 node, 4 CPUs Jan 22 00:57:32.467356 kernel: smpboot: Max logical packages: 1 Jan 22 00:57:32.467366 kernel: smpboot: Total of 4 processors activated (19563.40 BogoMIPS) Jan 22 00:57:32.467889 kernel: devtmpfs: initialized Jan 22 00:57:32.467906 kernel: x86/mm: Memory block size: 128MB Jan 22 00:57:32.467914 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jan 22 00:57:32.467922 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Jan 22 00:57:32.467929 kernel: pinctrl core: initialized pinctrl subsystem Jan 22 00:57:32.467936 kernel: NET: Registered protocol family 16 Jan 22 00:57:32.467946 kernel: audit: initializing netlink subsys (disabled) Jan 22 00:57:32.467959 kernel: audit: type=2000 audit(1769043447.840:1): state=initialized audit_enabled=0 res=1 Jan 22 00:57:32.467967 kernel: thermal_sys: Registered thermal governor 'step_wise' Jan 22 00:57:32.467974 kernel: thermal_sys: Registered thermal governor 'user_space' Jan 22 00:57:32.467981 kernel: cpuidle: using governor menu Jan 22 00:57:32.467989 kernel: ACPI: bus type PCI registered Jan 22 00:57:32.467998 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jan 22 00:57:32.468008 kernel: dca service started, version 1.12.1 Jan 22 00:57:32.468015 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Jan 22 00:57:32.468022 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Jan 22 00:57:32.468032 kernel: PCI: Using configuration type 1 for base access Jan 22 00:57:32.468041 kernel: Kprobes globally optimized Jan 22 00:57:32.468051 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jan 22 00:57:32.468059 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jan 22 00:57:32.468065 kernel: ACPI: Added _OSI(Module Device) Jan 22 00:57:32.468072 kernel: ACPI: Added _OSI(Processor Device) Jan 22 00:57:32.468081 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jan 22 00:57:32.468090 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jan 22 00:57:32.468099 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jan 22 00:57:32.468106 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jan 22 00:57:32.468115 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jan 22 00:57:32.468123 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jan 22 00:57:32.468132 kernel: ACPI: Interpreter enabled Jan 22 00:57:32.468141 kernel: ACPI: (supports S0 S3 S5) Jan 22 00:57:32.468148 kernel: ACPI: Using IOAPIC for interrupt routing Jan 22 00:57:32.468156 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jan 22 00:57:32.468163 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Jan 22 00:57:32.468172 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jan 22 00:57:32.468304 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jan 22 00:57:32.468468 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Jan 22 00:57:32.468547 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Jan 22 00:57:32.468559 kernel: PCI host bridge to bus 0000:00 Jan 22 00:57:32.468882 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jan 22 00:57:32.468957 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jan 22 00:57:32.469030 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jan 22 00:57:32.469104 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Jan 22 00:57:32.469176 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Jan 22 00:57:32.469246 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] Jan 22 00:57:32.469313 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jan 22 00:57:32.469474 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Jan 22 00:57:32.469565 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Jan 22 00:57:32.469888 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Jan 22 00:57:32.469979 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Jan 22 00:57:32.470061 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Jan 22 00:57:32.470147 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Jan 22 00:57:32.470230 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] Jan 22 00:57:32.470307 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Jan 22 00:57:32.470462 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Jan 22 00:57:32.470549 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Jan 22 00:57:32.470869 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] Jan 22 00:57:32.470955 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Jan 22 00:57:32.471035 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Jan 22 00:57:32.471121 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Jan 22 00:57:32.471202 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] Jan 22 00:57:32.471283 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Jan 22 00:57:32.471359 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Jan 22 00:57:32.471517 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Jan 22 00:57:32.471600 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Jan 22 00:57:32.471923 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Jan 22 00:57:32.472002 kernel: pci 0000:00:1f.0: quirk_ich7_lpc+0x0/0x60 took 10742 usecs Jan 22 00:57:32.472085 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Jan 22 00:57:32.472171 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] Jan 22 00:57:32.472247 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] Jan 22 00:57:32.472336 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Jan 22 00:57:32.472489 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Jan 22 00:57:32.472502 kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 5 *10 11) Jan 22 00:57:32.472512 kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs 5 *10 11) Jan 22 00:57:32.472522 kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 5 10 *11) Jan 22 00:57:32.472530 kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs 5 10 *11) Jan 22 00:57:32.472537 kernel: ACPI: PCI Interrupt Link [LNKE] (IRQs 5 *10 11) Jan 22 00:57:32.472544 kernel: ACPI: PCI Interrupt Link [LNKF] (IRQs 5 *10 11) Jan 22 00:57:32.472555 kernel: ACPI: PCI Interrupt Link [LNKG] (IRQs 5 10 *11) Jan 22 00:57:32.472564 kernel: ACPI: PCI Interrupt Link [LNKH] (IRQs 5 10 *11) Jan 22 00:57:32.472574 kernel: ACPI: PCI Interrupt Link [GSIA] (IRQs *16) Jan 22 00:57:32.472581 kernel: ACPI: PCI Interrupt Link [GSIB] (IRQs *17) Jan 22 00:57:32.472588 kernel: ACPI: PCI Interrupt Link [GSIC] (IRQs *18) Jan 22 00:57:32.472595 kernel: ACPI: PCI Interrupt Link [GSID] (IRQs *19) Jan 22 00:57:32.472603 kernel: ACPI: PCI Interrupt Link [GSIE] (IRQs *20) Jan 22 00:57:32.472846 kernel: ACPI: PCI Interrupt Link [GSIF] (IRQs *21) Jan 22 00:57:32.472856 kernel: ACPI: PCI Interrupt Link [GSIG] (IRQs *22) Jan 22 00:57:32.472863 kernel: ACPI: PCI Interrupt Link [GSIH] (IRQs *23) Jan 22 00:57:32.472874 kernel: iommu: Default domain type: Translated Jan 22 00:57:32.472959 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Jan 22 00:57:32.473036 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jan 22 00:57:32.473114 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Jan 22 00:57:32.473127 kernel: vgaarb: loaded Jan 22 00:57:32.473134 kernel: PCI: Using ACPI for IRQ routing Jan 22 00:57:32.473141 kernel: PCI: pci_cache_line_size set to 64 bytes Jan 22 00:57:32.473149 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Jan 22 00:57:32.473159 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] Jan 22 00:57:32.473171 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Jan 22 00:57:32.473178 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Jan 22 00:57:32.473185 kernel: clocksource: Switched to clocksource kvm-clock Jan 22 00:57:32.473192 kernel: VFS: Disk quotas dquot_6.6.0 Jan 22 00:57:32.473200 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jan 22 00:57:32.473210 kernel: pnp: PnP ACPI init Jan 22 00:57:32.473296 kernel: pnp 00:00: Plug and Play ACPI device, IDs PNP0303 (active) Jan 22 00:57:32.473458 kernel: pnp 00:01: Plug and Play ACPI device, IDs PNP0f13 (active) Jan 22 00:57:32.473542 kernel: pnp 00:02: Plug and Play ACPI device, IDs PNP0400 (active) Jan 22 00:57:32.473873 kernel: pnp 00:03: Plug and Play ACPI device, IDs PNP0501 (active) Jan 22 00:57:32.473958 kernel: pnp 00:04: Plug and Play ACPI device, IDs PNP0b00 (active) Jan 22 00:57:32.474038 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Jan 22 00:57:32.474110 kernel: system 00:05: Plug and Play ACPI device, IDs PNP0c01 (active) Jan 22 00:57:32.474126 kernel: pnp: PnP ACPI: found 6 devices Jan 22 00:57:32.474136 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jan 22 00:57:32.474146 kernel: NET: Registered protocol family 2 Jan 22 00:57:32.474154 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jan 22 00:57:32.474162 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jan 22 00:57:32.474169 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jan 22 00:57:32.474176 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jan 22 00:57:32.474186 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jan 22 00:57:32.474196 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jan 22 00:57:32.474206 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jan 22 00:57:32.474213 kernel: NET: Registered protocol family 1 Jan 22 00:57:32.474220 kernel: NET: Registered protocol family 44 Jan 22 00:57:32.474291 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jan 22 00:57:32.474362 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jan 22 00:57:32.474504 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jan 22 00:57:32.474576 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Jan 22 00:57:32.474941 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Jan 22 00:57:32.475016 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] Jan 22 00:57:32.475099 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jan 22 00:57:32.475177 kernel: pci 0000:00:01.0: pci_fixup_video+0x0/0xe0 took 11558 usecs Jan 22 00:57:32.475190 kernel: PCI: CLS 0 bytes, default 64 Jan 22 00:57:32.475198 kernel: Initialise system trusted keyrings Jan 22 00:57:32.475205 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jan 22 00:57:32.475213 kernel: Key type asymmetric registered Jan 22 00:57:32.475223 kernel: Asymmetric key parser 'x509' registered Jan 22 00:57:32.475232 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 251) Jan 22 00:57:32.475243 kernel: io scheduler mq-deadline registered Jan 22 00:57:32.475250 kernel: io scheduler kyber registered Jan 22 00:57:32.475256 kernel: io scheduler bfq registered Jan 22 00:57:32.475265 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jan 22 00:57:32.475274 kernel: PCI Interrupt Link [GSIG] enabled at IRQ 22 Jan 22 00:57:32.475283 kernel: PCI Interrupt Link [GSIH] enabled at IRQ 23 Jan 22 00:57:32.475291 kernel: PCI Interrupt Link [GSIE] enabled at IRQ 20 Jan 22 00:57:32.475298 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jan 22 00:57:32.475305 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jan 22 00:57:32.475314 kernel: random: fast init done Jan 22 00:57:32.475326 kernel: random: crng init done Jan 22 00:57:32.475333 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jan 22 00:57:32.475340 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jan 22 00:57:32.475348 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jan 22 00:57:32.475356 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jan 22 00:57:32.475366 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jan 22 00:57:32.475515 kernel: rtc_cmos 00:04: RTC can wake from S4 Jan 22 00:57:32.475529 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jan 22 00:57:32.475599 kernel: rtc_cmos 00:04: registered as rtc0 Jan 22 00:57:32.475869 kernel: hpet: Lost 1 RTC interrupts Jan 22 00:57:32.475948 kernel: rtc_cmos 00:04: setting system clock to 2026-01-22T00:57:31 UTC (1769043451) Jan 22 00:57:32.476019 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Jan 22 00:57:32.476031 kernel: NET: Registered protocol family 10 Jan 22 00:57:32.476041 kernel: Segment Routing with IPv6 Jan 22 00:57:32.476050 kernel: NET: Registered protocol family 17 Jan 22 00:57:32.476057 kernel: Key type dns_resolver registered Jan 22 00:57:32.476064 kernel: IPI shorthand broadcast: enabled Jan 22 00:57:32.476071 kernel: sched_clock: Marking stable (2795236442, 517109927)->(3607381998, -295035629) Jan 22 00:57:32.476083 kernel: registered taskstats version 1 Jan 22 00:57:32.476092 kernel: Loading compiled-in X.509 certificates Jan 22 00:57:32.476102 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.10.107-flatcar: 5866c780451a04cc08b278527846e2b48fb1aa10' Jan 22 00:57:32.476109 kernel: Key type ._fscrypt registered Jan 22 00:57:32.476116 kernel: Key type .fscrypt registered Jan 22 00:57:32.476123 kernel: Key type fscrypt-provisioning registered Jan 22 00:57:32.476132 kernel: ima: No TPM chip found, activating TPM-bypass! Jan 22 00:57:32.476141 kernel: ima: Allocated hash algorithm: sha1 Jan 22 00:57:32.476150 kernel: ima: No architecture policies found Jan 22 00:57:32.476166 kernel: Freeing unused kernel image (initmem) memory: 42228K Jan 22 00:57:32.476176 kernel: Write protecting the kernel read-only data: 24576k Jan 22 00:57:32.476186 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jan 22 00:57:32.476197 kernel: Freeing unused kernel image (rodata/data gap) memory: 648K Jan 22 00:57:32.476205 kernel: Run /init as init process Jan 22 00:57:32.476212 kernel: with arguments: Jan 22 