Jan 28 01:18:45.879444 kernel: Linux version 5.10.107-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 9.3.0-r1 p3) 9.3.0, GNU ld (Gentoo 2.36.1 p5) 2.36.1) #1 SMP Tue Mar 22 19:39:53 -00 2022 Jan 28 01:18:45.879641 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=15990f5bb88d618f1948b7e8a720f1d5b95900cfecbef00df890bd0a136b39aa Jan 28 01:18:45.879651 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jan 28 01:18:45.879657 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jan 28 01:18:45.879663 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jan 28 01:18:45.879670 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jan 28 01:18:45.879678 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Jan 28 01:18:45.879687 kernel: BIOS-provided physical RAM map: Jan 28 01:18:45.879693 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Jan 28 01:18:45.879700 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Jan 28 01:18:45.879706 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Jan 28 01:18:45.879714 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable Jan 28 01:18:45.879722 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved Jan 28 01:18:45.879729 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Jan 28 01:18:45.879740 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Jan 28 01:18:45.879747 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Jan 28 01:18:45.879754 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Jan 28 01:18:45.879761 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Jan 28 01:18:45.879767 kernel: NX (Execute Disable) protection: active Jan 28 01:18:45.879774 kernel: SMBIOS 2.8 present. Jan 28 01:18:45.879780 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Jan 28 01:18:45.879787 kernel: Hypervisor detected: KVM Jan 28 01:18:45.879888 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jan 28 01:18:45.879899 kernel: kvm-clock: cpu 0, msr 9c6ba001, primary cpu clock Jan 28 01:18:45.879908 kernel: kvm-clock: using sched offset of 21558716203 cycles Jan 28 01:18:45.879918 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jan 28 01:18:45.879928 kernel: tsc: Detected 2445.426 MHz processor Jan 28 01:18:45.879937 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jan 28 01:18:45.879947 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jan 28 01:18:45.879954 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 Jan 28 01:18:45.879961 kernel: MTRR default type: write-back Jan 28 01:18:45.879968 kernel: MTRR fixed ranges enabled: Jan 28 01:18:45.879975 kernel: 00000-9FFFF write-back Jan 28 01:18:45.879984 kernel: A0000-BFFFF uncachable Jan 28 01:18:45.879992 kernel: C0000-FFFFF write-protect Jan 28 01:18:45.880003 kernel: MTRR variable ranges enabled: Jan 28 01:18:45.880010 kernel: 0 base 0000C0000000 mask FFFFC0000000 uncachable Jan 28 01:18:45.880018 kernel: 1 disabled Jan 28 01:18:45.880025 kernel: 2 disabled Jan 28 01:18:45.880032 kernel: 3 disabled Jan 28 01:18:45.880044 kernel: 4 disabled Jan 28 01:18:45.880051 kernel: 5 disabled Jan 28 01:18:45.880059 kernel: 6 disabled Jan 28 01:18:45.880067 kernel: 7 disabled Jan 28 01:18:45.880077 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jan 28 01:18:45.880085 kernel: Using GB pages for direct mapping Jan 28 01:18:45.880092 kernel: ACPI: Early table checksum verification disabled Jan 28 01:18:45.880100 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) Jan 28 01:18:45.880108 kernel: ACPI: RSDT 0x000000009CFE241A 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 28 01:18:45.880117 kernel: ACPI: FACP 0x000000009CFE21FA 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Jan 28 01:18:45.880326 kernel: ACPI: DSDT 0x000000009CFE0040 0021BA (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 28 01:18:45.880337 kernel: ACPI: FACS 0x000000009CFE0000 000040 Jan 28 01:18:45.880345 kernel: ACPI: APIC 0x000000009CFE22EE 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 28 01:18:45.880356 kernel: ACPI: HPET 0x000000009CFE237E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 28 01:18:45.880364 kernel: ACPI: MCFG 0x000000009CFE23B6 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 28 01:18:45.880372 kernel: ACPI: WAET 0x000000009CFE23F2 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jan 28 01:18:45.880379 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21fa-0x9cfe22ed] Jan 28 01:18:45.880386 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21f9] Jan 28 01:18:45.880394 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Jan 28 01:18:45.880401 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22ee-0x9cfe237d] Jan 28 01:18:45.880408 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe237e-0x9cfe23b5] Jan 28 01:18:45.880418 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23b6-0x9cfe23f1] Jan 28 01:18:45.880426 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23f2-0x9cfe2419] Jan 28 01:18:45.880433 kernel: ACPI: Local APIC address 0xfee00000 Jan 28 01:18:45.880441 kernel: No NUMA configuration found Jan 28 01:18:45.880448 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] Jan 28 01:18:45.880642 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] Jan 28 01:18:45.880655 kernel: Zone ranges: Jan 28 01:18:45.880663 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jan 28 01:18:45.880761 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] Jan 28 01:18:45.880774 kernel: Normal empty Jan 28 01:18:45.880783 kernel: Movable zone start for each node Jan 28 01:18:45.880790 kernel: Early memory node ranges Jan 28 01:18:45.880797 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Jan 28 01:18:45.880804 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] Jan 28 01:18:45.880811 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] Jan 28 01:18:45.880818 kernel: On node 0 totalpages: 642938 Jan 28 01:18:45.880825 kernel: DMA zone: 64 pages used for memmap Jan 28 01:18:45.880832 kernel: DMA zone: 21 pages reserved Jan 28 01:18:45.880839 kernel: DMA zone: 3998 pages, LIFO batch:0 Jan 28 01:18:45.880849 kernel: DMA32 zone: 9984 pages used for memmap Jan 28 01:18:45.880856 kernel: DMA32 zone: 638940 pages, LIFO batch:63 Jan 28 01:18:45.880863 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jan 28 01:18:45.880870 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Jan 28 01:18:45.880878 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges Jan 28 01:18:45.880885 kernel: ACPI: PM-Timer IO Port: 0x608 Jan 28 01:18:45.880892 kernel: ACPI: Local APIC address 0xfee00000 Jan 28 01:18:45.880900 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jan 28 01:18:45.880907 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jan 28 01:18:45.880914 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jan 28 01:18:45.880923 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jan 28 01:18:45.880930 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jan 28 01:18:45.880937 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jan 28 01:18:45.880945 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jan 28 01:18:45.880953 kernel: ACPI: IRQ0 used by override. Jan 28 01:18:45.880959 kernel: ACPI: IRQ5 used by override. Jan 28 01:18:45.880966 kernel: ACPI: IRQ9 used by override. Jan 28 01:18:45.880973 kernel: ACPI: IRQ10 used by override. Jan 28 01:18:45.880980 kernel: ACPI: IRQ11 used by override. Jan 28 01:18:45.880989 kernel: Using ACPI (MADT) for SMP configuration information Jan 28 01:18:45.880997 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Jan 28 01:18:45.881004 kernel: TSC deadline timer available Jan 28 01:18:45.881011 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Jan 28 01:18:45.881018 kernel: kvm-guest: KVM setup pv remote TLB flush Jan 28 01:18:45.881025 kernel: kvm-guest: setup PV sched yield Jan 28 01:18:45.881033 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Jan 28 01:18:45.881041 kernel: Booting paravirtualized kernel on KVM Jan 28 01:18:45.881048 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jan 28 01:18:45.881056 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Jan 28 01:18:45.881065 kernel: percpu: Embedded 58 pages/cpu s199704 r8192 d29672 u524288 Jan 28 01:18:45.881073 kernel: pcpu-alloc: s199704 r8192 d29672 u524288 alloc=1*2097152 Jan 28 01:18:45.881079 kernel: pcpu-alloc: [0] 0 1 2 3 Jan 28 01:18:45.881087 kernel: kvm-guest: KVM setup async PF for cpu 0 Jan 28 01:18:45.881095 kernel: kvm-guest: stealtime: cpu 0, msr 9cc1c580 Jan 28 01:18:45.881103 kernel: kvm-guest: PV spinlocks enabled Jan 28 01:18:45.881110 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jan 28 01:18:45.881349 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632869 