00:57:32.476219 kernel: /init Jan 22 00:57:32.476228 kernel: with environment: Jan 22 00:57:32.476237 kernel: HOME=/ Jan 22 00:57:32.476246 kernel: TERM=linux Jan 22 00:57:32.476252 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jan 22 00:57:32.476262 systemd[1]: systemd 249 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jan 22 00:57:32.476276 systemd[1]: Detected virtualization kvm. Jan 22 00:57:32.476287 systemd[1]: Detected architecture x86-64. Jan 22 00:57:32.476295 systemd[1]: Running in initial RAM disk. Jan 22 00:57:32.476303 systemd[1]: No hostname configured, using default hostname. Jan 22 00:57:32.476311 systemd[1]: Hostname set to . Jan 22 00:57:32.476323 systemd[1]: Initializing machine ID from VM UUID. Jan 22 00:57:32.476334 systemd[1]: Queued start job for default target Initrd Default Target. Jan 22 00:57:32.476342 systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Jan 22 00:57:32.476351 systemd[1]: Reached target Local Encrypted Volumes. Jan 22 00:57:32.476359 systemd[1]: Reached target Path Units. Jan 22 00:57:32.476369 systemd[1]: Reached target Slice Units. Jan 22 00:57:32.476443 systemd[1]: Reached target Swaps. Jan 22 00:57:32.476458 systemd[1]: Reached target Timer Units. Jan 22 00:57:32.476466 systemd[1]: Listening on Open-iSCSI iscsid Socket. Jan 22 00:57:32.476474 systemd[1]: Listening on Open-iSCSI iscsiuio Socket. Jan 22 00:57:32.476482 systemd[1]: Listening on Journal Audit Socket. Jan 22 00:57:32.476491 systemd[1]: Listening on Journal Socket (/dev/log). Jan 22 00:57:32.476502 systemd[1]: Listening on Journal Socket. Jan 22 00:57:32.476513 systemd[1]: Listening on Network Service Netlink Socket. Jan 22 00:57:32.476521 systemd[1]: Listening on udev Control Socket. Jan 22 00:57:32.476529 systemd[1]: Listening on udev Kernel Socket. Jan 22 00:57:32.476537 systemd[1]: Reached target Socket Units. Jan 22 00:57:32.476546 systemd[1]: Starting Create List of Static Device Nodes... Jan 22 00:57:32.476556 systemd[1]: Finished Network Cleanup. Jan 22 00:57:32.476565 systemd[1]: Started Hardware RNG Entropy Gatherer Daemon. Jan 22 00:57:32.476575 systemd[1]: Starting Journal Service... Jan 22 00:57:32.476583 systemd[1]: Condition check resulted in Load Kernel Modules being skipped. Jan 22 00:57:32.476592 systemd[1]: Starting Apply Kernel Variables... Jan 22 00:57:32.476602 systemd[1]: Starting Setup Virtual Console... Jan 22 00:57:32.476850 systemd[1]: Finished Create List of Static Device Nodes. Jan 22 00:57:32.476862 systemd[1]: Finished Apply Kernel Variables. Jan 22 00:57:32.476874 systemd-journald[191]: Journal started Jan 22 00:57:32.476929 systemd-journald[191]: Runtime Journal (/run/log/journal/25310355d12c4798885c5d1914965017) is 6.0M, max 48.7M, 42.6M free. Jan 22 00:57:32.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:33.015068 kernel: audit: type=1130 audit(1769043452.982:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:33.015149 systemd[1]: Started Journal Service. Jan 22 00:57:33.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:33.028956 systemd[1]: Finished Setup Virtual Console. Jan 22 00:57:33.100987 kernel: audit: type=1130 audit(1769043453.027:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:33.101083 kernel: audit: type=1130 audit(1769043453.065:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:33.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:33.067120 systemd[1]: Starting dracut ask for additional cmdline parameters... Jan 22 00:57:33.111930 systemd[1]: Starting Create Static Device Nodes in /dev... Jan 22 00:57:33.127930 systemd[1]: Finished Create Static Device Nodes in /dev. Jan 22 00:57:33.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:33.176981 kernel: audit: type=1130 audit(1769043453.112:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:33.216458 systemd[1]: Finished dracut ask for additional cmdline parameters. Jan 22 00:57:33.265066 kernel: audit: type=1130 audit(1769043453.216:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:33.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:33.218303 systemd[1]: Starting dracut cmdline hook... Jan 22 00:57:33.281190 dracut-cmdline[209]: dracut-dracut-053 Jan 22 00:57:33.281190 dracut-cmdline[209]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Jan 22 00:57:33.281190 dracut-cmdline[209]: BEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=15990f5bb88d618f1948b7e8a720f1d5b95900cfecbef00df890bd0a136b39aa Jan 22 00:57:33.397570 kernel: SCSI subsystem initialized Jan 22 00:57:33.413910 kernel: Loading iSCSI transport class v2.0-870. Jan 22 00:57:33.441002 kernel: iscsi: registered transport (tcp) Jan 22 00:57:33.488111 kernel: iscsi: registered transport (qla4xxx) Jan 22 00:57:33.488192 kernel: QLogic iSCSI HBA Driver Jan 22 00:57:33.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:33.519260 systemd[1]: Finished dracut cmdline hook. Jan 22 00:57:33.577526 kernel: audit: type=1130 audit(1769043453.529:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:33.532232 systemd[1]: Starting dracut pre-udev hook... Jan 22 00:57:33.604823 kernel: device-mapper: uevent: version 1.0.3 Jan 22 00:57:33.618873 kernel: device-mapper: ioctl: 4.43.0-ioctl (2020-10-01) initialised: dm-devel@redhat.com Jan 22 00:57:33.709830 kernel: raid6: avx2x4 gen() 22583 MB/s Jan 22 00:57:33.732841 kernel: raid6: avx2x4 xor() 4454 MB/s Jan 22 00:57:33.755151 kernel: raid6: avx2x2 gen() 19769 MB/s Jan 22 00:57:33.777859 kernel: raid6: avx2x2 xor() 19027 MB/s Jan 22 00:57:33.803972 kernel: raid6: avx2x1 gen() 8562 MB/s Jan 22 00:57:33.826835 kernel: raid6: avx2x1 xor() 12965 MB/s Jan 22 00:57:33.849907 kernel: raid6: sse2x4 gen() 13708 MB/s Jan 22 00:57:33.871817 kernel: raid6: sse2x4 xor() 3024 MB/s Jan 22 00:57:33.894822 kernel: raid6: sse2x2 gen() 7483 MB/s Jan 22 00:57:33.922509 kernel: raid6: sse2x2 xor() 8886 MB/s Jan 22 00:57:33.942985 kernel: raid6: sse2x1 gen() 748 MB/s Jan 22 00:57:33.971778 kernel: raid6: sse2x1 xor() 4879 MB/s Jan 22 00:57:33.971847 kernel: raid6: using algorithm avx2x4 gen() 22583 MB/s Jan 22 00:57:33.971862 kernel: raid6: .... xor() 4454 MB/s, rmw enabled Jan 22 00:57:33.979186 kernel: raid6: using avx2x2 recovery algorithm Jan 22 00:57:34.021590 kernel: xor: automatically using best checksumming function avx Jan 22 00:57:34.235848 kernel: Btrfs loaded, crc32c=crc32c-intel Jan 22 00:57:34.251800 systemd[1]: Finished dracut pre-udev hook. Jan 22 00:57:34.294532 kernel: audit: type=1130 audit(1769043454.257:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:34.294565 kernel: audit: type=1334 audit(1769043454.293:9): prog-id=6 op=LOAD Jan 22 00:57:34.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:34.293000 audit: BPF prog-id=6 op=LOAD Jan 22 00:57:34.305000 audit: BPF prog-id=7 op=LOAD Jan 22 00:57:34.320000 audit: BPF prog-id=8 op=LOAD Jan 22 00:57:34.321860 systemd[1]: Starting Rule-based Manager for Device Events and Files... Jan 22 00:57:34.347984 kernel: audit: type=1334 audit(1769043454.305:10): prog-id=7 op=LOAD Jan 22 00:57:34.348011 kernel: audit: type=1334 audit(1769043454.320:11): prog-id=8 op=LOAD Jan 22 00:57:34.386829 systemd-udevd[329]: /usr/lib64/udev/rules.d/50-udev-default.rules:42 Unknown group 'sgx', ignoring Jan 22 00:57:34.401153 systemd[1]: Started Rule-based Manager for Device Events and Files. Jan 22 00:57:34.454045 kernel: audit: type=1130 audit(1769043454.409:12): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:34.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:34.410834 systemd[1]: Starting dracut pre-trigger hook... Jan 22 00:57:34.460786 dracut-pre-trigger[332]: rd.md=0: removing MD RAID activation Jan 22 00:57:34.477000 audit: BPF prog-id=9 op=LOAD Jan 22 00:57:34.480192 systemd[1]: Starting Network Configuration... Jan 22 00:57:34.491923 kernel: audit: type=1334 audit(1769043454.477:13): prog-id=9 op=LOAD Jan 22 00:57:34.515726 systemd[1]: Finished dracut pre-trigger hook. Jan 22 00:57:34.571898 kernel: audit: type=1130 audit(1769043454.515:14): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:34.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:34.517101 systemd[1]: Starting Coldplug All udev Devices... Jan 22 00:57:34.535601 systemd-udevd[329]: /usr/lib64/udev/rules.d/50-udev-default.rules:42 Unknown group 'sgx', ignoring Jan 22 00:57:34.621086 systemd[1]: Finished Coldplug All udev Devices. Jan 22 00:57:34.666562 kernel: audit: type=1130 audit(1769043454.621:15): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:34.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:34.679137 systemd-networkd[348]: lo: Link UP Jan 22 00:57:34.679212 systemd-networkd[348]: lo: Gained carrier Jan 22 00:57:34.679535 systemd-networkd[348]: Enumeration completed Jan 22 00:57:34.705826 kernel: cryptd: max_cpu_qlen set to 1000 Jan 22 00:57:34.706021 systemd[1]: Started Network Configuration. Jan 22 00:57:34.754072 kernel: audit: type=1130 audit(1769043454.716:16): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:34.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:34.765044 kernel: audit: type=1334 audit(1769043454.753:17): prog-id=10 op=LOAD Jan 22 00:57:34.753000 audit: BPF prog-id=10 op=LOAD Jan 22 00:57:34.755495 systemd[1]: Starting Network Name Resolution... Jan 22 00:57:35.619117 kernel: AVX2 version of gcm_enc/dec engaged. Jan 22 00:57:35.619148 kernel: AES CTR mode by8 optimization enabled Jan 22 00:57:35.619161 kernel: virtio_blk virtio1: [vda] 9289728 512-byte logical blocks (4.76 GB/4.43 GiB) Jan 22 00:57:35.619307 kernel: vda: detected capacity change from 0 to 4756340736 Jan 22 00:57:35.619323 kernel: libata version 3.00 loaded. Jan 22 00:57:35.619336 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jan 22 00:57:35.619353 kernel: ahci 0000:00:1f.2: version 3.0 Jan 22 00:57:35.619602 kernel: PCI Interrupt Link [GSIA] enabled at IRQ 16 Jan 22 00:57:35.619737 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Jan 22 00:57:35.619828 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Jan 22 00:57:35.619907 kernel: scsi host0: ahci Jan 22 00:57:35.619993 kernel: scsi host1: ahci Jan 22 00:57:35.620069 kernel: scsi host2: ahci Jan 22 00:57:35.620153 kernel: scsi host3: ahci Jan 22 00:57:35.620233 kernel: scsi host4: ahci Jan 22 00:57:35.620317 kernel: scsi host5: ahci Jan 22 00:57:35.620573 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 Jan 22 00:57:35.620594 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 Jan 22 00:57:35.620604 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 Jan 22 00:57:35.620733 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 Jan 22 00:57:35.620744 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 Jan 22 00:57:35.620757 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 Jan 22 00:57:35.620767 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/vda6 scanned by systemd-udevd (385) Jan 22 00:57:35.620778 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Jan 22 00:57:35.620791 kernel: ata2: SATA link down (SStatus 0 SControl 300) Jan 22 00:57:35.620800 kernel: ata1: SATA link down (SStatus 0 SControl 300) Jan 22 00:57:35.620809 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Jan 22 00:57:35.620817 kernel: ata3.00: applying bridge limits Jan 22 00:57:35.620826 kernel: ata3.00: configured for UDMA/100 Jan 22 00:57:35.620835 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Jan 22 00:57:35.620953 kernel: ata4: SATA link down (SStatus 0 SControl 300) Jan 22 00:57:35.620965 kernel: ata6: SATA link down (SStatus 0 SControl 300) Jan 22 00:57:35.620974 kernel: ata5: SATA link down (SStatus 0 SControl 300) Jan 22 00:57:35.620983 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Jan 22 00:57:35.621069 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jan 22 00:57:34.850097 systemd-udevd[371]: Using default interface naming scheme 'v249'. Jan 22 00:57:34.850338 systemd-resolved[390]: Positive Trust Anchors: Jan 22 00:57:34.850347 systemd-resolved[390]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jan 22 00:57:35.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:34.850383 systemd-resolved[390]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jan 22 00:57:34.850919 systemd-resolved[390]: Defaulting to hostname 'linux'. Jan 22 00:57:34.852028 systemd[1]: Started Network Name Resolution. Jan 22 00:57:34.867585 systemd-networkd[348]: eth0: Link UP Jan 22 00:57:35.713089 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Jan 22 00:57:35.720140 systemd[1]: Found device /dev/disk/by-partuuid/7130c94a-213a-4e5a-8e26-6cce9662f132. Jan 22 00:57:35.729014 systemd[1]: Found device /dev/disk/by-partlabel/USR-A. Jan 22 00:57:35.758281 systemd[1]: Found device /dev/disk/by-label/EFI-SYSTEM. Jan 22 00:57:35.775170 systemd[1]: Found device /dev/disk/by-label/ROOT. Jan 22 00:57:35.789509 systemd[1]: Found device /dev/disk/by-label/OEM. Jan 22 00:57:35.801820 systemd[1]: Reached target Initrd Root Device. Jan 22 00:57:35.811992 systemd[1]: Reached target Network. Jan 22 00:57:35.821486 systemd[1]: Reached target Host and Network Name Lookups. Jan 22 00:57:35.835870 systemd[1]: Starting Generate new UUID for disk GPT if necessary... Jan 22 00:57:35.851763 systemd[1]: Starting iSCSI UserSpace I/O driver... Jan 22 00:57:35.881181 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jan 22 00:57:35.881210 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jan 22 00:57:35.866853 systemd[1]: Started iSCSI UserSpace I/O driver. Jan 22 00:57:35.