Jan 28 01:18:45.881360 kernel: Policy zone: DMA32 Jan 28 01:18:45.881741 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=15990f5bb88d618f1948b7e8a720f1d5b95900cfecbef00df890bd0a136b39aa Jan 28 01:18:45.881760 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jan 28 01:18:45.881769 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jan 28 01:18:45.881778 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jan 28 01:18:45.881788 kernel: Memory: 2449516K/2571752K available (10246K kernel code, 2239K rwdata, 11640K rodata, 42228K init, 1436K bss, 121976K reserved, 0K cma-reserved) Jan 28 01:18:45.881797 kernel: random: get_random_u64 called from __kmem_cache_create+0x26/0x400 with crng_init=0 Jan 28 01:18:45.881809 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Jan 28 01:18:45.881818 kernel: ftrace: allocating 34378 entries in 135 pages Jan 28 01:18:45.881828 kernel: ftrace: allocated 135 pages with 4 groups Jan 28 01:18:45.881835 kernel: rcu: Hierarchical RCU implementation. Jan 28 01:18:45.881843 kernel: rcu: RCU event tracing is enabled. Jan 28 01:18:45.881851 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Jan 28 01:18:45.881858 kernel: Rude variant of Tasks RCU enabled. Jan 28 01:18:45.881865 kernel: Tracing variant of Tasks RCU enabled. Jan 28 01:18:45.881873 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jan 28 01:18:45.881883 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Jan 28 01:18:45.881890 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Jan 28 01:18:45.881898 kernel: Console: colour VGA+ 80x25 Jan 28 01:18:45.881907 kernel: printk: console [ttyS0] enabled Jan 28 01:18:45.881915 kernel: ACPI: Core revision 20200925 Jan 28 01:18:45.881924 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Jan 28 01:18:45.881933 kernel: APIC: Switch to symmetric I/O mode setup Jan 28 01:18:45.881942 kernel: x2apic enabled Jan 28 01:18:45.881950 kernel: Switched APIC routing to physical x2apic. Jan 28 01:18:45.881958 kernel: kvm-guest: setup PV IPIs Jan 28 01:18:45.881969 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Jan 28 01:18:45.881978 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Jan 28 01:18:45.881986 kernel: Calibrating delay loop (skipped) preset value.. 4890.85 BogoMIPS (lpj=2445426) Jan 28 01:18:45.881995 kernel: pid_max: default: 32768 minimum: 301 Jan 28 01:18:45.882003 kernel: LSM: Security Framework initializing Jan 28 01:18:45.882011 kernel: SELinux: Initializing. Jan 28 01:18:45.882020 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jan 28 01:18:45.882028 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jan 28 01:18:45.882036 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Jan 28 01:18:45.882047 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Jan 28 01:18:45.882056 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Jan 28 01:18:45.882064 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jan 28 01:18:45.882073 kernel: Spectre V2 : Mitigation: Retpolines Jan 28 01:18:45.882081 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jan 28 01:18:45.882091 kernel: Speculative Store Bypass: Vulnerable Jan 28 01:18:45.882100 kernel: Freeing SMP alternatives memory: 28K Jan 28 01:18:45.882109 kernel: smpboot: CPU0: AMD EPYC 7763 64-Core Processor (family: 0x19, model: 0x1, stepping: 0x1) Jan 28 01:18:45.882117 kernel: Performance Events: PMU not available due to virtualization, using software events only. Jan 28 01:18:45.882239 kernel: rcu: Hierarchical SRCU implementation. Jan 28 01:18:45.882343 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Jan 28 01:18:45.882353 kernel: smp: Bringing up secondary CPUs ... Jan 28 01:18:45.882362 kernel: x86: Booting SMP configuration: Jan 28 01:18:45.882370 kernel: .... node #0, CPUs: #1 Jan 28 01:18:45.882378 kernel: kvm-clock: cpu 1, msr 9c6ba041, secondary cpu clock Jan 28 01:18:45.882389 kernel: kvm-guest: KVM setup async PF for cpu 1 Jan 28 01:18:45.882398 kernel: kvm-guest: stealtime: cpu 1, msr 9cc9c580 Jan 28 01:18:45.882405 kernel: #2 Jan 28 01:18:45.882413 kernel: kvm-clock: cpu 2, msr 9c6ba081, secondary cpu clock Jan 28 01:18:45.882421 kernel: kvm-guest: KVM setup async PF for cpu 2 Jan 28 01:18:45.882429 kernel: kvm-guest: stealtime: cpu 2, msr 9cd1c580 Jan 28 01:18:45.882437 kernel: #3 Jan 28 01:18:45.882444 kernel: kvm-clock: cpu 3, msr 9c6ba0c1, secondary cpu clock Jan 28 01:18:45.882452 kernel: kvm-guest: KVM setup async PF for cpu 3 Jan 28 01:18:45.885271 kernel: kvm-guest: stealtime: cpu 3, msr 9cd9c580 Jan 28 01:18:45.885287 kernel: smp: Brought up 1 node, 4 CPUs Jan 28 01:18:45.885296 kernel: smpboot: Max logical packages: 1 Jan 28 01:18:45.885305 kernel: smpboot: Total of 4 processors activated (19563.40 BogoMIPS) Jan 28 01:18:45.885314 kernel: devtmpfs: initialized Jan 28 01:18:45.885322 kernel: x86/mm: Memory block size: 128MB Jan 28 01:18:45.885330 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jan 28 01:18:45.885339 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Jan 28 01:18:45.885347 kernel: pinctrl core: initialized pinctrl subsystem Jan 28 01:18:45.885355 kernel: NET: Registered protocol family 16 Jan 28 01:18:45.885369 kernel: audit: initializing netlink subsys (disabled) Jan 28 01:18:45.885377 kernel: audit: type=2000 audit(1769563108.375:1): state=initialized audit_enabled=0 res=1 Jan 28 01:18:45.885386 kernel: thermal_sys: Registered thermal governor 'step_wise' Jan 28 01:18:45.885395 kernel: thermal_sys: Registered thermal governor 'user_space' Jan 28 01:18:45.885403 kernel: cpuidle: using governor menu Jan 28 01:18:45.885412 kernel: ACPI: bus type PCI registered Jan 28 01:18:45.885421 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jan 28 01:18:45.885430 kernel: dca service started, version 1.12.1 Jan 28 01:18:45.885439 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Jan 28 01:18:45.885450 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Jan 28 01:18:45.885657 kernel: PCI: Using configuration type 1 for base access Jan 28 01:18:45.885667 kernel: Kprobes globally optimized Jan 28 01:18:45.885676 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jan 28 01:18:45.885685 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jan 28 01:18:45.885694 kernel: ACPI: Added _OSI(Module Device) Jan 28 01:18:45.885703 kernel: ACPI: Added _OSI(Processor Device) Jan 28 01:18:45.885711 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jan 28 01:18:45.885720 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jan 28 01:18:45.885728 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jan 28 01:18:45.885739 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jan 28 01:18:45.885748 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jan 28 01:18:45.885757 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jan 28 01:18:45.885766 kernel: ACPI: Interpreter enabled Jan 28 01:18:45.885774 kernel: ACPI: (supports S0 S3 S5) Jan 28 01:18:45.885782 kernel: ACPI: Using IOAPIC for interrupt routing Jan 28 01:18:45.885791 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jan 28 01:18:45.885800 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Jan 28 01:18:45.885808 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jan 28 01:18:45.887975 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jan 28 01:18:45.888057 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Jan 28 01:18:45.891941 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Jan 28 01:18:45.892074 kernel: PCI host bridge to bus 0000:00 Jan 28 01:18:45.892690 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jan 28 01:18:45.892771 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jan 28 01:18:45.892887 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jan 28 01:18:45.892956 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Jan 28 01:18:45.893026 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Jan 28 01:18:45.893099 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] Jan 28 01:18:45.893830 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jan 28 01:18:45.895837 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Jan 28 01:18:45.896047 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Jan 28 01:18:45.896291 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Jan 28 01:18:45.896373 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Jan 28 01:18:45.896662 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Jan 28 01:18:45.896758 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Jan 28 01:18:45.896945 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] Jan 28 01:18:45.897035 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Jan 28 01:18:45.897117 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Jan 28 01:18:45.897432 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Jan 28 01:18:45.897819 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] Jan 28 01:18:45.897902 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Jan 28 01:18:45.897974 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Jan 28 01:18:45.899275 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Jan 28 01:18:45.899367 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] Jan 28 01:18:45.899449 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Jan 28 01:18:45.899845 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Jan 28 01:18:45.899928 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Jan 28 01:18:45.900116 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Jan 28 01:18:45.900319 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Jan 28 01:18:45.900403 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Jan 28 01:18:45.900702 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] Jan 28 01:18:45.900782 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] Jan 28 01:18:45.900870 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Jan 28 01:18:45.900945 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Jan 28 01:18:45.900956 kernel: ACPI: PCI Interrupt Link [LNKA] (IRQs 5 *10 11) Jan 28 01:18:45.900964 kernel: ACPI: PCI Interrupt Link [LNKB] (IRQs 5 *10 11) Jan 28 01:18:45.900972 kernel: ACPI: PCI Interrupt Link [LNKC] (IRQs 5 10 *11) Jan 28 01:18:45.900980 kernel: ACPI: PCI Interrupt Link [LNKD] (IRQs 5 10 *11) Jan 28 01:18:45.900989 kernel: ACPI: PCI Interrupt Link [LNKE] (IRQs 5 *10 11) Jan 28 01:18:45.900997 kernel: ACPI: PCI Interrupt Link [LNKF] (IRQs 5 *10 11) Jan 28 01:18:45.901004 kernel: ACPI: PCI Interrupt Link [LNKG] (IRQs 5 10 *11) Jan 28 01:18:45.901015 kernel: ACPI: PCI Interrupt Link [LNKH] (IRQs 5 10 *11) Jan 28 01:18:45.901024 kernel: ACPI: PCI Interrupt Link [GSIA] (IRQs *16) Jan 28 01:18:45.901032 kernel: ACPI: PCI Interrupt Link [GSIB] (IRQs *17) Jan 28 01:18:45.901039 kernel: ACPI: PCI Interrupt Link [GSIC] (IRQs *18) Jan 28 01:18:45.901047 kernel: ACPI: PCI Interrupt Link [GSID] (IRQs *19) Jan 28 01:18:45.901055 kernel: ACPI: PCI Interrupt Link [GSIE] (IRQs *20) Jan 28 01:18:45.901062 kernel: ACPI: PCI Interrupt Link [GSIF] (IRQs *21) Jan 28 01:18:45.901070 kernel: ACPI: PCI Interrupt Link [GSIG] (IRQs *22) Jan 28 01:18:45.901078 kernel: ACPI: PCI Interrupt Link [GSIH] (IRQs *23) Jan 28 01:18:45.901088 kernel: iommu: Default domain type: Translated Jan 28 01:18:45.904420 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Jan 28 01:18:45.904806 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jan 28 01:18:45.904881 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Jan 28 01:18:45.904893 kernel: vgaarb: loaded Jan 28 01:18:45.904902 kernel: PCI: Using ACPI for IRQ routing Jan 28 01:18:45.904910 kernel: PCI: pci_cache_line_size set to 64 bytes Jan 28 01:18:45.904918 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Jan 28 01:18:45.904925 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] Jan 28 01:18:45.904971 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Jan 28 01:18:45.904979 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Jan 28 01:18:45.904986 kernel: clocksource: Switched to clocksource kvm-clock Jan 28 01:18:45.904994 kernel: VFS: Disk quotas dquot_6.6.0 Jan 28 01:18:45.905002 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jan 28 01:18:45.905009 kernel: pnp: PnP ACPI init Jan 28 01:18:45.905450 kernel: pnp 00:00: Plug and Play ACPI device, IDs PNP0303 (active) Jan 28 01:18:45.906097 kernel: pnp 00:01: Plug and Play ACPI device, IDs PNP0f13 (active) Jan 28 01:18:45.907861 kernel: pnp 00:02: Plug and Play ACPI device, IDs PNP0400 (active) Jan 28 01:18:45.908362 kernel: pnp 00:03: Plug and Play ACPI device, IDs PNP0501 (active) Jan 28 01:18:45.909037 kernel: pnp 00:04: Plug and Play ACPI device, IDs PNP0b00 (active) Jan 28 01:18:45.909441 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Jan 28 01:18:45.909707 kernel: system 00:05: Plug and Play ACPI device, IDs PNP0c01 (active) Jan 28 01:18:45.909759 kernel: pnp: PnP ACPI: found 6 devices Jan 28 01:18:45.909769 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jan 28 01:18:45.909776 kernel: NET: Registered protocol family 2 Jan 28 01:18:45.909783 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jan 28 01:18:45.909791 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jan 28 01:18:45.909798 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jan 28 01:18:45.909807 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jan 28 01:18:45.909815 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jan 28 01:18:45.909824 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jan 28 01:18:45.909835 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jan 28 01:18:45.909842 kernel: NET: Registered protocol family 1 Jan 28 01:18:45.909851 kernel: NET: Registered protocol family 44 Jan 28 01:18:45.909928 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jan 28 01:18:45.909991 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jan 28 01:18:45.910057 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jan 28 01:18:45.910120 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Jan 28 01:18:45.911782 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Jan 28 01:18:45.912009 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] Jan 28 01:18:45.912240 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jan 28 01:18:45.912334 kernel: pci 0000:00:01.0: pci_fixup_video+0x0/0xe0 took 21886 usecs Jan 28 01:18:45.912347 kernel: PCI: CLS 0 bytes, default 64 Jan 28 01:18:45.912354 kernel: Initialise system trusted keyrings Jan 28 01:18:45.912362 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jan 28 01:18:45.912371 kernel: Key type asymmetric registered Jan 28 01:18:45.912379 kernel: Asymmetric key parser 'x509' registered Jan 28 01:18:45.912387 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 251) Jan 28 01:18:45.912395 kernel: io scheduler mq-deadline registered Jan 28 01:18:45.912408 kernel: io scheduler kyber registered Jan 28 01:18:45.912416 kernel: io scheduler bfq registered Jan 28 01:18:45.912425 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jan 28 01:18:45.912433 kernel: PCI Interrupt Link [GSIG] enabled at IRQ 22 Jan 28 01:18:45.912442 kernel: PCI Interrupt Link [GSIH] enabled at IRQ 23 Jan 28 01:18:45.912450 kernel: PCI Interrupt Link [GSIE] enabled at IRQ 20 Jan 28 01:18:45.912651 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jan 28 01:18:45.912662 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jan 28 01:18:45.912670 kernel: random: fast init done Jan 28 01:18:45.912682 kernel: random: crng init done Jan 28 01:18:45.912691 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jan 28 01:18:45.912699 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jan 28 01:18:45.912708 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jan 28 01:18:45.912716 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jan 28 01:18:45.912725 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jan 28 01:18:45.912824 kernel: rtc_cmos 00:04: RTC can wake from S4 Jan 28 01:18:45.912838 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jan 28 01:18:45.912908 kernel: rtc_cmos 00:04: registered as rtc0 Jan 28 01:18:45.912981 kernel: rtc_cmos 00:04: setting system clock to 2026-01-28T01:18:41 UTC (1769563121) Jan 28 01:18:45.913055 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Jan 28 01:18:45.913066 kernel: NET: Registered protocol family 10 Jan 28 01:18:45.913074 kernel: Segment Routing with IPv6 Jan 28 01:18:45.913081 kernel: NET: Registered protocol family 17 Jan 28 01:18:45.913088 kernel: Key type dns_resolver registered Jan 28 01:18:45.913095 kernel: IPI shorthand broadcast: enabled Jan 28 01:18:45.913103 kernel: sched_clock: Marking stable (10022362242, 2130452784)->(14135427344, -1982612318) Jan 28 01:18:45.913110 kernel: registered taskstats version 1 Jan 28 01:18:45.913121 kernel: Loading compiled-in X.509 certificates Jan 28 01:18:45.913249 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.10.107-flatcar: 5866c780451a04cc08b278527846e2b48fb1aa10' Jan 28 01:18:45.913258 kernel: Key type ._fscrypt registered Jan 28 01:18:45.913266 kernel: Key type .fscrypt registered Jan 28 01:18:45.913274 kernel: Key type fscrypt-provisioning registered Jan 28 01:18:45.913282 kernel: ima: No TPM chip found, activating TPM-bypass! Jan 28 01:18:45.913290 kernel: ima: Allocated hash algorithm: sha1 Jan 28 01:18:45.913299 kernel: ima: No architecture policies found Jan 28 