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:35.888207 systemd-networkd[348]: eth0: Gained carrier Jan 22 00:57:35.911118 systemd[1]: Starting Open-iSCSI... Jan 22 00:57:35.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:35.922141 systemd[1]: Started Open-iSCSI. Jan 22 00:57:35.940871 iscsid[455]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jan 22 00:57:35.940871 iscsid[455]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jan 22 00:57:35.940871 iscsid[455]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jan 22 00:57:35.940871 iscsid[455]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jan 22 00:57:35.940871 iscsid[455]: If using hardware iscsi like qla4xxx this message can be ignored. Jan 22 00:57:35.940871 iscsid[455]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jan 22 00:57:35.940871 iscsid[455]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jan 22 00:57:35.941816 systemd-networkd[348]: eth0: DHCPv4 address 10.0.0.4/16 via 10.0.0.1 Jan 22 00:57:36.077065 systemd[1]: Starting dracut initqueue hook... Jan 22 00:57:36.100099 systemd[1]: Finished dracut initqueue hook. Jan 22 00:57:36.115858 systemd[1]: Reached target Preparation for Remote File Systems. Jan 22 00:57:36.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:36.126361 systemd[1]: Reached target Remote Encrypted Volumes. Jan 22 00:57:36.150134 systemd[1]: Reached target Remote File Systems. Jan 22 00:57:36.166121 systemd[1]: Starting dracut pre-mount hook... Jan 22 00:57:36.184571 systemd[1]: Finished dracut pre-mount hook. Jan 22 00:57:36.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:36.904349 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jan 22 00:57:36.909770 disk-uuid[451]: The operation has completed successfully. Jan 22 00:57:36.970930 systemd[1]: disk-uuid.service: Deactivated successfully. Jan 22 00:57:36.971161 systemd[1]: Finished Generate new UUID for disk GPT if necessary. Jan 22 00:57:36.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:36.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:36.997543 systemd[1]: Starting Ignition (setup)... Jan 22 00:57:37.042601 kernel: BTRFS info (device vda6): disk space caching is enabled Jan 22 00:57:37.042742 kernel: BTRFS info (device vda6): has skinny extents Jan 22 00:57:37.080499 systemd[1]: mnt-oem.mount: Deactivated successfully. Jan 22 00:57:37.111878 systemd[1]: ignition-setup.service: Deactivated successfully. Jan 22 00:57:37.112127 systemd[1]: Finished Ignition (setup). Jan 22 00:57:37.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:37.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:37.131401 systemd[1]: Starting Ignition (disks)... Jan 22 00:57:37.142798 ignition[503]: Ignition v0.36.1-15-gde4e6cc9 Jan 22 00:57:37.142806 ignition[503]: Stage: disks Jan 22 00:57:37.142816 ignition[503]: reading system config file "/usr/lib/ignition/base.ign" Jan 22 00:57:37.142829 ignition[503]: no config at "/usr/lib/ignition/base.ign" Jan 22 00:57:37.142880 ignition[503]: parsed url from cmdline: "" Jan 22 00:57:37.142884 ignition[503]: no config URL provided Jan 22 00:57:37.142890 ignition[503]: reading system config file "/usr/lib/ignition/user.ign" Jan 22 00:57:37.142899 ignition[503]: no config at "/usr/lib/ignition/user.ign" Jan 22 00:57:37.142916 ignition[503]: op(1): [started] loading QEMU firmware config module Jan 22 00:57:37.142922 ignition[503]: op(1): executing: "modprobe" "qemu_fw_cfg" Jan 22 00:57:37.146816 ignition[503]: op(1): [finished] loading QEMU firmware config module Jan 22 00:57:37.351395 ignition[503]: parsing config with SHA512: 4ec8b3f8f943821d4248df120801df61441b254d184eb3feab20e38387d4618cc70896c086f1cb5380bb2d8df502d82ee2e4af30fe9a64924cb80cc3f51330c5 Jan 22 00:57:37.356827 ignition[503]: disks: disks passed Jan 22 00:57:37.356884 ignition[503]: Ignition finished successfully Jan 22 00:57:37.373586 systemd[1]: ignition-disks.service: Deactivated successfully. Jan 22 00:57:37.374030 systemd[1]: Finished Ignition (disks). Jan 22 00:57:37.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:37.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:37.403191 systemd[1]: Reached target Preparation for Local File Systems. Jan 22 00:57:37.417519 systemd[1]: Starting File System Check on /dev/disk/by-label/ROOT... Jan 22 00:57:37.434780 systemd[1]: Starting Verity Setup for /dev/mapper/usr... Jan 22 00:57:37.465793 systemd-fsck[516]: ROOT: clean, 556/553792 files, 37783/553472 blocks Jan 22 00:57:37.478408 systemd[1]: Finished File System Check on /dev/disk/by-label/ROOT. Jan 22 00:57:37.521303 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Jan 22 00:57:37.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:37.521294 systemd[1]: Mounting /sysroot... Jan 22 00:57:37.659156 systemd[1]: Found device /dev/mapper/usr. Jan 22 00:57:37.675365 systemd[1]: Starting File System Check on /dev/mapper/usr... Jan 22 00:57:37.712574 systemd[1]: Finished Verity Setup for /dev/mapper/usr. Jan 22 00:57:37.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:37.766944 systemd-fsck[530]: fsck.ext4: Operation not permitted while trying to open /dev/mapper/usr Jan 22 00:57:37.766944 systemd-fsck[530]: You must have r/w access to the filesystem or be root Jan 22 00:57:37.766513 systemd-fsck[527]: fsck failed with exit status 8. Jan 22 00:57:37.766518 systemd-fsck[527]: Ignoring error. Jan 22 00:57:37.768880 systemd[1]: Finished File System Check on /dev/mapper/usr. Jan 22 00:57:37.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:37.834716 systemd[1]: Mounting /sysusr/usr... Jan 22 00:57:37.882598 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null) Jan 22 00:57:37.882765 kernel: ext4 filesystem being mounted at /sysroot supports timestamps until 2038 (0x7fffffff) Jan 22 00:57:37.883236 systemd[1]: Mounted /sysroot. Jan 22 00:57:37.900408 systemd[1]: Reached target Initrd Root File System. Jan 22 00:57:37.921367 systemd-networkd[348]: eth0: Gained IPv6LL Jan 22 00:57:37.933365 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: (null) Jan 22 00:57:37.928907 systemd[1]: Mounted /sysusr/usr. Jan 22 00:57:37.940336 systemd[1]: Reached target Local File Systems. Jan 22 00:57:37.940556 systemd[1]: Reached target System Initialization. Jan 22 00:57:37.956318 systemd[1]: Reached target Basic System. Jan 22 00:57:37.973057 systemd[1]: Mounting /sysroot/usr... Jan 22 00:57:37.982924 systemd[1]: Mounted /sysroot/usr. Jan 22 00:57:38.000283 systemd[1]: Starting Root filesystem setup... Jan 22 00:57:38.105146 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jan 22 00:57:38.105312 systemd[1]: Finished Root filesystem setup. Jan 22 00:57:38.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:38.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:38.123085 systemd[1]: Starting Ignition (files)... Jan 22 00:57:38.135263 systemd[1]: Starting /sysroot/boot... Jan 22 00:57:38.156887 ignition[545]: Ignition v0.36.1-15-gde4e6cc9 Jan 22 00:57:38.156962 ignition[545]: Stage: files Jan 22 00:57:38.156973 ignition[545]: reading system config file "/usr/lib/ignition/base.ign" Jan 22 00:57:38.156985 ignition[545]: no config at "/usr/lib/ignition/base.ign" Jan 22 00:57:38.158226 ignition[545]: files: compiled without relabeling support, skipping Jan 22 00:57:38.215375 systemd[1]: Finished /sysroot/boot. Jan 22 00:57:38.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:38.304166 ignition[545]: files: createUsers: op(1): [started] creating or modifying user "core" Jan 22 00:57:38.304252 ignition[545]: files: createUsers: op(1): executing: "/usr/sbin/usermod" "--root" "/sysroot" "core" Jan 22 00:57:38.320418 ignition[545]: files: createUsers: op(1): [finished] creating or modifying user "core" Jan 22 00:57:38.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:38.338000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:38.320508 ignition[545]: files: createUsers: op(2): [started] adding ssh keys to user "core" Jan 22 00:57:38.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:38.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:38.327884 systemd[1]: ignition-files.service: Deactivated successfully. Jan 22 00:57:38.377000 audit: BPF prog-id=6 op=UNLOAD Jan 22 00:57:38.325116 ignition[545]: files: createUsers: op(2): [finished] adding ssh keys to user "core" Jan 22 00:57:38.385000 audit: BPF prog-id=10 op=UNLOAD Jan 22 00:57:38.397000 audit: BPF prog-id=3 op=UNLOAD Jan 22 00:57:38.398000 audit: BPF prog-id=9 op=UNLOAD Jan 22 00:57:38.328073 systemd[1]: Finished Ignition (files). Jan 22 00:57:38.325147 ignition[545]: files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/etc/flatcar/update.conf" Jan 22 00:57:38.338978 systemd[1]: Condition check resulted in Populate torcx store to satisfy profile being skipped. Jan 22 00:57:38.325848 ignition[545]: files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/etc/flatcar/update.conf" Jan 22 00:57:38.340094 systemd[1]: Starting Ignition (record completion)... Jan 22 00:57:38.325859 ignition[545]: files: op(4): [started] processing unit "coreos-metadata.service" Jan 22 00:57:38.353721 systemd[1]: Starting Reload Configuration from the Real Root... Jan 22 00:57:38.325891 ignition[545]: files: op(4): op(5): [started] writing unit "coreos-metadata.service" at "etc/systemd/system/coreos-metadata.service" Jan 22 00:57:38.357048 systemd[1]: ignition-quench.service: Deactivated successfully. Jan 22 00:57:38.326594 ignition[545]: files: op(4): op(5): [finished] writing unit "coreos-metadata.service" at "etc/systemd/system/coreos-metadata.service" Jan 22 00:57:38.357233 systemd[1]: Finished Ignition (record completion). Jan 22 00:57:38.326601 ignition[545]: files: op(4): [finished] processing unit "coreos-metadata.service" Jan 22 00:57:38.366416 systemd[1]: Reloading. Jan 22 00:57:38.326717 ignition[545]: files: files passed Jan 22 00:57:38.326724 ignition[545]: Ignition finished successfully Jan 22 00:57:38.580000 audit: BPF prog-id=11 op=LOAD Jan 22 00:57:38.580000 audit: BPF prog-id=12 op=LOAD Jan 22 00:57:38.582000 audit: BPF prog-id=13 op=LOAD Jan 22 00:57:38.582000 audit: BPF prog-id=7 op=UNLOAD Jan 22 00:57:38.582000 audit: BPF prog-id=8 op=UNLOAD Jan 22 00:57:38.584000 audit: BPF prog-id=14 op=LOAD Jan 22 00:57:38.586000 audit: BPF prog-id=15 op=LOAD Jan 22 00:57:38.595000 audit: BPF prog-id=16 op=LOAD Jan 22 00:57:38.596000 audit: BPF prog-id=17 op=LOAD Jan 22 00:57:38.596000 audit: BPF prog-id=4 op=UNLOAD Jan 22 00:57:38.596000 audit: BPF prog-id=5 op=UNLOAD Jan 22 00:57:38.597000 audit: BPF prog-id=18 op=LOAD Jan 22 00:57:38.632303 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jan 22 00:57:38.632779 systemd[1]: Finished Reload Configuration from the Real Root. Jan 22 00:57:38.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:38.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:38.654824 systemd[1]: Reached target Initrd File Systems. Jan 22 00:57:38.659932 systemd[1]: Reached target Initrd Default Target. Jan 22 00:57:38.665741 systemd[1]: Condition check resulted in dracut mount hook being skipped. Jan 22 00:57:38.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:38.667537 systemd[1]: Starting dracut pre-pivot and cleanup hook... Jan 22 00:57:38.687365 systemd[1]: Finished dracut pre-pivot and cleanup hook. Jan 22 00:57:38.709289 systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Jan 22 00:57:38.731306 systemd[1]: Stopped target Host and Network Name Lookups. Jan 22 00:57:38.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:38.739303 systemd[1]: Stopped target Remote Encrypted Volumes. Jan 22 00:57:38.748027 systemd[1]: Stopped target Timer Units. Jan 22 00:57:38.754867 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jan 22 00:57:38.755084 systemd[1]: Stopped dracut pre-pivot and cleanup hook. Jan 22 00:57:38.769812 systemd[1]: Stopped target Initrd Default Target. Jan 22 00:57:38.785849 systemd[1]: Stopped target Basic System. Jan 22 00:57:38.806198 systemd[1]: Stopped target Initrd Root Device. Jan 22 00:57:38.825273 systemd[1]: Stopped target Path Units. Jan 22 00:57:38.839033 systemd[1]: Stopped target Remote File Systems. Jan 22 00:57:38.852789 systemd[1]: Stopped target Preparation for Remote File Systems. Jan 22 00:57:38.860339 systemd[1]: Stopped target Slice Units. Jan 22 00:57:38.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:38.873132 systemd[1]: Stopped target Socket Units. Jan 22 00:57:38.896943 systemd[1]: Stopped target System Initialization. Jan 22 00:57:38.910003 systemd[1]: Stopped target Local File Systems. Jan 22 00:57:39.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:38.924011 systemd[1]: Stopped target Preparation for Local File Systems. Jan 22 00:57:39.023108 iscsid[455]: iscsid shutting down. Jan 22 00:57:39.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:38.939997 systemd[1]: Stopped target Swaps. Jan 22 00:57:39.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:39.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:38.945775 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jan 22 00:57:38.945994 systemd[1]: Stopped dracut pre-mount hook. Jan 22 00:57:39.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:39.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:38.958372 systemd[1]: Stopped target Local Encrypted Volumes. Jan 22 00:57:38.970060 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jan 22 00:57:38.976388 systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Jan 22 00:57:39.