01:18:45.913307 kernel: Freeing unused kernel image (initmem) memory: 42228K Jan 28 01:18:45.913319 kernel: Write protecting the kernel read-only data: 24576k Jan 28 01:18:45.913340 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jan 28 01:18:45.913350 kernel: Freeing unused kernel image (rodata/data gap) memory: 648K Jan 28 01:18:45.913360 kernel: Run /init as init process Jan 28 01:18:45.913369 kernel: with arguments: Jan 28 01:18:45.913377 kernel: /init Jan 28 01:18:45.913385 kernel: with environment: Jan 28 01:18:45.913393 kernel: HOME=/ Jan 28 01:18:45.913401 kernel: TERM=linux Jan 28 01:18:45.913411 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jan 28 01:18:45.913422 systemd[1]: systemd 249 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jan 28 01:18:45.913434 systemd[1]: Detected virtualization kvm. Jan 28 01:18:45.913445 systemd[1]: Detected architecture x86-64. Jan 28 01:18:45.913455 systemd[1]: Running in initial RAM disk. Jan 28 01:18:45.913664 systemd[1]: No hostname configured, using default hostname. Jan 28 01:18:45.913672 systemd[1]: Hostname set to . Jan 28 01:18:45.913680 systemd[1]: Initializing machine ID from VM UUID. Jan 28 01:18:45.913688 systemd[1]: Queued start job for default target Initrd Default Target. Jan 28 01:18:45.913696 systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Jan 28 01:18:45.913703 systemd[1]: Reached target Local Encrypted Volumes. Jan 28 01:18:45.913715 systemd[1]: Reached target Path Units. Jan 28 01:18:45.913725 systemd[1]: Reached target Slice Units. Jan 28 01:18:45.913736 systemd[1]: Reached target Swaps. Jan 28 01:18:45.913744 systemd[1]: Reached target Timer Units. Jan 28 01:18:45.913752 systemd[1]: Listening on Open-iSCSI iscsid Socket. Jan 28 01:18:45.913760 systemd[1]: Listening on Open-iSCSI iscsiuio Socket. Jan 28 01:18:45.913768 systemd[1]: Listening on Journal Audit Socket. Jan 28 01:18:45.913775 systemd[1]: Listening on Journal Socket (/dev/log). Jan 28 01:18:45.913786 systemd[1]: Listening on Journal Socket. Jan 28 01:18:45.913794 systemd[1]: Listening on Network Service Netlink Socket. Jan 28 01:18:45.913803 systemd[1]: Listening on udev Control Socket. Jan 28 01:18:45.913812 systemd[1]: Listening on udev Kernel Socket. Jan 28 01:18:45.913820 systemd[1]: Reached target Socket Units. Jan 28 01:18:45.913828 systemd[1]: Starting Create List of Static Device Nodes... Jan 28 01:18:45.913836 systemd[1]: Finished Network Cleanup. Jan 28 01:18:45.913845 systemd[1]: Started Hardware RNG Entropy Gatherer Daemon. Jan 28 01:18:45.913853 systemd[1]: Starting Journal Service... Jan 28 01:18:45.913864 systemd[1]: Condition check resulted in Load Kernel Modules being skipped. Jan 28 01:18:45.913873 systemd[1]: Starting Apply Kernel Variables... Jan 28 01:18:45.913881 systemd[1]: Starting Setup Virtual Console... Jan 28 01:18:45.913889 systemd[1]: Finished Create List of Static Device Nodes. Jan 28 01:18:45.913898 systemd[1]: Finished Apply Kernel Variables. Jan 28 01:18:45.913988 systemd-journald[191]: Journal started Jan 28 01:18:45.914399 systemd-journald[191]: Runtime Journal (/run/log/journal/fa1e1d18ced9400a87c9345b0e6351fe) is 6.0M, max 48.7M, 42.6M free. Jan 28 01:18:46.090291 kernel: hrtimer: interrupt took 7173613 ns Jan 28 01:18:47.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:47.426125 kernel: audit: type=1130 audit(1769563127.344:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:47.426344 systemd[1]: Started Journal Service. Jan 28 01:18:47.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:47.462403 systemd[1]: Finished Setup Virtual Console. Jan 28 01:18:47.530998 kernel: audit: type=1130 audit(1769563127.460:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:47.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:47.567701 systemd[1]: Starting dracut ask for additional cmdline parameters... Jan 28 01:18:47.669031 kernel: audit: type=1130 audit(1769563127.561:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:47.632736 systemd[1]: Starting Create Static Device Nodes in /dev... Jan 28 01:18:47.765867 kernel: audit: type=1130 audit(1769563127.689:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:47.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:47.670375 systemd[1]: Finished Create Static Device Nodes in /dev. Jan 28 01:18:47.783961 systemd[1]: Finished dracut ask for additional cmdline parameters. Jan 28 01:18:47.864853 kernel: audit: type=1130 audit(1769563127.797:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:47.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:47.801982 systemd[1]: Starting dracut cmdline hook... Jan 28 01:18:47.891725 dracut-cmdline[209]: dracut-dracut-053 Jan 28 01:18:47.891725 dracut-cmdline[209]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Jan 28 01:18:47.891725 dracut-cmdline[209]: BEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=15990f5bb88d618f1948b7e8a720f1d5b95900cfecbef00df890bd0a136b39aa Jan 28 01:18:48.178048 kernel: SCSI subsystem initialized Jan 28 01:18:48.218836 kernel: Loading iSCSI transport class v2.0-870. Jan 28 01:18:48.289780 kernel: iscsi: registered transport (tcp) Jan 28 01:18:48.386432 kernel: iscsi: registered transport (qla4xxx) Jan 28 01:18:48.387776 kernel: QLogic iSCSI HBA Driver Jan 28 01:18:48.475410 systemd[1]: Finished dracut cmdline hook. Jan 28 01:18:48.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:48.507304 systemd[1]: Starting dracut pre-udev hook... Jan 28 01:18:48.608939 kernel: audit: type=1130 audit(1769563128.501:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:48.671256 kernel: device-mapper: uevent: version 1.0.3 Jan 28 01:18:48.672885 kernel: device-mapper: ioctl: 4.43.0-ioctl (2020-10-01) initialised: dm-devel@redhat.com Jan 28 01:18:48.870003 kernel: raid6: avx2x4 gen() 16916 MB/s Jan 28 01:18:48.899818 kernel: raid6: avx2x4 xor() 3549 MB/s Jan 28 01:18:48.926894 kernel: raid6: avx2x2 gen() 16149 MB/s Jan 28 01:18:48.967339 kernel: raid6: avx2x2 xor() 15375 MB/s Jan 28 01:18:49.001648 kernel: raid6: avx2x1 gen() 9833 MB/s Jan 28 01:18:49.029740 kernel: raid6: avx2x1 xor() 9717 MB/s Jan 28 01:18:49.059794 kernel: raid6: sse2x4 gen() 9307 MB/s Jan 28 01:18:49.087830 kernel: raid6: sse2x4 xor() 2861 MB/s Jan 28 01:18:49.116848 kernel: raid6: sse2x2 gen() 2437 MB/s Jan 28 01:18:49.150972 kernel: raid6: sse2x2 xor() 6748 MB/s Jan 28 01:18:49.177838 kernel: raid6: sse2x1 gen() 581 MB/s Jan 28 01:18:49.223953 kernel: raid6: sse2x1 xor() 4004 MB/s Jan 28 01:18:49.225010 kernel: raid6: using algorithm avx2x4 gen() 16916 MB/s Jan 28 01:18:49.225029 kernel: raid6: .... xor() 3549 MB/s, rmw enabled Jan 28 01:18:49.251016 kernel: raid6: using avx2x2 recovery algorithm Jan 28 01:18:49.334997 kernel: xor: automatically using best checksumming function avx Jan 28 01:18:49.835813 kernel: Btrfs loaded, crc32c=crc32c-intel Jan 28 01:18:49.901733 systemd[1]: Finished dracut pre-udev hook. Jan 28 01:18:49.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:49.995000 audit: BPF prog-id=6 op=LOAD Jan 28 01:18:50.024100 kernel: audit: type=1130 audit(1769563129.915:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:50.024252 kernel: audit: type=1334 audit(1769563129.995:9): prog-id=6 op=LOAD Jan 28 01:18:50.025000 audit: BPF prog-id=7 op=LOAD Jan 28 01:18:50.052724 kernel: audit: type=1334 audit(1769563130.025:10): prog-id=7 op=LOAD Jan 28 01:18:50.053000 audit: BPF prog-id=8 op=LOAD Jan 28 01:18:50.055956 systemd[1]: Starting Rule-based Manager for Device Events and Files... Jan 28 01:18:50.118268 kernel: audit: type=1334 audit(1769563130.053:11): prog-id=8 op=LOAD Jan 28 01:18:50.191795 systemd-udevd[330]: /usr/lib64/udev/rules.d/50-udev-default.rules:42 Unknown group 'sgx', ignoring Jan 28 01:18:50.200908 systemd[1]: Started Rule-based Manager for Device Events and Files. Jan 28 01:18:50.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:50.266912 systemd[1]: Starting dracut pre-trigger hook... Jan 28 01:18:50.296000 audit: BPF prog-id=9 op=LOAD Jan 28 01:18:50.299873 systemd[1]: Starting Network Configuration... Jan 28 01:18:50.336998 dracut-pre-trigger[339]: rd.md=0: removing MD RAID activation Jan 28 01:18:50.477277 systemd-networkd[344]: lo: Link UP Jan 28 01:18:50.477407 systemd-networkd[344]: lo: Gained carrier Jan 28 01:18:50.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:50.479900 systemd-networkd[344]: Enumeration completed Jan 28 01:18:50.480110 systemd[1]: Started Network Configuration. Jan 28 01:18:50.518000 audit: BPF prog-id=10 op=LOAD Jan 28 01:18:50.521405 systemd[1]: Starting Network Name Resolution... Jan 28 01:18:50.554902 systemd[1]: Finished dracut pre-trigger hook. Jan 28 01:18:50.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:50.583764 systemd[1]: Starting Coldplug All udev Devices... Jan 28 01:18:50.640062 systemd-udevd[330]: /usr/lib64/udev/rules.d/50-udev-default.rules:42 Unknown group 'sgx', ignoring Jan 28 01:18:50.759415 systemd-resolved[369]: Positive Trust Anchors: Jan 28 01:18:50.761933 systemd-resolved[369]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jan 28 01:18:50.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:50.761968 systemd-resolved[369]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jan 28 01:18:50.762911 systemd-resolved[369]: Defaulting to hostname 'linux'. Jan 28 01:18:50.768676 systemd[1]: Started Network Name Resolution. Jan 28 01:18:50.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:50.791692 systemd[1]: Reached target Network. Jan 28 01:18:50.791756 systemd[1]: Reached target Host and Network Name Lookups. Jan 28 01:18:50.981359 iscsid[394]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jan 28 01:18:50.981359 iscsid[394]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jan 28 01:18:50.981359 iscsid[394]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jan 28 01:18:50.981359 iscsid[394]: If using hardware iscsi like qla4xxx this message can be ignored. Jan 28 01:18:50.981359 iscsid[394]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jan 28 01:18:50.981359 iscsid[394]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jan 28 01:18:51.267047 kernel: cryptd: max_cpu_qlen set to 1000 Jan 28 01:18:50.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:51.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:50.833009 systemd[1]: Starting iSCSI UserSpace I/O driver... Jan 28 01:18:50.920444 systemd[1]: Started iSCSI UserSpace I/O driver. Jan 28 01:18:51.300819 kernel: libata version 3.00 loaded. Jan 28 01:18:50.938030 systemd[1]: Starting Open-iSCSI... Jan 28 01:18:52.408727 kernel: ahci 0000:00:1f.2: version 3.0 Jan 28 01:18:52.409367 kernel: PCI Interrupt Link [GSIA] enabled at IRQ 16 Jan 28 01:18:52.409385 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Jan 28 01:18:52.409706 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Jan 28 01:18:52.409817 kernel: scsi host0: ahci Jan 28 01:18:52.410114 kernel: scsi host1: ahci Jan 28 01:18:52.410346 kernel: scsi host2: ahci Jan 28 01:18:52.410667 kernel: scsi host3: ahci Jan 28 01:18:52.410886 kernel: scsi host4: ahci Jan 28 01:18:52.410986 kernel: scsi host5: ahci Jan 28 01:18:52.411079 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 31 Jan 28 01:18:52.411093 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 31 Jan 28 01:18:52.411106 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 31 Jan 28 01:18:52.411122 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 31 Jan 28 01:18:52.411132 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 31 Jan 28 01:18:52.411141 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 31 Jan 28 01:18:52.411150 kernel: AVX2 version of gcm_enc/dec engaged. Jan 28 01:18:52.411287 kernel: virtio_blk virtio1: [vda] 9289728 512-byte logical blocks (4.76 GB/4.43 GiB) Jan 28 01:18:52.414331 kernel: AES CTR mode by8 optimization enabled Jan 28 01:18:52.414418 kernel: vda: detected capacity change from 0 to 4756340736 Jan 28 01:18:52.414430 kernel: ata4: SATA link down (SStatus 0 SControl 300) Jan 28 01:18:52.414442 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Jan 28 01:18:50.968976 systemd[1]: Started Open-iSCSI. Jan 28 01:18:54.487874 kernel: ata2: SATA link down (SStatus 0 SControl 300) Jan 28 01:18:54.488738 kernel: ata5: SATA link down (SStatus 0 SControl 300) Jan 28 01:18:54.488753 kernel: ata6: SATA link down (SStatus 0 SControl 300) Jan 28 01:18:54.488764 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jan 28 01:18:54.488775 kernel: ata1: SATA link down (SStatus 0 SControl 300) Jan 28 01:18:54.488787 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Jan 28 01:18:54.488800 kernel: ata3.00: applying bridge limits Jan 28 01:18:54.488820 kernel: ata3.00: configured for UDMA/100 Jan 28 01:18:54.488831 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Jan 28 01:18:54.513280 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Jan 28 01:18:54.513412 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jan 28 01:18:54.513426 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Jan 28 01:18:54.513724 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/vda6 scanned by systemd-udevd (390) Jan 28 01:18:54.513737 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jan 28 01:18:50.991080 systemd[1]: Finished Coldplug All udev Devices. Jan 28 01:18:51.167772 systemd[1]: Starting dracut initqueue hook... Jan 28 01:18:52.589861 systemd-udevd[388]: Using default interface naming scheme 'v249'. Jan 28 01:18:52.714394 systemd-networkd[344]: eth0: Link UP Jan 28 01:18:52.866815 systemd[1]: Found device /dev/disk/by-partlabel/USR-A. Jan 28 01:18:53.254100 systemd-networkd[344]: eth0: Gained carrier Jan 28 01:18:53.534678 systemd-networkd[344]: eth0: DHCPv4 address 10.0.0.3/16 via 10.0.0.1 Jan 28 01:18:54.488763 systemd[1]: Found device /dev/disk/by-partuuid/7130c94a-213a-4e5a-8e26-6cce9662f132. Jan 28 01:18:54.563808 systemd[1]: Found device /dev/disk/by-label/ROOT. Jan 28 01:18:54.611849 systemd[1]: Found device /dev/disk/by-label/OEM. Jan 28 01:18:54.972076 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jan 28 01:18:54.732309 systemd[1]: Found device /dev/disk/by-label/EFI-SYSTEM. Jan 28 01:18:54.795268 systemd[1]: Reached target Initrd Root Device. Jan 28 01:18:54.865915 systemd[1]: Starting Generate new UUID for disk GPT if necessary... Jan 28 01:18:54.989662 systemd-networkd[344]: eth0: Gained IPv6LL Jan 28 01:18:56.035303 systemd[1]: Finished dracut initqueue hook. Jan 28 01:18:56.168120 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jan 28 01:18:56.168363 kernel: kauditd_printk_skb: 9 callbacks suppressed Jan 28 01:18:56.168394 kernel: audit: type=1130 audit(1769563136.059:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:56.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:56.168691 disk-uuid[471]: The operation has completed successfully. Jan 28 01:18:56.061952 systemd[1]: Reached target Preparation for Remote File Systems. Jan 28 01:18:56.182353 systemd[1]: Reached target Remote Encrypted Volumes. Jan 28 01:18:56.182856 systemd[1]: Reached target Remote File Systems. Jan 28 01:18:56.388289 kernel: audit: type=1130 audit(1769563136.276:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:56.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:56.228164 systemd[1]: Starting dracut pre-mount hook... Jan 28 01:18:56.271384 systemd[1]: Finished dracut pre-mount hook. Jan 28 01:18:56.731915 systemd[1]: disk-uuid.service: Deactivated successfully. Jan 28 01:18:56.732311 systemd[1]: Finished Generate new UUID for disk GPT if necessary. Jan 28 01:18:56.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:56.812787 systemd[1]: Starting Ignition (setup)... Jan 28 01:18:57.022661 kernel: audit: type=1130 audit(1769563136.803:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:57.022714 kernel: audit: type=1131 audit(1769563136.803:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:57.022730 kernel: BTRFS info (device vda6): disk space caching is enabled Jan 28 01:18:57.022743 kernel: BTRFS info (device vda6): has skinny extents Jan 28 01:18:56.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:57.131734 systemd[1]: mnt-oem.mount: Deactivated successfully. Jan 28 01:18:57.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:57.205096 systemd[1]: ignition-setup.service: Deactivated successfully. Jan 28 01:18:57.666375 kernel: audit: type=1130 audit(1769563137.225:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:57.666707 kernel: audit: type=1131 audit(1769563137.226:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:57.