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:38.987252 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jan 22 00:57:38.987398 systemd[1]: Stopped dracut initqueue hook. Jan 22 00:57:39.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:39.001426 systemd[1]: Stopping Open-iSCSI... Jan 22 00:57:39.012954 systemd[1]: Stopping /sysroot/boot... Jan 22 00:57:39.022996 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jan 22 00:57:39.023224 systemd[1]: Stopped Coldplug All udev Devices. Jan 22 00:57:39.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:39.029396 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jan 22 00:57:39.029815 systemd[1]: Stopped dracut pre-trigger hook. Jan 22 00:57:39.227000 audit: BPF prog-id=14 op=UNLOAD Jan 22 00:57:39.042931 systemd[1]: iscsid.service: Deactivated successfully. Jan 22 00:57:39.043062 systemd[1]: Stopped Open-iSCSI. Jan 22 00:57:39.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:39.052368 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jan 22 00:57:39.056806 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jan 22 00:57:39.056995 systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Jan 22 00:57:39.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:39.068349 systemd[1]: iscsid.socket: Deactivated successfully. Jan 22 00:57:39.354996 kernel: kauditd_printk_skb: 53 callbacks suppressed Jan 22 00:57:39.355023 kernel: audit: type=1131 audit(1769043459.301:71): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:39.068421 systemd[1]: Closed Open-iSCSI iscsid Socket. Jan 22 00:57:39.078115 systemd[1]: Stopping iSCSI UserSpace I/O driver... Jan 22 00:57:39.110337 systemd[1]: iscsiuio.service: Deactivated successfully. Jan 22 00:57:39.110603 systemd[1]: Stopped iSCSI UserSpace I/O driver. Jan 22 00:57:39.126248 systemd[1]: sysroot-boot.service: Deactivated successfully. Jan 22 00:57:39.126521 systemd[1]: Stopped /sysroot/boot. Jan 22 00:57:39.140356 systemd[1]: Stopped target Network. Jan 22 00:57:39.153104 systemd[1]: iscsiuio.socket: Deactivated successfully. Jan 22 00:57:39.153151 systemd[1]: Closed Open-iSCSI iscsiuio Socket. Jan 22 00:57:39.164105 systemd[1]: Stopping Network Name Resolution... Jan 22 00:57:39.176788 systemd[1]: systemd-resolved.service: Deactivated successfully. Jan 22 00:57:39.178373 systemd[1]: Stopped Network Name Resolution. Jan 22 00:57:39.206950 systemd[1]: Stopping Network Configuration... Jan 22 00:57:39.210237 systemd-networkd[348]: eth0: DHCP lease lost Jan 22 00:57:39.237792 systemd-networkd[348]: eth0: DHCPv6 lease lost Jan 22 00:57:39.462163 kernel: audit: type=1334 audit(1769043459.445:72): prog-id=18 op=UNLOAD Jan 22 00:57:39.445000 audit: BPF prog-id=18 op=UNLOAD Jan 22 00:57:39.242320 systemd[1]: systemd-networkd.service: Deactivated successfully. Jan 22 00:57:39.242574 systemd[1]: Stopped Network Configuration. Jan 22 00:57:39.526236 kernel: audit: type=1131 audit(1769043459.470:73): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:39.526402 kernel: audit: type=1334 audit(1769043459.482:74): prog-id=11 op=UNLOAD Jan 22 00:57:39.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:39.482000 audit: BPF prog-id=11 op=UNLOAD Jan 22 00:57:39.249581 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jan 22 00:57:39.256354 systemd[1]: Closed Network Service Netlink Socket. Jan 22 00:57:39.266850 systemd[1]: Stopping Network Cleanup... Jan 22 00:57:39.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:39.276346 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jan 22 00:57:39.617411 kernel: audit: type=1131 audit(1769043459.560:75): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:39.276424 systemd[1]: Stopped Apply Kernel Variables. Jan 22 00:57:39.652111 kernel: audit: type=1131 audit(1769043459.617:76): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:39.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:39.302796 systemd[1]: Stopping Rule-based Manager for Device Events and Files... Jan 22 00:57:39.439820 systemd[1]: systemd-udevd.service: Deactivated successfully. Jan 22 00:57:39.715795 kernel: audit: type=1131 audit(1769043459.669:77): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:39.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:39.446323 systemd[1]: Stopped Rule-based Manager for Device Events and Files. Jan 22 00:57:39.484302 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jan 22 00:57:39.484356 systemd[1]: Closed udev Control Socket. Jan 22 00:57:39.536933 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jan 22 00:57:39.536993 systemd[1]: Closed udev Kernel Socket. Jan 22 00:57:39.549168 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jan 22 00:57:39.826416 kernel: audit: type=1131 audit(1769043459.776:78): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:39.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:39.549237 systemd[1]: Stopped dracut pre-udev hook. Jan 22 00:57:39.561234 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jan 22 00:57:39.561297 systemd[1]: Stopped dracut cmdline hook. Jan 22 00:57:39.881424 kernel: audit: type=1131 audit(1769043459.849:79): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:39.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:39.617993 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jan 22 00:57:39.618072 systemd[1]: Stopped dracut ask for additional cmdline parameters. Jan 22 00:57:39.951137 kernel: audit: type=1131 audit(1769043459.900:80): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:39.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:39.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=rngd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:39.671925 systemd[1]: Starting Cleanup udev Database... Jan 22 00:57:39.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:39.754893 systemd[1]: Stopping Hardware RNG Entropy Gatherer Daemon... Jan 22 00:57:39.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:39.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:39.766989 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jan 22 00:57:39.767079 systemd[1]: Stopped Create Static Device Nodes in /dev. Jan 22 00:57:39.777168 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jan 22 00:57:40.018000 audit: BPF prog-id=15 op=UNLOAD Jan 22 00:57:39.777231 systemd[1]: Stopped Create List of Static Device Nodes. Jan 22 00:57:39.850012 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jan 22 00:57:39.850107 systemd[1]: Stopped Setup Virtual Console. Jan 22 00:57:39.902212 systemd[1]: rngd.service: Deactivated successfully. Jan 22 00:57:39.902379 systemd[1]: Stopped Hardware RNG Entropy Gatherer Daemon. Jan 22 00:57:39.941216 systemd[1]: network-cleanup.service: Deactivated successfully. Jan 22 00:57:39.941412 systemd[1]: Stopped Network Cleanup. Jan 22 00:57:39.957081 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jan 22 00:57:39.957997 systemd[1]: Finished Cleanup udev Database. Jan 22 00:57:39.969879 systemd[1]: Reached target Switch Root. Jan 22 00:57:39.986185 systemd[1]: Starting Switch Root... Jan 22 00:57:40.018598 systemd[1]: Switching root. Jan 22 00:57:40.059719 systemd-journald[191]: Journal stopped Jan 22 00:57:45.357933 systemd-journald[191]: Received SIGTERM from PID 1 (n/a). Jan 22 00:57:45.357989 kernel: SELinux: policy capability network_peer_controls=1 Jan 22 00:57:45.358001 kernel: SELinux: policy capability open_perms=1 Jan 22 00:57:45.358010 kernel: SELinux: policy capability extended_socket_class=1 Jan 22 00:57:45.358018 kernel: SELinux: policy capability always_check_network=0 Jan 22 00:57:45.358025 kernel: SELinux: policy capability cgroup_seclabel=1 Jan 22 00:57:45.358032 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 22 00:57:45.358039 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jan 22 00:57:45.358046 systemd[1]: Successfully loaded SELinux policy in 119.899ms. Jan 22 00:57:45.358059 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 11.718ms. Jan 22 00:57:45.358068 systemd[1]: systemd 249 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jan 22 00:57:45.358077 systemd[1]: Detected virtualization kvm. Jan 22 00:57:45.358084 systemd[1]: Detected architecture x86-64. Jan 22 00:57:45.358091 systemd[1]: Detected first boot. Jan 22 00:57:45.358098 systemd[1]: Initializing machine ID from VM UUID. Jan 22 00:57:45.358106 systemd[1]: Populated /etc with preset unit settings. Jan 22 00:57:45.358115 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jan 22 00:57:45.358126 systemd[1]: initrd-switch-root.service: Current command vanished from the unit file, execution of the command list won't be resumed. Jan 22 00:57:45.358137 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jan 22 00:57:45.358144 systemd[1]: Stopped Switch Root. Jan 22 00:57:45.358155 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jan 22 00:57:45.358162 systemd[1]: Created slice Slice /system/addon-config. Jan 22 00:57:45.358174 systemd[1]: Created slice Slice /system/addon-run. Jan 22 00:57:45.358189 systemd[1]: Created slice Slice /system/getty. Jan 22 00:57:45.358202 systemd[1]: Created slice Slice /system/modprobe. Jan 22 00:57:45.358213 systemd[1]: Created slice Slice /system/serial-getty. Jan 22 00:57:45.358224 systemd[1]: Created slice Slice /system/system-cloudinit. Jan 22 00:57:45.358237 systemd[1]: Created slice Slice /system/systemd-fsck. Jan 22 00:57:45.358248 systemd[1]: Created slice User and Session Slice. Jan 22 00:57:45.358258 systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Jan 22 00:57:45.358271 systemd[1]: Started Forward Password Requests to Wall Directory Watch. Jan 22 00:57:45.358284 systemd[1]: Set up automount Boot partition Automount Point. Jan 22 00:57:45.358298 systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Jan 22 00:57:45.358309 systemd[1]: Stopped target Switch Root. Jan 22 00:57:45.358320 systemd[1]: Stopped target Initrd File Systems. Jan 22 00:57:45.358331 systemd[1]: Stopped target Initrd Root File System. Jan 22 00:57:45.358344 systemd[1]: Reached target Remote Encrypted Volumes. Jan 22 00:57:45.358356 systemd[1]: Reached target Remote File Systems. Jan 22 00:57:45.358367 systemd[1]: Reached target Slice Units. Jan 22 00:57:45.358381 systemd[1]: Reached target Swaps. Jan 22 00:57:45.358394 systemd[1]: Reached target Verify torcx succeeded. Jan 22 00:57:45.358409 systemd[1]: Reached target Local Verity Protected Volumes. Jan 22 00:57:45.358422 systemd[1]: Listening on Process Core Dump Socket. Jan 22 00:57:45.358436 systemd[1]: Listening on initctl Compatibility Named Pipe. Jan 22 00:57:45.358450 systemd[1]: Listening on Network Service Netlink Socket. Jan 22 00:57:45.358463 systemd[1]: Listening on udev Control Socket. Jan 22 00:57:45.358480 systemd[1]: Listening on udev Kernel Socket. Jan 22 00:57:45.358568 systemd[1]: Mounting Huge Pages File System... Jan 22 00:57:45.358581 systemd[1]: Mounting POSIX Message Queue File System... Jan 22 00:57:45.358595 systemd[1]: Mounting External Media Directory... Jan 22 00:57:45.358762 systemd[1]: Condition check resulted in /proc/xen being skipped. Jan 22 00:57:45.358781 systemd[1]: Mounting Kernel Debug File System... Jan 22 00:57:45.358796 systemd[1]: Mounting Kernel Trace File System... Jan 22 00:57:45.358807 systemd[1]: Mounting Temporary Directory /tmp... Jan 22 00:57:45.358818 systemd[1]: Starting Create missing system files... Jan 22 00:57:45.358832 systemd[1]: Starting Create List of Static Device Nodes... Jan 22 00:57:45.358843 systemd[1]: Starting Load Kernel Module configfs... Jan 22 00:57:45.358854 systemd[1]: Starting Load Kernel Module drm... Jan 22 00:57:45.358867 systemd[1]: Starting Load Kernel Module fuse... Jan 22 00:57:45.358880 systemd[1]: Condition check resulted in Create /etc/nsswitch.conf being skipped. Jan 22 00:57:45.358889 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jan 22 00:57:45.358897 systemd[1]: Stopped File System Check on Root Device. Jan 22 00:57:45.358905 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jan 22 00:57:45.358913 kernel: kauditd_printk_skb: 22 callbacks suppressed Jan 22 00:57:45.358921 kernel: audit: type=1131 audit(1769043464.955:103): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:45.358931 systemd[1]: Stopped systemd-fsck-usr.service. Jan 22 00:57:45.358938 kernel: fuse: init (API version 7.32) Jan 22 00:57:45.358945 kernel: audit: type=1131 audit(1769043465.035:104): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:45.358953 systemd[1]: Stopped Journal Service. Jan 22 00:57:45.358960 systemd[1]: systemd-journald.service: Consumed 2.292s CPU time. Jan 22 00:57:45.358968 kernel: audit: type=1130 audit(1769043465.087:105): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:45.358975 kernel: audit: type=1131 audit(1769043465.087:106): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:45.358983 kernel: audit: type=1334 audit(1769043465.169:107): prog-id=24 op=LOAD Jan 22 00:57:45.358990 kernel: audit: type=1334 audit(1769043465.181:108): prog-id=25 op=LOAD Jan 22 00:57:45.358996 kernel: audit: type=1334 audit(1769043465.191:109): prog-id=26 op=LOAD Jan 22 00:57:45.359003 systemd[1]: Starting Journal Service... Jan 22 00:57:45.359011 kernel: audit: type=1334 audit(1769043465.191:110): prog-id=22 op=UNLOAD Jan 22 00:57:45.359017 kernel: audit: type=1334 audit(1769043465.191:111): prog-id=23 op=UNLOAD Jan 22 00:57:45.359025 systemd[1]: Condition check resulted in Load Kernel Modules being skipped. Jan 22 00:57:45.359032 systemd[1]: Starting Remount Root and Kernel File Systems... Jan 22 00:57:45.359039 systemd[1]: Starting Apply Kernel Variables... Jan 22 00:57:45.359046 systemd[1]: Starting Coldplug All udev Devices... Jan 22 00:57:45.359055 systemd[1]: verity-setup.service: Deactivated successfully. Jan 22 00:57:45.359063 kernel: audit: type=1305 audit(1769043465.336:112): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jan 22 00:57:45.359070 systemd[1]: Stopped verity-setup.service. Jan 22 00:57:45.359081 systemd-journald[763]: Journal started Jan 22 00:57:45.359126 systemd-journald[763]: Runtime Journal (/run/log/journal/25310355d12c4798885c5d1914965017) is 6.0M, max 48.7M, 42.6M free. Jan 22 00:57:40.378000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jan 22 00:57:40.