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:57.207866 systemd[1]: Finished Ignition (setup). Jan 28 01:18:57.228078 systemd[1]: Starting Ignition (disks)... Jan 28 01:18:57.794906 ignition[511]: Ignition v0.36.1-15-gde4e6cc9 Jan 28 01:18:57.795099 ignition[511]: Stage: disks Jan 28 01:18:57.795114 ignition[511]: reading system config file "/usr/lib/ignition/base.ign" Jan 28 01:18:57.795396 ignition[511]: no config at "/usr/lib/ignition/base.ign" Jan 28 01:18:57.795718 ignition[511]: parsed url from cmdline: "" Jan 28 01:18:57.795723 ignition[511]: no config URL provided Jan 28 01:18:57.795729 ignition[511]: reading system config file "/usr/lib/ignition/user.ign" Jan 28 01:18:57.795739 ignition[511]: no config at "/usr/lib/ignition/user.ign" Jan 28 01:18:57.795872 ignition[511]: op(1): [started] loading QEMU firmware config module Jan 28 01:18:57.795882 ignition[511]: op(1): executing: "modprobe" "qemu_fw_cfg" Jan 28 01:18:57.941416 ignition[511]: op(1): [finished] loading QEMU firmware config module Jan 28 01:18:58.341810 ignition[511]: parsing config with SHA512: da111b9347eff1235042e5181f6d27f74cd2d6f28bad52441a22f846b9aef743aa16394a8f81f60cbbeabbe81012d5a7ec68017d4b85eadd2196a6fc8a189965 Jan 28 01:18:58.356116 ignition[511]: disks: disks passed Jan 28 01:18:58.356327 ignition[511]: Ignition finished successfully Jan 28 01:18:58.380076 systemd[1]: ignition-disks.service: Deactivated successfully. Jan 28 01:18:58.381942 systemd[1]: Finished Ignition (disks). Jan 28 01:18:58.519027 kernel: audit: type=1130 audit(1769563138.394:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:58.519067 kernel: audit: type=1131 audit(1769563138.396:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:58.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:58.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:58.396815 systemd[1]: Reached target Preparation for Local File Systems. Jan 28 01:18:58.557791 systemd[1]: Starting File System Check on /dev/disk/by-label/ROOT... Jan 28 01:18:58.589764 systemd[1]: Starting Verity Setup for /dev/mapper/usr... Jan 28 01:18:58.692396 systemd-fsck[526]: ROOT: clean, 556/553792 files, 37783/553472 blocks Jan 28 01:18:58.697795 kernel: device-mapper: verity: sha256 using implementation "sha256-generic" Jan 28 01:18:58.718346 systemd[1]: Finished File System Check on /dev/disk/by-label/ROOT. Jan 28 01:18:58.812705 kernel: audit: type=1130 audit(1769563138.721:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:58.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:58.727803 systemd[1]: Mounting /sysroot... Jan 28 01:18:58.997854 systemd[1]: Found device /dev/mapper/usr. Jan 28 01:18:59.016782 systemd[1]: Starting File System Check on /dev/mapper/usr... Jan 28 01:18:59.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:59.057149 systemd[1]: Finished Verity Setup for /dev/mapper/usr. Jan 28 01:18:59.148814 kernel: audit: type=1130 audit(1769563139.056:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:59.261137 systemd-fsck[538]: fsck.ext4: Operation not permitted while trying to open /dev/mapper/usr Jan 28 01:18:59.261137 systemd-fsck[538]: You must have r/w access to the filesystem or be root Jan 28 01:18:59.304344 systemd-fsck[535]: fsck failed with exit status 8. Jan 28 01:18:59.309978 systemd-fsck[535]: Ignoring error. Jan 28 01:18:59.311656 systemd[1]: Finished File System Check on /dev/mapper/usr. Jan 28 01:18:59.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:18:59.420033 systemd[1]: Mounting /sysusr/usr... Jan 28 01:18:59.596790 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null) Jan 28 01:18:59.596881 kernel: ext4 filesystem being mounted at /sysroot supports timestamps until 2038 (0x7fffffff) Jan 28 01:18:59.596895 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: (null) Jan 28 01:18:59.598052 systemd[1]: Mounted /sysroot. Jan 28 01:18:59.644345 systemd[1]: Mounted /sysusr/usr. Jan 28 01:18:59.654798 systemd[1]: Reached target Initrd Root File System. Jan 28 01:18:59.692990 systemd[1]: Reached target Local File Systems. Jan 28 01:18:59.706393 systemd[1]: Reached target System Initialization. Jan 28 01:18:59.728376 systemd[1]: Reached target Basic System. Jan 28 01:18:59.753735 systemd[1]: Mounting /sysroot/usr... Jan 28 01:18:59.771790 systemd[1]: Mounted /sysroot/usr. Jan 28 01:18:59.795764 systemd[1]: Starting Root filesystem setup... Jan 28 01:19:00.062061 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jan 28 01:19:00.064126 systemd[1]: Finished Root filesystem setup. Jan 28 01:19:00.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:00.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:00.108075 systemd[1]: Starting Ignition (files)... Jan 28 01:19:00.134417 systemd[1]: Starting /sysroot/boot... Jan 28 01:19:00.242017 ignition[553]: Ignition v0.36.1-15-gde4e6cc9 Jan 28 01:19:00.242149 ignition[553]: Stage: files Jan 28 01:19:00.242161 ignition[553]: reading system config file "/usr/lib/ignition/base.ign" Jan 28 01:19:00.242177 ignition[553]: no config at "/usr/lib/ignition/base.ign" Jan 28 01:19:00.244705 ignition[553]: files: compiled without relabeling support, skipping Jan 28 01:19:00.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:00.350846 systemd[1]: Finished /sysroot/boot. Jan 28 01:19:00.533378 ignition[553]: files: createUsers: op(1): [started] creating or modifying user "core" Jan 28 01:19:00.536111 ignition[553]: files: createUsers: op(1): executing: "/usr/sbin/usermod" "--root" "/sysroot" "core" Jan 28 01:19:00.552387 ignition[553]: files: createUsers: op(1): [finished] creating or modifying user "core" Jan 28 01:19:00.552401 ignition[553]: files: createUsers: op(2): [started] adding ssh keys to user "core" Jan 28 01:19:00.603170 ignition[553]: files: createUsers: op(2): [finished] adding ssh keys to user "core" Jan 28 01:19:00.603349 ignition[553]: files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/etc/flatcar/update.conf" Jan 28 01:19:00.647430 ignition[553]: files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/etc/flatcar/update.conf" Jan 28 01:19:00.647906 ignition[553]: files: op(4): [started] processing unit "coreos-metadata.service" Jan 28 01:19:00.648144 ignition[553]: files: op(4): op(5): [started] writing unit "coreos-metadata.service" at "etc/systemd/system/coreos-metadata.service" Jan 28 01:19:00.720787 ignition[553]: files: op(4): op(5): [finished] writing unit "coreos-metadata.service" at "etc/systemd/system/coreos-metadata.service" Jan 28 01:19:00.720988 ignition[553]: files: op(4): [finished] processing unit "coreos-metadata.service" Jan 28 01:19:00.720998 ignition[553]: files: files passed Jan 28 01:19:00.721003 ignition[553]: Ignition finished successfully Jan 28 01:19:00.791018 systemd[1]: ignition-files.service: Deactivated successfully. Jan 28 01:19:00.805790 systemd[1]: Finished Ignition (files). Jan 28 01:19:00.830992 systemd[1]: Condition check resulted in Populate torcx store to satisfy profile being skipped. Jan 28 01:19:00.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:00.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:00.863791 systemd[1]: Starting Ignition (record completion)... Jan 28 01:19:00.891686 systemd[1]: Starting Reload Configuration from the Real Root... Jan 28 01:19:00.922044 systemd[1]: ignition-quench.service: Deactivated successfully. Jan 28 01:19:00.926114 systemd[1]: Finished Ignition (record completion). Jan 28 01:19:00.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:00.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:00.963906 systemd[1]: Reloading. Jan 28 01:19:01.004000 audit: BPF prog-id=3 op=UNLOAD Jan 28 01:19:01.006000 audit: BPF prog-id=10 op=UNLOAD Jan 28 01:19:01.012000 audit: BPF prog-id=9 op=UNLOAD Jan 28 01:19:01.014000 audit: BPF prog-id=6 op=UNLOAD Jan 28 01:19:01.423000 audit: BPF prog-id=11 op=LOAD Jan 28 01:19:01.442903 kernel: kauditd_printk_skb: 12 callbacks suppressed Jan 28 01:19:01.442973 kernel: audit: type=1334 audit(1769563141.423:43): prog-id=11 op=LOAD Jan 28 01:19:01.439000 audit: BPF prog-id=12 op=LOAD Jan 28 01:19:01.484404 kernel: audit: type=1334 audit(1769563141.439:44): prog-id=12 op=LOAD Jan 28 01:19:01.484688 kernel: audit: type=1334 audit(1769563141.483:45): prog-id=13 op=LOAD Jan 28 01:19:01.483000 audit: BPF prog-id=13 op=LOAD Jan 28 01:19:01.503018 kernel: audit: type=1334 audit(1769563141.483:46): prog-id=4 op=UNLOAD Jan 28 01:19:01.483000 audit: BPF prog-id=4 op=UNLOAD Jan 28 01:19:01.527319 kernel: audit: type=1334 audit(1769563141.483:47): prog-id=5 op=UNLOAD Jan 28 01:19:01.483000 audit: BPF prog-id=5 op=UNLOAD Jan 28 01:19:01.526000 audit: BPF prog-id=14 op=LOAD Jan 28 01:19:01.566732 kernel: audit: type=1334 audit(1769563141.526:48): prog-id=14 op=LOAD Jan 28 01:19:01.567039 kernel: audit: type=1334 audit(1769563141.545:49): prog-id=15 op=LOAD Jan 28 01:19:01.545000 audit: BPF prog-id=15 op=LOAD Jan 28 01:19:01.584756 kernel: audit: type=1334 audit(1769563141.566:50): prog-id=16 op=LOAD Jan 28 01:19:01.566000 audit: BPF prog-id=16 op=LOAD Jan 28 01:19:01.600000 audit: BPF prog-id=17 op=LOAD Jan 28 01:19:01.623138 kernel: audit: type=1334 audit(1769563141.600:51): prog-id=17 op=LOAD Jan 28 01:19:01.629000 audit: BPF prog-id=18 op=LOAD Jan 28 01:19:01.631000 audit: BPF prog-id=7 op=UNLOAD Jan 28 01:19:01.631000 audit: BPF prog-id=8 op=UNLOAD Jan 28 01:19:01.665177 kernel: audit: type=1334 audit(1769563141.629:52): prog-id=18 op=LOAD Jan 28 01:19:01.737911 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jan 28 01:19:01.738766 systemd[1]: Finished Reload Configuration from the Real Root. Jan 28 01:19:01.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:01.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:01.773045 systemd[1]: Reached target Initrd File Systems. Jan 28 01:19:01.785392 systemd[1]: Reached target Initrd Default Target. Jan 28 01:19:01.794163 systemd[1]: Condition check resulted in dracut mount hook being skipped. Jan 28 01:19:01.837933 systemd[1]: Starting dracut pre-pivot and cleanup hook... Jan 28 01:19:01.945898 systemd[1]: Finished dracut pre-pivot and cleanup hook. Jan 28 01:19:01.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:01.986329 systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Jan 28 01:19:02.011017 systemd[1]: Stopped target Host and Network Name Lookups. Jan 28 01:19:02.043382 systemd[1]: Stopped target Remote Encrypted Volumes. Jan 28 01:19:02.071325 systemd[1]: Stopped target Timer Units. Jan 28 01:19:02.097101 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jan 28 01:19:02.098054 systemd[1]: Stopped dracut pre-pivot and cleanup hook. Jan 28 01:19:02.136754 systemd[1]: Stopped target Initrd Default Target. Jan 28 01:19:02.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:02.170385 systemd[1]: Stopped target Basic System. Jan 28 01:19:02.202421 systemd[1]: Stopped target Initrd Root Device. Jan 28 01:19:02.230776 systemd[1]: Stopped target Path Units. Jan 28 01:19:02.253325 systemd[1]: Stopped target Remote File Systems. Jan 28 01:19:02.276414 systemd[1]: Stopped target Preparation for Remote File Systems. Jan 28 01:19:02.302332 systemd[1]: Stopped target Slice Units. Jan 28 01:19:02.333172 systemd[1]: Stopped target Socket Units. Jan 28 01:19:02.348103 systemd[1]: Stopped target System Initialization. Jan 28 01:19:02.387080 systemd[1]: Stopped target Local File Systems. Jan 28 01:19:02.412855 systemd[1]: Stopped target Preparation for Local File Systems. Jan 28 01:19:02.447074 systemd[1]: Stopped target Swaps. Jan 28 01:19:02.481645 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jan 28 01:19:02.495310 systemd[1]: Stopped dracut pre-mount hook. Jan 28 01:19:02.518349 systemd[1]: Stopped target Local Encrypted Volumes. Jan 28 01:19:02.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:02.556412 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jan 28 01:19:02.585863 systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Jan 28 01:19:02.629320 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jan 28 01:19:02.629873 systemd[1]: Stopped dracut initqueue hook. Jan 28 01:19:02.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:02.668925 systemd[1]: Stopping Open-iSCSI... Jan 28 01:19:02.691027 iscsid[394]: iscsid shutting down. Jan 28 01:19:02.703950 systemd[1]: Stopping /sysroot/boot... Jan 28 01:19:02.725169 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jan 28 01:19:02.740027 systemd[1]: Stopped Coldplug All udev Devices. Jan 28 01:19:02.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:02.761846 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jan 28 01:19:02.762115 systemd[1]: Stopped dracut pre-trigger hook. Jan 28 01:19:02.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:02.829958 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jan 28 01:19:02.845794 systemd[1]: iscsid.service: Deactivated successfully. Jan 28 01:19:02.846411 systemd[1]: Stopped Open-iSCSI. Jan 28 01:19:02.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:02.882995 systemd[1]: sysroot-boot.service: Deactivated successfully. Jan 28 01:19:02.883754 systemd[1]: Stopped /sysroot/boot. Jan 28 01:19:02.920397 systemd[1]: iscsid.socket: Deactivated successfully. Jan 28 01:19:02.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:02.933069 systemd[1]: Closed Open-iSCSI iscsid Socket. Jan 28 01:19:02.962423 systemd[1]: Stopping iSCSI UserSpace I/O driver... Jan 28 01:19:02.989715 systemd[1]: iscsiuio.service: Deactivated successfully. Jan 28 01:19:02.989994 systemd[1]: Stopped iSCSI UserSpace I/O driver. Jan 28 01:19:03.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:03.027341 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jan 28 01:19:03.041363 systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Jan 28 01:19:03.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:03.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:03.079835 systemd[1]: Stopped target Network. Jan 28 01:19:03.102941 systemd[1]: iscsiuio.socket: Deactivated successfully. Jan 28 01:19:03.103320 systemd[1]: Closed Open-iSCSI iscsiuio Socket. Jan 28 01:19:03.131724 systemd[1]: Stopping Network Name Resolution... Jan 28 01:19:03.174864 systemd[1]: systemd-resolved.service: Deactivated successfully. Jan 28 01:19:03.175369 systemd[1]: Stopped Network Name Resolution. Jan 28 01:19:03.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:03.225778 systemd[1]: Stopping Network Configuration... Jan 28 01:19:03.236000 audit: BPF prog-id=14 op=UNLOAD Jan 28 01:19:03.234873 systemd-networkd[344]: eth0: DHCP lease lost Jan 28 01:19:03.265936 systemd-networkd[344]: eth0: DHCPv6 lease lost Jan 28 01:19:03.278404 systemd[1]: systemd-networkd.service: Deactivated successfully. Jan 28 01:19:03.278987 systemd[1]: Stopped Network Configuration. Jan 28 01:19:03.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:03.317000 audit: BPF prog-id=15 op=UNLOAD Jan 28 01:19:03.316878 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jan 28 01:19:03.316934 systemd[1]: Closed Network Service Netlink Socket. Jan 28 01:19:03.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:03.334453 systemd[1]: Stopping Network Cleanup... Jan 28 01:19:03.369370 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jan 28 01:19:03.369688 systemd[1]: Stopped Apply Kernel Variables. Jan 28 01:19:03.384112 systemd[1]: Stopping Rule-based Manager for Device Events and Files... Jan 28 01:19:03.423141 systemd[1]: network-cleanup.service: Deactivated successfully. Jan 28 01:19:03.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:03.423829 systemd[1]: Stopped Network Cleanup. Jan 28 01:19:03.484049 systemd[1]: systemd-udevd.service: Deactivated successfully. Jan 28 01:19:03.484799 systemd[1]: Stopped Rule-based Manager for Device Events and Files. Jan 28 01:19:03.513000 audit: BPF prog-id=16 op=UNLOAD Jan 28 01:19:03.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:03.531203 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jan 28 01:19:03.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:03.531383 systemd[1]: Closed udev Control Socket. Jan 28 01:19:03.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:03.541113 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jan 28 01:19:03.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:03.541161 systemd[1]: Closed udev Kernel Socket. Jan 28 01:19:03.555749 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jan 28 01:19:03.555813 systemd[1]: Stopped dracut pre-udev hook. Jan 28 01:19:03.556131 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jan 28 01:19:03.556175 systemd[1]: Stopped dracut cmdline hook. Jan 28 01:19:03.593669 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jan 28 01:19:03.593764 systemd[1]: Stopped dracut ask for additional cmdline parameters. Jan 28 01:19:03.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:03.645680 systemd[1]: Starting Cleanup udev Database... Jan 28 01:19:03.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:03.670387 systemd[1]: Stopping Hardware RNG Entropy Gatherer Daemon... Jan 28 01:19:03.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:03.711424 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jan 28 01:19:03.713402 systemd[1]: Stopped Create Static Device Nodes in /dev. Jan 28 01:19:03.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=rngd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:03.761991 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jan 28 01:19:03.762451 systemd[1]: Stopped Create List of Static Device Nodes. Jan 28 01:19:03.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:03.