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jan 22 00:57:40.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jan 22 00:57:40.577000 audit: BPF prog-id=19 op=LOAD Jan 22 00:57:40.577000 audit: BPF prog-id=19 op=UNLOAD Jan 22 00:57:40.577000 audit: BPF prog-id=20 op=LOAD Jan 22 00:57:40.577000 audit: BPF prog-id=20 op=UNLOAD Jan 22 00:57:40.740000 audit[709]: AVC avc: denied { associate } for pid=709 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jan 22 00:57:44.161000 audit: BPF prog-id=21 op=LOAD Jan 22 00:57:44.163000 audit: BPF prog-id=22 op=LOAD Jan 22 00:57:44.164000 audit: BPF prog-id=23 op=LOAD Jan 22 00:57:44.164000 audit: BPF prog-id=16 op=UNLOAD Jan 22 00:57:44.164000 audit: BPF prog-id=17 op=UNLOAD Jan 22 00:57:44.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:44.184000 audit: BPF prog-id=21 op=UNLOAD Jan 22 00:57:44.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:44.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:44.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:45.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:45.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:45.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:45.169000 audit: BPF prog-id=24 op=LOAD Jan 22 00:57:45.181000 audit: BPF prog-id=25 op=LOAD Jan 22 00:57:45.191000 audit: BPF prog-id=26 op=LOAD Jan 22 00:57:45.191000 audit: BPF prog-id=22 op=UNLOAD Jan 22 00:57:45.191000 audit: BPF prog-id=23 op=UNLOAD Jan 22 00:57:45.336000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jan 22 00:57:40.730390 /usr/lib64/systemd/system-generators/torcx-generator[709]: time="2026-01-22T00:57:40Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3033.2.4 /usr/share/oem/torcx/store /var/lib/torcx/store/3033.2.4 /var/lib/torcx/store]" Jan 22 00:57:44.149221 systemd[1]: Queued start job for default target Multi-User System. Jan 22 00:57:40.734000 /usr/lib64/systemd/system-generators/torcx-generator[709]: time="2026-01-22T00:57:40Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jan 22 00:57:44.165734 systemd[1]: systemd-journald.service: Deactivated successfully. Jan 22 00:57:40.734024 /usr/lib64/systemd/system-generators/torcx-generator[709]: time="2026-01-22T00:57:40Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jan 22 00:57:44.166229 systemd[1]: systemd-journald.service: Consumed 2.292s CPU time. Jan 22 00:57:40.734855 /usr/lib64/systemd/system-generators/torcx-generator[709]: time="2026-01-22T00:57:40Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jan 22 00:57:40.734876 /usr/lib64/systemd/system-generators/torcx-generator[709]: time="2026-01-22T00:57:40Z" level=debug msg="skipped missing lower profile" missing profile=oem Jan 22 00:57:40.734923 /usr/lib64/systemd/system-generators/torcx-generator[709]: time="2026-01-22T00:57:40Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jan 22 00:57:40.735133 /usr/lib64/systemd/system-generators/torcx-generator[709]: time="2026-01-22T00:57:40Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jan 22 00:57:40.735378 /usr/lib64/systemd/system-generators/torcx-generator[709]: time="2026-01-22T00:57:40Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jan 22 00:57:40.735420 /usr/lib64/systemd/system-generators/torcx-generator[709]: time="2026-01-22T00:57:40Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jan 22 00:57:40.735437 /usr/lib64/systemd/system-generators/torcx-generator[709]: time="2026-01-22T00:57:40Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jan 22 00:57:40.738970 /usr/lib64/systemd/system-generators/torcx-generator[709]: time="2026-01-22T00:57:40Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jan 22 00:57:40.739020 /usr/lib64/systemd/system-generators/torcx-generator[709]: time="2026-01-22T00:57:40Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jan 22 00:57:40.739054 /usr/lib64/systemd/system-generators/torcx-generator[709]: time="2026-01-22T00:57:40Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3033.2.4: no such file or directory" path=/usr/share/oem/torcx/store/3033.2.4 Jan 22 00:57:40.739077 /usr/lib64/systemd/system-generators/torcx-generator[709]: time="2026-01-22T00:57:40Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jan 22 00:57:40.739102 /usr/lib64/systemd/system-generators/torcx-generator[709]: time="2026-01-22T00:57:40Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3033.2.4: no such file or directory" path=/var/lib/torcx/store/3033.2.4 Jan 22 00:57:40.739119 /usr/lib64/systemd/system-generators/torcx-generator[709]: time="2026-01-22T00:57:40Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jan 22 00:57:43.675714 /usr/lib64/systemd/system-generators/torcx-generator[709]: time="2026-01-22T00:57:43Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jan 22 00:57:43.676150 /usr/lib64/systemd/system-generators/torcx-generator[709]: time="2026-01-22T00:57:43Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jan 22 00:57:43.676282 /usr/lib64/systemd/system-generators/torcx-generator[709]: time="2026-01-22T00:57:43Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jan 22 00:57:43.676444 /usr/lib64/systemd/system-generators/torcx-generator[709]: time="2026-01-22T00:57:43Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jan 22 00:57:43.676596 /usr/lib64/systemd/system-generators/torcx-generator[709]: time="2026-01-22T00:57:43Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jan 22 00:57:43.676780 /usr/lib64/systemd/system-generators/torcx-generator[709]: time="2026-01-22T00:57:43Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jan 22 00:57:45.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:45.384797 systemd[1]: Condition check resulted in Set fake PV driver version for XenServer being skipped. Jan 22 00:57:45.394942 systemd[1]: Started Journal Service. Jan 22 00:57:45.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:45.399880 systemd[1]: Mounted Huge Pages File System. Jan 22 00:57:45.407894 systemd[1]: Mounted POSIX Message Queue File System. Jan 22 00:57:45.417198 systemd[1]: Mounted External Media Directory. Jan 22 00:57:45.425235 systemd[1]: Mounted Kernel Debug File System. Jan 22 00:57:45.432838 systemd[1]: Mounted Kernel Trace File System. Jan 22 00:57:45.440766 systemd[1]: Mounted Temporary Directory /tmp. Jan 22 00:57:45.449831 systemd[1]: Finished Create missing system files. Jan 22 00:57:45.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:45.459972 systemd[1]: Finished Create List of Static Device Nodes. Jan 22 00:57:45.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:45.481171 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jan 22 00:57:45.481887 systemd[1]: Finished Load Kernel Module configfs. Jan 22 00:57:45.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:45.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:45.489001 systemd[1]: modprobe@drm.service: Deactivated successfully. Jan 22 00:57:45.489831 systemd[1]: Finished Load Kernel Module drm. Jan 22 00:57:45.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:45.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:45.500063 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jan 22 00:57:45.500404 systemd[1]: Finished Load Kernel Module fuse. Jan 22 00:57:45.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:45.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:45.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:45.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:45.508438 systemd[1]: Finished Remount Root and Kernel File Systems. Jan 22 00:57:45.519911 systemd[1]: Finished Apply Kernel Variables. Jan 22 00:57:45.542038 systemd[1]: Mounting FUSE Control File System... Jan 22 00:57:45.551251 systemd[1]: Mounting Kernel Configuration File System... Jan 22 00:57:45.557924 systemd[1]: Condition check resulted in Remount Root File System being skipped. Jan 22 00:57:45.560816 systemd[1]: Starting Rebuild Hardware Database... Jan 22 00:57:45.567991 systemd[1]: Starting Flush Journal to Persistent Storage... Jan 22 00:57:45.573919 systemd[1]: Condition check resulted in Platform Persistent Storage Archival being skipped. Jan 22 00:57:45.575913 systemd[1]: Starting Load/Save Random Seed... Jan 22 00:57:45.583367 systemd[1]: Starting Create System Users... Jan 22 00:57:45.584878 systemd-journald[763]: Time spent on flushing to /var/log/journal/25310355d12c4798885c5d1914965017 is 18.716ms for 997 entries. Jan 22 00:57:45.584878 systemd-journald[763]: System Journal (/var/log/journal/25310355d12c4798885c5d1914965017) is 8.0M, max 203.0M, 195.0M free. Jan 22 00:57:45.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:45.602552 systemd[1]: Finished Coldplug All udev Devices. Jan 22 00:57:45.617865 systemd[1]: Mounted FUSE Control File System. Jan 22 00:57:45.623963 systemd[1]: Mounted Kernel Configuration File System. Jan 22 00:57:45.632094 systemd[1]: Finished Load/Save Random Seed. Jan 22 00:57:45.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:45.638816 systemd[1]: Finished Flush Journal to Persistent Storage. Jan 22 00:57:45.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:45.645186 systemd[1]: Reached target First Boot Complete. Jan 22 00:57:45.661839 systemd[1]: Starting Wait for udev To Complete Device Initialization... Jan 22 00:57:45.672198 systemd-sysusers[776]: Creating group sgx with gid 999. Jan 22 00:57:45.675870 systemd-sysusers[776]: Creating group systemd-oom with gid 998. Jan 22 00:57:45.678159 systemd-sysusers[776]: Creating user systemd-oom (systemd Userspace OOM Killer) with uid 998 and gid 998. Jan 22 00:57:45.680855 systemd-sysusers[776]: Creating group systemd-timesync with gid 997. Jan 22 00:57:45.683141 systemd-sysusers[776]: Creating user systemd-timesync (systemd Time Synchronization) with uid 997 and gid 997. Jan 22 00:57:45.687855 systemd-sysusers[776]: Creating group systemd-coredump with gid 996. Jan 22 00:57:45.690580 systemd-sysusers[776]: Creating user systemd-coredump (systemd Core Dumper) with uid 996 and gid 996. Jan 22 00:57:45.734094 systemd[1]: Finished Create System Users. Jan 22 00:57:45.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:45.749110 systemd[1]: Starting Create Static Device Nodes in /dev... Jan 22 00:57:45.820164 systemd[1]: Finished Create Static Device Nodes in /dev. Jan 22 00:57:45.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:46.007945 systemd[1]: Finished Rebuild Hardware Database. Jan 22 00:57:46.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:46.029000 audit: BPF prog-id=27 op=LOAD Jan 22 00:57:46.030000 audit: BPF prog-id=28 op=LOAD Jan 22 00:57:46.031000 audit: BPF prog-id=29 op=LOAD Jan 22 00:57:46.031000 audit: BPF prog-id=12 op=UNLOAD Jan 22 00:57:46.031000 audit: BPF prog-id=13 op=UNLOAD Jan 22 00:57:46.036907 systemd[1]: Starting Rule-based Manager for Device Events and Files... Jan 22 00:57:46.153829 systemd[1]: Started Rule-based Manager for Device Events and Files. Jan 22 00:57:46.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:46.175000 audit: BPF prog-id=30 op=LOAD Jan 22 00:57:46.179204 systemd[1]: Starting Network Configuration... Jan 22 00:57:46.213095 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Jan 22 00:57:46.219082 systemd-udevd[790]: Using default interface naming scheme 'v249'. Jan 22 00:57:46.236940 kernel: ACPI: Power Button [PWRF] Jan 22 00:57:46.267000 audit[789]: AVC avc: denied { confidentiality } for pid=789 comm="systemd-udevd" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jan 22 00:57:46.301023 systemd-networkd[801]: lo: Link UP Jan 22 00:57:46.301031 systemd-networkd[801]: lo: Gained carrier Jan 22 00:57:46.301564 systemd-networkd[801]: Enumeration completed Jan 22 00:57:46.302315 systemd[1]: Started Network Configuration. Jan 22 00:57:46.306073 systemd-networkd[801]: eth0: Link UP Jan 22 00:57:46.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:46.317773 systemd-networkd[801]: eth0: Gained carrier Jan 22 00:57:46.327128 systemd-networkd[801]: eth0: DHCPv4 address 10.0.0.4/16 via 10.0.0.1 Jan 22 00:57:46.355849 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Jan 22 00:57:46.375973 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Jan 22 00:57:46.376224 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Jan 22 00:57:46.376336 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Jan 22 00:57:46.397450 udevadm[781]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jan 22 00:57:46.408158 kernel: mousedev: PS/2 mouse device common for all mice Jan 22 00:57:46.500837 kernel: kvm: Nested Virtualization enabled Jan 22 00:57:46.500934 kernel: SVM: kvm: Nested Paging enabled Jan 22 00:57:46.500951 kernel: SVM: Virtual VMLOAD VMSAVE supported Jan 22 00:57:46.515844 kernel: EDAC MC: Ver: 3.0.0 Jan 22 00:57:47.049124 systemd[1]: Finished Wait for udev To Complete Device Initialization. Jan 22 00:57:47.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:47.070918 systemd[1]: Starting Activation of LVM2 logical volumes... Jan 22 00:57:47.114960 lvm[814]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jan 22 00:57:47.144972 systemd[1]: Finished Activation of LVM2 logical volumes. Jan 22 00:57:47.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:47.158088 systemd[1]: Reached target Local Encrypted Volumes. Jan 22 00:57:47.181303 systemd[1]: Starting Activation of LVM2 logical volumes... Jan 22 00:57:47.192069 lvm[815]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jan 22 00:57:47.217252 systemd[1]: Finished Activation of LVM2 logical volumes. Jan 22 00:57:47.228150 systemd[1]: Reached target Preparation for Local File Systems. Jan 22 00:57:47.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:47.237960 systemd[1]: Condition check resulted in Virtual Machine and Container Storage (Compatibility) being skipped. Jan 22 00:57:47.238054 systemd[1]: Reached target Containers. Jan 22 00:57:47.255093 systemd[1]: Starting File System Check on /dev/disk/by-label/OEM... Jan 22 00:57:47.298918 systemd[1]: Finished File System Check on /dev/disk/by-label/OEM. Jan 22 00:57:47.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:47.324859 systemd[1]: Mounting /usr/share/oem... Jan 22 00:57:47.360327 kernel: BTRFS info (device vda6): disk space caching is enabled Jan 22 00:57:47.360455 kernel: BTRFS info (device vda6): has skinny extents Jan 22 00:57:47.388209 systemd[1]: Mounted /usr/share/oem. Jan 22 00:57:47.396998 systemd[1]: Reached target Local File Systems. Jan 22 00:57:47.419065 systemd[1]: Starting Rebuild Dynamic Linker Cache... Jan 22 00:57:47.428574 systemd[1]: Condition check resulted in Set Up Additional Binary Formats being skipped. Jan 22 00:57:47.428743 systemd[1]: Condition check resulted in Store a System Token in an EFI Variable being skipped. Jan 22 00:57:47.430127 systemd[1]: Starting Commit a transient machine-id on disk... Jan 22 00:57:47.441126 systemd[1]: Starting Create Volatile Files and Directories... Jan 22 00:57:47.454312 systemd-tmpfiles[840]: /usr/lib64/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jan 22 00:57:47.456152 systemd-tmpfiles[840]: /usr/lib64/tmpfiles.d/systemd.conf:33: Duplicate line for path "/var/lib/systemd", ignoring. Jan 22 00:57:47.505041 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jan 22 00:57:47.507126 systemd[1]: Finished Commit a transient machine-id on disk. Jan 22 00:57:47.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:47.556851 systemd-tmpfiles[840]: Detected autofs mount point /boot during canonicalization of /boot. Jan 22 00:57:47.556925 systemd-tmpfiles[840]: Skipping /boot Jan 22 00:57:47.566982 systemd-tmpfiles[840]: Detected autofs mount point /boot during canonicalization of /boot. Jan 22 00:57:47.567062 systemd-tmpfiles[840]: Skipping /boot Jan 22 00:57:47.631147 systemd[1]: Finished Create Volatile Files and Directories. Jan 22 00:57:47.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:47.650881 systemd[1]: Starting Load Security Auditing Rules... Jan 22 00:57:47.660276 systemd[1]: Starting Clean up broken links in /etc/ssl/certs... Jan 22 00:57:47.670219 systemd[1]: Starting Rebuild Journal Catalog... Jan 22 00:57:47.676000 audit: BPF prog-id=31 op=LOAD Jan 22 00:57:47.681606 systemd[1]: Starting Network Name Resolution... Jan 22 00:57:47.691000 audit: BPF prog-id=32 op=LOAD Jan 22 00:57:47.692859 systemd[1]: Starting Network Time Synchronization... Jan 22 00:57:47.705970 systemd[1]: Starting Record System Boot/Shutdown in UTMP... Jan 22 00:57:47.717222 systemd[1]: Finished Clean up broken links in /etc/ssl/certs. Jan 22 00:57:47.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:47.731000 audit[852]: SYSTEM_BOOT pid=852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib64/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jan 22 00:57:47.737037 systemd[1]: Condition check resulted in Update CA bundle at /etc/ssl/certs/ca-certificates.crt being skipped. Jan 22 00:57:47.743901 systemd[1]: Finished Record System Boot/Shutdown in UTMP. Jan 22 00:57:47.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:47.760894 systemd[1]: Finished Rebuild Journal Catalog. Jan 22 00:57:47.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:47.841733 systemd-networkd[801]: eth0: Gained IPv6LL Jan 22 00:57:47.844000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jan 22 00:57:47.847017 augenrules[861]: No rules Jan 22 00:57:47.846904 systemd[1]: Finished Load Security Auditing Rules. Jan 22 00:57:47.862050 systemd-resolved[850]: Positive Trust Anchors: Jan 22 00:57:47.862116 systemd-resolved[850]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jan 22 00:57:47.862149 systemd-resolved[850]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jan 22 00:57:47.865981 systemd-resolved[850]: Defaulting to hostname 'linux'. Jan 22 00:57:47.867735 systemd[1]: Started Network Time Synchronization. Jan 22 00:57:47.875926 systemd[1]: Started Network Name Resolution. Jan 22 00:57:47.883390 systemd[1]: Reached target Network. Jan 22 00:57:47.891109 systemd[1]: Reached target Host and Network Name Lookups. Jan 22 00:57:47.903405 systemd[1]: Reached target System Time Set. Jan 22 00:57:47.910052 systemd-timesyncd[851]: Initial synchronization to time server 10.0.0.1:123 (10.0.0.1). Jan 22 00:57:49.135167 systemd[1]: Finished Rebuild Dynamic Linker Cache. Jan 22 00:57:49.158103 systemd[1]: Starting Update is Completed... Jan 22 00:57:49.181347 systemd[1]: Finished Update is Completed. Jan 22 00:57:49.188341 systemd[1]: Reached target System Initialization. Jan 22 00:57:49.196363 systemd[1]: Started Watch for update engine configuration changes. Jan 22 00:57:49.203322 systemd[1]: Started Watch for a cloud-config at /var/lib/flatcar-install/user_data. Jan 22 00:57:49.212093 systemd[1]: Started Daily Log Rotation. Jan 22 00:57:49.218095 systemd[1]: Started Weekly check for MD array's redundancy information.. Jan 22 00:57:49.232298 systemd[1]: Started Daily Cleanup of Temporary Directories. Jan 22 00:57:49.241923 systemd[1]: Condition check resulted in Update Engine Stub Timer being skipped. Jan 22 00:57:49.242025 systemd[1]: Reached target Path Units. Jan 22 00:57:49.250039 systemd[1]: Reached target Timer Units. Jan 22 00:57:49.257347 systemd[1]: Listening on D-Bus System Message Bus Socket. Jan 22 00:57:49.273803 systemd[1]: Starting Docker Socket for the API... Jan 22 00:57:49.287762 systemd[1]: Listening on OpenSSH Server Socket. Jan 22 00:57:49.295915 systemd[1]: Listening on Docker Socket for the API. Jan 22 00:57:49.303417 systemd[1]: Reached target Socket Units. Jan 22 00:57:49.309349 systemd[1]: Reached target Basic System. Jan 22 00:57:49.314857 systemd[1]: Condition check resulted in Configure Addon /usr/share/oem being skipped. Jan 22 00:57:49.314939 systemd[1]: Condition check resulted in Run Addon /usr/share/oem being skipped. Jan 22 00:57:49.319285 systemd[1]: Started D-Bus System Message Bus. Jan 22 00:57:49.331564 systemd[1]: Starting Extend Filesystems... Jan 22 00:57:49.339144 systemd[1]: Condition check resulted in Modifies /etc/environment for CoreOS being skipped. Jan 22 00:57:49.341115 systemd[1]: Starting Generate /run/flatcar/motd... Jan 22 00:57:49.351470 systemd[1]: Starting Install an ssh key from /proc/cmdline... Jan 22 00:57:49.358199 extend-filesystems[872]: Found sr0 Jan 22 00:57:49.358199 extend-filesystems[872]: Found vda Jan 22 00:57:49.358199 extend-filesystems[872]: Found vda1 Jan 22 00:57:49.358199 extend-filesystems[872]: Found vda2 Jan 22 00:57:49.358199 extend-filesystems[872]: Found vda3 Jan 22 00:57:49.358199 extend-filesystems[872]: Found usr Jan 22 00:57:49.358199 extend-filesystems[872]: Found vda4 Jan 22 00:57:49.358199 extend-filesystems[872]: Found vda6 Jan 22 00:57:49.358199 extend-filesystems[872]: Found vda7 Jan 22 00:57:49.358199 extend-filesystems[872]: Found vda9 Jan 22 00:57:49.358199 extend-filesystems[872]: Checking size of /dev/vda9 Jan 22 00:57:49.387252 systemd[1]: Starting Generate sshd host keys... Jan 22 00:57:49.443134 extend-filesystems[872]: Old size kept for /dev/vda9 Jan 22 00:57:49.401795 systemd[1]: Condition check resulted in Load cloud-config from /usr/share/oem/cloud-config.yml being skipped. Jan 22 00:57:49.405948 systemd[1]: Reached target Load system-provided cloud configs. Jan 22 00:57:49.449423 systemd[1]: Starting User Login Management... Jan 22 00:57:49.456229 systemd[1]: Condition check resulted in TCG Core Services Daemon being skipped. Jan 22 00:57:49.456954 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jan 22 00:57:49.458269 systemd[1]: Starting Update Engine... Jan 22 00:57:49.464955 systemd[1]: Condition check resulted in Load cloud-config from url defined in /proc/cmdline being skipped. Jan 22 00:57:49.465049 systemd[1]: Reached target Load user-provided cloud configs. Jan 22 00:57:49.476161 systemd[1]: extend-filesystems.service: Deactivated successfully. Jan 22 00:57:49.476539 systemd[1]: Finished Extend Filesystems. Jan 22 00:57:49.482935 systemd[1]: motdgen.service: Deactivated successfully. Jan 22 00:57:49.483384 systemd[1]: Finished Generate /run/flatcar/motd. Jan 22 00:57:49.492502 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jan 22 00:57:49.493197 systemd[1]: Finished Install an ssh key from /proc/cmdline. Jan 22 00:57:49.537549 systemd-logind[898]: Watching system buttons on /dev/input/event1 (Power Button) Jan 22 00:57:49.538061 systemd-logind[898]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jan 22 00:57:49.542079 systemd-logind[898]: New seat seat0. Jan 22 00:57:49.559900 systemd[1]: Started User Login Management. Jan 22 00:57:49.583128 update_engine[899]: I0122 00:57:49.581468 899 main.cc:89] Flatcar Update Engine starting Jan 22 00:57:49.589797 systemd[1]: Started Update Engine. Jan 22 00:57:49.594888 update_engine[899]: I0122 00:57:49.594805 899 update_check_scheduler.cc:74] Next update check in 4m12s Jan 22 00:57:49.607507 systemd[1]: Started Cluster reboot manager. Jan 22 00:57:49.809572 locksmithd[902]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jan 22 00:57:49.995276 sshd_keygen[890]: ssh-keygen: generating new host keys: RSA DSA ECDSA ED25519 Jan 22 00:57:50.042321 systemd[1]: Finished Generate sshd host keys. Jan 22 00:57:50.057880 systemd[1]: Starting Generate /run/issue... Jan 22 00:57:50.073277 systemd[1]: issuegen.service: Deactivated successfully. Jan 22 00:57:50.073857 systemd[1]: Finished Generate /run/issue. Jan 22 00:57:50.088736 systemd[1]: Starting Permit User Sessions... Jan 22 00:57:50.101197 systemd[1]: Finished Permit User Sessions. Jan 22 00:57:50.111475 systemd[1]: Started Getty on tty1. Jan 22 00:57:50.118982 systemd[1]: Started Serial Getty on ttyS0. Jan 22 00:57:50.126941 systemd[1]: Reached target Login Prompts. Jan 22 00:57:50.134125 systemd[1]: Reached target Multi-User System. Jan 22 00:57:50.156497 systemd[1]: Starting Record Runlevel Change in UTMP... Jan 22 00:57:50.169761 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jan 22 00:57:50.170224 systemd[1]: Finished Record Runlevel Change in UTMP. Jan 22 00:57:50.176862 systemd[1]: Startup finished in 3.001s (kernel) + 8.476s (initrd) + 9.930s (userspace) = 21.408s. Jan 22 00:57:56.732949 systemd[1]: Created slice Slice /system/sshd. Jan 22 00:57:56.736091 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:46628). Jan 22 00:57:56.971952 sshd[923]: Accepted publickey for core from 10.0.0.1 port 46628 ssh2: RSA SHA256:EMidqk+TqAMWTxTEdTFnkMhuQ/AmgAMmQJpaSOavQAo Jan 22 00:57:56.979159 sshd[923]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:57:57.022297 systemd[1]: Created slice User Slice of UID 500. Jan 22 00:57:57.036293 systemd[1]: Starting User Runtime Directory /run/user/500... Jan 22 00:57:57.040867 systemd-logind[898]: New session 1 of user core. Jan 22 00:57:57.055075 systemd[1]: Finished User Runtime Directory /run/user/500. Jan 22 00:57:57.063376 systemd[1]: Starting User Manager for UID 500... Jan 22 00:57:57.067773 systemd[926]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:57:57.218587 systemd[926]: Queued start job for default target Main User Target. Jan 22 00:57:57.219244 systemd[926]: Reached target Paths. Jan 22 00:57:57.219262 systemd[926]: Reached target Sockets. Jan 22 00:57:57.219276 systemd[926]: Reached target Timers. Jan 22 00:57:57.219288 systemd[926]: Reached target Basic System. Jan 22 00:57:57.219422 systemd[926]: Reached target Main User Target. Jan 22 00:57:57.219437 systemd[926]: Startup finished in 141ms. Jan 22 00:57:57.219945 systemd[1]: Started User Manager for UID 500. Jan 22 00:57:57.239285 systemd[1]: Started Session 1 of User core. Jan 22 00:57:57.346972 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:46630). Jan 22 00:57:57.408516 sshd[935]: Accepted publickey for core from 10.0.0.1 port 46630 ssh2: RSA SHA256:EMidqk+TqAMWTxTEdTFnkMhuQ/AmgAMmQJpaSOavQAo Jan 22 00:57:57.413797 sshd[935]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:57:57.426134 systemd-logind[898]: New session 2 of user core. Jan 22 00:57:57.435183 systemd[1]: Started Session 2 of User core. Jan 22 00:57:57.565753 sshd[935]: pam_unix(sshd:session): session closed for user core Jan 22 00:57:57.576733 systemd[1]: sshd@1-10.0.0.4:22-10.0.0.1:46630.service: Deactivated successfully. Jan 22 00:57:57.577818 systemd[1]: session-2.scope: Deactivated successfully. Jan 22 00:57:57.579233 systemd-logind[898]: Session 2 logged out. Waiting for processes to exit. Jan 22 00:57:57.582041 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:46642). Jan 22 00:57:57.583519 systemd-logind[898]: Removed session 2. Jan 22 00:57:57.634543 sshd[941]: Accepted publickey for core from 10.0.0.1 port 46642 ssh2: RSA SHA256:EMidqk+TqAMWTxTEdTFnkMhuQ/AmgAMmQJpaSOavQAo Jan 22 00:57:57.641361 sshd[941]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:57:57.660982 systemd-logind[898]: New session 3 of user core. Jan 22 00:57:57.668290 systemd[1]: Started Session 3 of User core. Jan 22 00:57:57.750838 sshd[941]: pam_unix(sshd:session): session closed for user core Jan 22 00:57:57.759363 systemd[1]: sshd@2-10.0.0.4:22-10.0.0.1:46642.service: Deactivated successfully. Jan 22 00:57:57.760971 systemd[1]: session-3.scope: Deactivated successfully. Jan 22 00:57:57.762420 systemd-logind[898]: Session 3 logged out. Waiting for processes to exit. Jan 22 00:57:57.765103 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:46646). Jan 22 00:57:57.768092 systemd-logind[898]: Removed session 3. Jan 22 00:57:57.817310 sshd[947]: Accepted publickey for core from 10.0.0.1 port 46646 ssh2: RSA SHA256:EMidqk+TqAMWTxTEdTFnkMhuQ/AmgAMmQJpaSOavQAo Jan 22 00:57:57.819237 sshd[947]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:57:57.830472 systemd-logind[898]: New session 4 of user core. Jan 22 00:57:57.843308 systemd[1]: Started Session 4 of User core. Jan 22 00:57:57.960880 sshd[947]: pam_unix(sshd:session): session closed for user core Jan 22 00:57:57.970518 systemd[1]: sshd@3-10.0.0.4:22-10.0.0.1:46646.service: Deactivated successfully. Jan 22 00:57:57.977246 systemd[1]: session-4.scope: Deactivated successfully. Jan 22 00:57:57.979463 systemd-logind[898]: Session 4 logged out. Waiting for processes to exit. Jan 22 00:57:57.986930 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:46650). Jan 22 00:57:57.991344 systemd-logind[898]: Removed session 4. Jan 22 00:57:58.042068 sshd[953]: Accepted publickey for core from 10.0.0.1 port 46650 ssh2: RSA SHA256:EMidqk+TqAMWTxTEdTFnkMhuQ/AmgAMmQJpaSOavQAo Jan 22 00:57:58.044309 sshd[953]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:57:58.052936 systemd-logind[898]: New session 5 of user core. Jan 22 00:57:58.057068 systemd[1]: Started Session 5 of User core. Jan 22 00:57:58.201779 sudo[956]: core : PWD=/home/core ; USER=root ; COMMAND=/sbin/setenforce 1 Jan 22 00:57:58.202246 sudo[956]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:57:58.232212 sudo[956]: pam_unix(sudo:session): session closed for user root Jan 22 00:57:58.238472 sshd[953]: pam_unix(sshd:session): session closed for user core Jan 22 00:57:58.249471 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:46658). Jan 22 00:57:58.256164 dbus-daemon[871]: [system] Reloaded configuration Jan 22 00:57:58.264398 systemd[1]: sshd@4-10.0.0.4:22-10.0.0.1:46650.service: Deactivated successfully. Jan 22 00:57:58.265892 systemd[1]: session-5.scope: Deactivated successfully. Jan 22 00:57:58.268322 systemd-logind[898]: Session 5 logged out. Waiting for processes to exit. Jan 22 00:57:58.272087 systemd-logind[898]: Removed session 5. Jan 22 00:57:58.311770 sshd[959]: Accepted publickey for core from 10.0.0.1 port 46658 ssh2: RSA SHA256:EMidqk+TqAMWTxTEdTFnkMhuQ/AmgAMmQJpaSOavQAo Jan 22 00:57:58.314922 sshd[959]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:57:58.324579 systemd-logind[898]: New session 6 of user core. Jan 22 00:57:58.331090 systemd[1]: Started Session 6 of User core. Jan 22 00:57:58.433954 sudo[964]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jan 22 00:57:58.434250 sudo[964]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:57:58.447343 sudo[964]: pam_unix(sudo:session): session closed for user root Jan 22 00:57:58.473730 sudo[963]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/systemctl restart audit-rules Jan 22 00:57:58.474194 sudo[963]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:57:58.510529 systemd[1]: Stopping Load Security Auditing Rules... Jan 22 00:57:58.519000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jan 22 00:57:58.521217 auditctl[967]: No rules Jan 22 00:57:58.521935 systemd[1]: audit-rules.service: Deactivated successfully. Jan 22 00:57:58.522250 systemd[1]: Stopped Load Security Auditing Rules. Jan 22 00:57:58.530520 kernel: kauditd_printk_skb: 40 callbacks suppressed Jan 22 00:57:58.530902 kernel: audit: type=1305 audit(1769043478.519:153): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jan 22 00:57:58.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:58.553842 kernel: audit: type=1131 audit(1769043478.521:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:58.594858 systemd[1]: Starting Load Security Auditing Rules... Jan 22 00:57:58.672524 augenrules[984]: No rules Jan 22 00:57:58.674349 systemd[1]: Finished Load Security Auditing Rules. Jan 22 00:57:58.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:58.677132 sudo[963]: pam_unix(sudo:session): session closed for user root Jan 22 00:57:58.699794 kernel: audit: type=1130 audit(1769043478.674:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:58.675000 audit[963]: USER_END pid=963 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:57:58.700465 sshd[959]: pam_unix(sshd:session): session closed for user core Jan 22 00:57:58.675000 audit[963]: CRED_DISP pid=963 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:57:58.756453 kernel: audit: type=1106 audit(1769043478.675:156): pid=963 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:57:58.756574 kernel: audit: type=1104 audit(1769043478.675:157): pid=963 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:57:58.756595 kernel: audit: type=1106 audit(1769043478.703:158): pid=959 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:57:58.703000 audit[959]: USER_END pid=959 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:57:58.703000 audit[959]: CRED_DISP pid=959 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:57:58.794784 systemd[1]: sshd@5-10.0.0.4:22-10.0.0.1:46658.service: Deactivated successfully. Jan 22 00:57:58.796347 systemd[1]: session-6.scope: Deactivated successfully. Jan 22 00:57:58.798263 systemd-logind[898]: Session 6 logged out. Waiting for processes to exit. Jan 22 00:57:58.807848 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:46662). Jan 22 00:57:58.818424 systemd-logind[898]: Removed session 6. Jan 22 00:57:58.828989 kernel: audit: type=1104 audit(1769043478.703:159): pid=959 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:57:58.829438 kernel: audit: type=1131 audit(1769043478.793:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.4:22-10.0.0.1:46658 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:58.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.4:22-10.0.0.1:46658 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:58.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.4:22-10.0.0.1:46662 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:58.872408 sshd[990]: Accepted publickey for core from 10.0.0.1 port 46662 ssh2: RSA SHA256:EMidqk+TqAMWTxTEdTFnkMhuQ/AmgAMmQJpaSOavQAo Jan 22 00:57:58.906457 kernel: audit: type=1130 audit(1769043478.806:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.4:22-10.0.0.1:46662 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:58.906811 kernel: audit: type=1101 audit(1769043478.871:162): pid=990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:57:58.871000 audit[990]: USER_ACCT pid=990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:57:58.911400 sshd[990]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:57:58.943263 systemd[1]: Started Session 7 of User core. Jan 22 00:57:58.943979 systemd-logind[898]: New session 7 of user core. Jan 22 00:57:58.906000 audit[990]: CRED_ACQ pid=990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:57:58.993000 audit[990]: USER_START pid=990 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:57:58.996000 audit[992]: CRED_ACQ pid=992 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:57:59.067000 audit[993]: USER_ACCT pid=993 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:57:59.068000 audit[993]: CRED_REFR pid=993 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:57:59.070084 sudo[993]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/mkdir -p . Jan 22 00:57:59.070742 sudo[993]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:57:59.079000 audit[993]: USER_START pid=993 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:57:59.087000 audit[993]: USER_END pid=993 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:57:59.087000 audit[993]: CRED_DISP pid=993 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:57:59.088105 sudo[993]: pam_unix(sudo:session): session closed for user root Jan 22 00:57:59.092058 sshd[990]: pam_unix(sshd:session): session closed for user core Jan 22 00:57:59.110000 audit[990]: USER_END pid=990 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:57:59.112000 audit[990]: CRED_DISP pid=990 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:57:59.124970 systemd[1]: sshd@6-10.0.0.4:22-10.0.0.1:46662.service: Deactivated successfully. Jan 22 00:57:59.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.4:22-10.0.0.1:46662 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:59.126304 systemd[1]: session-7.scope: Deactivated successfully. Jan 22 00:57:59.131159 systemd-logind[898]: Session 7 logged out. Waiting for processes to exit. Jan 22 00:57:59.140869 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:46670). Jan 22 00:57:59.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.4:22-10.0.0.1:46670 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:57:59.151042 systemd-logind[898]: Removed session 7. Jan 22 00:57:59.286050 sshd[997]: Accepted publickey for core from 10.0.0.1 port 46670 ssh2: RSA SHA256:EMidqk+TqAMWTxTEdTFnkMhuQ/AmgAMmQJpaSOavQAo Jan 22 00:57:59.284000 audit[997]: USER_ACCT pid=997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:57:59.288000 audit[997]: CRED_ACQ pid=997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:57:59.290086 sshd[997]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:57:59.319553 systemd-logind[898]: New session 8 of user core. Jan 22 00:57:59.333185 systemd[1]: Started Session 8 of User core. Jan 22 00:57:59.355000 audit[997]: USER_START pid=997 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:57:59.359000 audit[999]: CRED_ACQ pid=999 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:57:59.426000 audit[1000]: USER_ACCT pid=1000 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:57:59.427872 sudo[1000]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/install -m 0755 /dev/stdin kolet Jan 22 00:57:59.428420 sudo[1000]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:57:59.427000 audit[1000]: CRED_REFR pid=1000 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:57:59.435000 audit[1000]: USER_START pid=1000 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:58:02.872555 sudo[1000]: pam_unix(sudo:session): session closed for user root Jan 22 00:58:02.873000 audit[1000]: USER_END pid=1000 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:58:02.883000 audit[1000]: CRED_DISP pid=1000 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:58:02.893003 sshd[997]: pam_unix(sshd:session): session closed for user core Jan 22 00:58:02.903000 audit[997]: USER_END pid=997 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:02.903000 audit[997]: CRED_DISP pid=997 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:02.927312 systemd[1]: sshd@7-10.0.0.4:22-10.0.0.1:46670.service: Deactivated successfully. Jan 22 00:58:02.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.4:22-10.0.0.1:46670 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:58:02.936027 systemd[1]: session-8.scope: Deactivated successfully. Jan 22 00:58:02.936563 systemd[1]: session-8.scope: Consumed 3.788s CPU time. Jan 22 00:58:02.941926 systemd-logind[898]: Session 8 logged out. Waiting for processes to exit. Jan 22 00:58:02.959065 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:46682). Jan 22 00:58:02.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.4:22-10.0.0.1:46682 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:58:02.965243 systemd-logind[898]: Removed session 8. Jan 22 00:58:03.039000 audit[1004]: USER_ACCT pid=1004 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:03.041458 sshd[1004]: Accepted publickey for core from 10.0.0.1 port 46682 ssh2: RSA SHA256:EMidqk+TqAMWTxTEdTFnkMhuQ/AmgAMmQJpaSOavQAo Jan 22 00:58:03.042000 audit[1004]: CRED_ACQ pid=1004 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:03.044193 sshd[1004]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:58:03.060773 systemd-logind[898]: New session 9 of user core. Jan 22 00:58:03.067236 systemd[1]: Started Session 9 of User core. Jan 22 00:58:03.094000 audit[1004]: USER_START pid=1004 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:03.099000 audit[1006]: CRED_ACQ pid=1006 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:03.154000 audit[1007]: USER_ACCT pid=1007 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:58:03.155000 audit[1007]: CRED_REFR pid=1007 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:58:03.156446 sudo[1007]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/mkdir -p /updates Jan 22 00:58:03.157045 sudo[1007]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:58:03.160000 audit[1007]: USER_START pid=1007 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:58:03.166806 sudo[1007]: pam_unix(sudo:session): session closed for user root Jan 22 00:58:03.165000 audit[1007]: USER_END pid=1007 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:58:03.165000 audit[1007]: CRED_DISP pid=1007 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:58:03.171868 sshd[1004]: pam_unix(sshd:session): session closed for user core Jan 22 00:58:03.173000 audit[1004]: USER_END pid=1004 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:03.173000 audit[1004]: CRED_DISP pid=1004 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:03.188038 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:46686). Jan 22 00:58:03.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.4:22-10.0.0.1:46686 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:58:03.189011 systemd[1]: sshd@8-10.0.0.4:22-10.0.0.1:46682.service: Deactivated successfully. Jan 22 00:58:03.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.4:22-10.0.0.1:46682 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:58:03.193047 systemd[1]: session-9.scope: Deactivated successfully. Jan 22 00:58:03.196956 systemd-logind[898]: Session 9 logged out. Waiting for processes to exit. Jan 22 00:58:03.205853 systemd-logind[898]: Removed session 9. Jan 22 00:58:03.244000 audit[1010]: USER_ACCT pid=1010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:03.245860 sshd[1010]: Accepted publickey for core from 10.0.0.1 port 46686 ssh2: RSA SHA256:EMidqk+TqAMWTxTEdTFnkMhuQ/AmgAMmQJpaSOavQAo Jan 22 00:58:03.246000 audit[1010]: CRED_ACQ pid=1010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:03.247357 sshd[1010]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:58:03.260248 systemd-logind[898]: New session 10 of user core. Jan 22 00:58:03.265020 systemd[1]: Started Session 10 of User core. Jan 22 00:58:03.327000 audit[1010]: USER_START pid=1010 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:03.343000 audit[1013]: CRED_ACQ pid=1013 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:03.432000 audit[1014]: USER_ACCT pid=1014 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:58:03.436000 audit[1014]: CRED_REFR pid=1014 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:58:03.435768 sudo[1014]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/install -m 0755 /dev/stdin /updates/update.gz Jan 22 00:58:03.443597 sudo[1014]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:58:03.464000 audit[1014]: USER_START pid=1014 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:58:12.157594 sudo[1014]: pam_unix(sudo:session): session closed for user root Jan 22 00:58:12.157000 audit[1014]: USER_END pid=1014 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:58:12.171018 kernel: kauditd_printk_skb: 49 callbacks suppressed Jan 22 00:58:12.171092 kernel: audit: type=1106 audit(1769043492.157:212): pid=1014 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:58:12.175071 sshd[1010]: pam_unix(sshd:session): session closed for user core Jan 22 00:58:12.183875 systemd[1]: sshd@9-10.0.0.4:22-10.0.0.1:46686.service: Deactivated successfully. Jan 22 00:58:12.187200 systemd[1]: session-10.scope: Deactivated successfully. Jan 22 00:58:12.187790 systemd[1]: session-10.scope: Consumed 10.744s CPU time. Jan 22 00:58:12.189074 systemd-logind[898]: Session 10 logged out. Waiting for processes to exit. Jan 22 00:58:12.191518 systemd-logind[898]: Removed session 10. Jan 22 00:58:12.157000 audit[1014]: CRED_DISP pid=1014 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:58:12.265106 kernel: audit: type=1104 audit(1769043492.157:213): pid=1014 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:58:12.265230 kernel: audit: type=1106 audit(1769043492.177:214): pid=1010 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:12.177000 audit[1010]: USER_END pid=1010 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:12.177000 audit[1010]: CRED_DISP pid=1010 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:12.340895 kernel: audit: type=1104 audit(1769043492.177:215): pid=1010 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:12.341088 kernel: audit: type=1131 audit(1769043492.182:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.4:22-10.0.0.1:46686 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:58:12.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.4:22-10.0.0.1:46686 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:58:12.389229 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:51888). Jan 22 00:58:12.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.4:22-10.0.0.1:51888 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:58:12.432921 kernel: audit: type=1130 audit(1769043492.389:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.4:22-10.0.0.1:51888 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:58:12.481000 audit[1018]: USER_ACCT pid=1018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:12.482505 sshd[1018]: Accepted publickey for core from 10.0.0.1 port 51888 ssh2: RSA SHA256:EMidqk+TqAMWTxTEdTFnkMhuQ/AmgAMmQJpaSOavQAo Jan 22 00:58:12.516502 sshd[1018]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:58:12.515000 audit[1018]: CRED_ACQ pid=1018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:12.537958 systemd-logind[898]: New session 11 of user core. Jan 22 00:58:12.571476 kernel: audit: type=1101 audit(1769043492.481:218): pid=1018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:12.572256 kernel: audit: type=1103 audit(1769043492.515:219): pid=1018 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:12.572309 kernel: audit: type=1006 audit(1769043492.515:220): pid=1018 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Jan 22 00:58:12.610349 systemd[1]: Started Session 11 of User core. Jan 22 00:58:12.688000 audit[1018]: USER_START pid=1018 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:12.711000 audit[1020]: CRED_ACQ pid=1020 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:12.743582 kernel: audit: type=1105 audit(1769043492.688:221): pid=1018 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:12.776000 audit[1021]: USER_ACCT pid=1021 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:58:12.776000 audit[1021]: CRED_REFR pid=1021 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:58:12.777002 sudo[1021]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/systemd-run --quiet ./kolet run cl.update.payload-boot-part-too-small Omaha Jan 22 00:58:12.777398 sudo[1021]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 22 00:58:12.783000 audit[1021]: USER_START pid=1021 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:58:12.814982 systemd[1]: Started /home/core/./kolet run cl.update.payload-boot-part-too-small Omaha. Jan 22 00:58:12.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=run-r9ae98d1fd985498f99da7bafdd2a1997 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:58:12.819187 sudo[1021]: pam_unix(sudo:session): session closed for user root Jan 22 00:58:12.818000 audit[1021]: USER_END pid=1021 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:58:12.818000 audit[1021]: CRED_DISP pid=1021 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 22 00:58:12.824443 sshd[1018]: pam_unix(sshd:session): session closed for user core Jan 22 00:58:12.829000 audit[1018]: USER_END pid=1018 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:12.829000 audit[1018]: CRED_DISP pid=1018 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:12.836430 systemd[1]: sshd@10-10.0.0.4:22-10.0.0.1:51888.service: Deactivated successfully. Jan 22 00:58:12.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.4:22-10.0.0.1:51888 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:58:12.840294 systemd[1]: session-11.scope: Deactivated successfully. Jan 22 00:58:12.842506 systemd-logind[898]: Session 11 logged out. Waiting for processes to exit. Jan 22 00:58:12.850516 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:51892). Jan 22 00:58:12.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.4:22-10.0.0.1:51892 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:58:12.855101 systemd-logind[898]: Removed session 11. Jan 22 00:58:12.907000 audit[1026]: USER_ACCT pid=1026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:12.910197 sshd[1026]: Accepted publickey for core from 10.0.0.1 port 51892 ssh2: RSA SHA256:EMidqk+TqAMWTxTEdTFnkMhuQ/AmgAMmQJpaSOavQAo Jan 22 00:58:12.910000 audit[1026]: CRED_ACQ pid=1026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:12.912393 sshd[1026]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:58:12.919542 systemd-logind[898]: New session 12 of user core. Jan 22 00:58:12.926948 systemd[1]: Started Session 12 of User core. Jan 22 00:58:12.943000 audit[1026]: USER_START pid=1026 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:12.945000 audit[1033]: CRED_ACQ pid=1033 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:13.020179 sshd[1026]: pam_unix(sshd:session): session closed for user core Jan 22 00:58:13.020000 audit[1026]: USER_END pid=1026 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:13.020000 audit[1026]: CRED_DISP pid=1026 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:13.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.4:22-10.0.0.1:51892 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:58:13.024855 systemd[1]: sshd@11-10.0.0.4:22-10.0.0.1:51892.service: Deactivated successfully. Jan 22 00:58:13.025798 systemd[1]: session-12.scope: Deactivated successfully. Jan 22 00:58:13.027103 systemd-logind[898]: Session 12 logged out. Waiting for processes to exit. Jan 22 00:58:13.029562 systemd-logind[898]: Removed session 12. Jan 22 00:58:18.035000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.4:22-10.0.0.1:38706 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:58:18.034921 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:38706). Jan 22 00:58:18.051491 kernel: kauditd_printk_skb: 19 callbacks suppressed Jan 22 00:58:18.051798 kernel: audit: type=1130 audit(1769043498.035:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.4:22-10.0.0.1:38706 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:58:18.141121 sshd[1040]: Accepted publickey for core from 10.0.0.1 port 38706 ssh2: RSA SHA256:EMidqk+TqAMWTxTEdTFnkMhuQ/AmgAMmQJpaSOavQAo Jan 22 00:58:18.139000 audit[1040]: USER_ACCT pid=1040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:18.144246 sshd[1040]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 22 00:58:18.155060 systemd-logind[898]: New session 13 of user core. Jan 22 00:58:18.264300 kernel: audit: type=1101 audit(1769043498.139:242): pid=1040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:18.264346 kernel: audit: type=1103 audit(1769043498.142:243): pid=1040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:18.264517 kernel: audit: type=1006 audit(1769043498.142:244): pid=1040 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Jan 22 00:58:18.142000 audit[1040]: CRED_ACQ pid=1040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:18.264261 systemd[1]: Started Session 13 of User core. Jan 22 00:58:18.285000 audit[1040]: USER_START pid=1040 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:18.290000 audit[1042]: CRED_ACQ pid=1042 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:18.357542 sshd[1040]: pam_unix(sshd:session): session closed for user core Jan 22 00:58:18.368986 systemd[1]: sshd@12-10.0.0.4:22-10.0.0.1:38706.service: Deactivated successfully. Jan 22 00:58:18.370319 systemd[1]: session-13.scope: Deactivated successfully. Jan 22 00:58:18.372070 systemd-logind[898]: Session 13 logged out. Waiting for processes to exit. Jan 22 00:58:18.376842 systemd-logind[898]: Removed session 13. Jan 22 00:58:18.385908 kernel: audit: type=1105 audit(1769043498.285:245): pid=1040 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:18.385975 kernel: audit: type=1103 audit(1769043498.290:246): pid=1042 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:18.386001 kernel: audit: type=1106 audit(1769043498.365:247): pid=1040 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:18.365000 audit[1040]: USER_END pid=1040 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:18.439967 kernel: audit: type=1104 audit(1769043498.365:248): pid=1040 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:18.365000 audit[1040]: CRED_DISP pid=1040 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 22 00:58:18.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.4:22-10.0.0.1:38706 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:58:18.519028 kernel: audit: type=1131 audit(1769043498.369:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.4:22-10.0.0.1:38706 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 22 00:58:34.789187 update_engine[899]: I0122 00:58:34.787218 899 update_attempter.cc:505] Updating boot flags...