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:03.776408 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jan 28 01:19:03.776681 systemd[1]: Stopped Setup Virtual Console. Jan 28 01:19:03.816121 systemd[1]: rngd.service: Deactivated successfully. Jan 28 01:19:03.996000 audit: BPF prog-id=11 op=UNLOAD Jan 28 01:19:03.817021 systemd[1]: Stopped Hardware RNG Entropy Gatherer Daemon. Jan 28 01:19:03.862079 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jan 28 01:19:03.862435 systemd[1]: Finished Cleanup udev Database. Jan 28 01:19:03.890778 systemd[1]: Reached target Switch Root. Jan 28 01:19:03.918695 systemd[1]: Starting Switch Root... Jan 28 01:19:03.987925 systemd[1]: Switching root. Jan 28 01:19:04.073431 systemd-journald[191]: Journal stopped Jan 28 01:19:31.763921 systemd-journald[191]: Received SIGTERM from PID 1 (n/a). Jan 28 01:19:31.764036 kernel: SELinux: policy capability network_peer_controls=1 Jan 28 01:19:31.764049 kernel: SELinux: policy capability open_perms=1 Jan 28 01:19:31.764061 kernel: SELinux: policy capability extended_socket_class=1 Jan 28 01:19:31.764069 kernel: SELinux: policy capability always_check_network=0 Jan 28 01:19:31.764121 kernel: SELinux: policy capability cgroup_seclabel=1 Jan 28 01:19:31.764130 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jan 28 01:19:31.764137 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jan 28 01:19:31.764149 systemd[1]: Successfully loaded SELinux policy in 909.228ms. Jan 28 01:19:31.764165 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 41.126ms. Jan 28 01:19:31.764174 systemd[1]: systemd 249 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jan 28 01:19:31.764183 systemd[1]: Detected virtualization kvm. Jan 28 01:19:31.764190 systemd[1]: Detected architecture x86-64. Jan 28 01:19:31.764198 systemd[1]: Detected first boot. Jan 28 01:19:31.764205 systemd[1]: Initializing machine ID from VM UUID. Jan 28 01:19:31.764252 kernel: kauditd_printk_skb: 34 callbacks suppressed Jan 28 01:19:31.764263 kernel: audit: type=1400 audit(1769563146.532:87): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jan 28 01:19:31.764271 kernel: audit: type=1400 audit(1769563146.532:88): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jan 28 01:19:31.764279 kernel: audit: type=1334 audit(1769563146.632:89): prog-id=19 op=LOAD Jan 28 01:19:31.764286 kernel: audit: type=1334 audit(1769563146.632:90): prog-id=19 op=UNLOAD Jan 28 01:19:31.764293 kernel: audit: type=1334 audit(1769563146.706:91): prog-id=20 op=LOAD Jan 28 01:19:31.764300 kernel: audit: type=1334 audit(1769563146.707:92): prog-id=20 op=UNLOAD Jan 28 01:19:31.764343 kernel: audit: type=1400 audit(1769563147.282:93): avc: denied { associate } for pid=718 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jan 28 01:19:31.764352 systemd[1]: Populated /etc with preset unit settings. Jan 28 01:19:31.764365 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jan 28 01:19:31.764429 systemd[1]: initrd-switch-root.service: Current command vanished from the unit file, execution of the command list won't be resumed. Jan 28 01:19:31.764438 kernel: audit: type=1334 audit(1769563170.242:94): prog-id=21 op=LOAD Jan 28 01:19:31.764446 kernel: audit: type=1334 audit(1769563170.261:95): prog-id=22 op=LOAD Jan 28 01:19:31.764453 kernel: audit: type=1334 audit(1769563170.273:96): prog-id=23 op=LOAD Jan 28 01:19:31.764531 kernel: audit: type=1334 audit(1769563170.275:97): prog-id=12 op=UNLOAD Jan 28 01:19:31.764577 kernel: audit: type=1334 audit(1769563170.275:98): prog-id=13 op=UNLOAD Jan 28 01:19:31.764585 kernel: audit: type=1334 audit(1769563170.329:99): prog-id=24 op=LOAD Jan 28 01:19:31.764592 kernel: audit: type=1334 audit(1769563170.329:100): prog-id=21 op=UNLOAD Jan 28 01:19:31.764599 kernel: audit: type=1334 audit(1769563170.341:101): prog-id=25 op=LOAD Jan 28 01:19:31.764606 kernel: audit: type=1334 audit(1769563170.360:102): prog-id=26 op=LOAD Jan 28 01:19:31.764613 kernel: audit: type=1334 audit(1769563170.361:103): prog-id=22 op=UNLOAD Jan 28 01:19:31.764626 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jan 28 01:19:31.764642 systemd[1]: Stopped Switch Root. Jan 28 01:19:31.764657 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jan 28 01:19:31.764679 systemd[1]: Created slice Slice /system/addon-config. Jan 28 01:19:31.764696 systemd[1]: Created slice Slice /system/addon-run. Jan 28 01:19:31.764712 systemd[1]: Created slice Slice /system/getty. Jan 28 01:19:31.764729 systemd[1]: Created slice Slice /system/modprobe. Jan 28 01:19:31.764744 systemd[1]: Created slice Slice /system/serial-getty. Jan 28 01:19:31.764761 systemd[1]: Created slice Slice /system/system-cloudinit. Jan 28 01:19:31.764779 systemd[1]: Created slice Slice /system/systemd-fsck. Jan 28 01:19:31.764791 systemd[1]: Created slice User and Session Slice. Jan 28 01:19:31.764805 systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Jan 28 01:19:31.764821 systemd[1]: Started Forward Password Requests to Wall Directory Watch. Jan 28 01:19:31.764838 systemd[1]: Set up automount Boot partition Automount Point. Jan 28 01:19:31.764854 systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Jan 28 01:19:31.764869 systemd[1]: Stopped target Switch Root. Jan 28 01:19:31.764883 systemd[1]: Stopped target Initrd File Systems. Jan 28 01:19:31.764900 systemd[1]: Stopped target Initrd Root File System. Jan 28 01:19:31.764914 systemd[1]: Reached target Remote Encrypted Volumes. Jan 28 01:19:31.764927 systemd[1]: Reached target Remote File Systems. Jan 28 01:19:31.764941 systemd[1]: Reached target Slice Units. Jan 28 01:19:31.764954 systemd[1]: Reached target Swaps. Jan 28 01:19:31.764970 systemd[1]: Reached target Verify torcx succeeded. Jan 28 01:19:31.764985 systemd[1]: Reached target Local Verity Protected Volumes. Jan 28 01:19:31.765000 systemd[1]: Listening on Process Core Dump Socket. Jan 28 01:19:31.765015 systemd[1]: Listening on initctl Compatibility Named Pipe. Jan 28 01:19:31.765030 systemd[1]: Listening on Network Service Netlink Socket. Jan 28 01:19:31.765044 systemd[1]: Listening on udev Control Socket. Jan 28 01:19:31.765058 systemd[1]: Listening on udev Kernel Socket. Jan 28 01:19:31.765070 systemd[1]: Mounting Huge Pages File System... Jan 28 01:19:31.765086 systemd[1]: Mounting POSIX Message Queue File System... Jan 28 01:19:31.765101 systemd[1]: Mounting External Media Directory... Jan 28 01:19:31.765121 systemd[1]: Condition check resulted in /proc/xen being skipped. Jan 28 01:19:31.765135 systemd[1]: Mounting Kernel Debug File System... Jan 28 01:19:31.765148 systemd[1]: Mounting Kernel Trace File System... Jan 28 01:19:31.765164 systemd[1]: Mounting Temporary Directory /tmp... Jan 28 01:19:31.765180 systemd[1]: Starting Create missing system files... Jan 28 01:19:31.765194 systemd[1]: Starting Create List of Static Device Nodes... Jan 28 01:19:31.765207 systemd[1]: Starting Load Kernel Module configfs... Jan 28 01:19:31.765223 systemd[1]: Starting Load Kernel Module drm... Jan 28 01:19:31.765238 systemd[1]: Starting Load Kernel Module fuse... Jan 28 01:19:31.765256 systemd[1]: Condition check resulted in Create /etc/nsswitch.conf being skipped. Jan 28 01:19:31.765271 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jan 28 01:19:31.765283 systemd[1]: Stopped File System Check on Root Device. Jan 28 01:19:31.765299 kernel: fuse: init (API version 7.32) Jan 28 01:19:31.765312 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jan 28 01:19:31.765327 systemd[1]: Stopped systemd-fsck-usr.service. Jan 28 01:19:31.765343 systemd[1]: Stopped Journal Service. Jan 28 01:19:31.765358 systemd[1]: systemd-journald.service: Consumed 4.410s CPU time. Jan 28 01:19:31.765446 systemd[1]: Starting Journal Service... Jan 28 01:19:31.765590 systemd[1]: Condition check resulted in Load Kernel Modules being skipped. Jan 28 01:19:31.765623 systemd[1]: Starting Remount Root and Kernel File Systems... Jan 28 01:19:31.765639 systemd[1]: Starting Apply Kernel Variables... Jan 28 01:19:31.765655 systemd[1]: Starting Coldplug All udev Devices... Jan 28 01:19:31.765668 systemd[1]: verity-setup.service: Deactivated successfully. Jan 28 01:19:31.765685 systemd[1]: Stopped verity-setup.service. Jan 28 01:19:31.765701 systemd[1]: Condition check resulted in Set fake PV driver version for XenServer being skipped. Jan 28 01:19:31.765713 systemd[1]: Mounted Huge Pages File System. Jan 28 01:19:31.765728 systemd[1]: Mounted POSIX Message Queue File System. Jan 28 01:19:31.765745 systemd[1]: Mounted External Media Directory. Jan 28 01:19:31.765766 systemd[1]: Mounted Kernel Debug File System. Jan 28 01:19:31.765793 systemd-journald[774]: Journal started Jan 28 01:19:31.765845 systemd-journald[774]: Runtime Journal (/run/log/journal/fa1e1d18ced9400a87c9345b0e6351fe) is 6.0M, max 48.7M, 42.6M free. Jan 28 01:19:05.947000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jan 28 01:19:06.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jan 28 01:19:06.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jan 28 01:19:06.632000 audit: BPF prog-id=19 op=LOAD Jan 28 01:19:06.632000 audit: BPF prog-id=19 op=UNLOAD Jan 28 01:19:06.706000 audit: BPF prog-id=20 op=LOAD Jan 28 01:19:06.707000 audit: BPF prog-id=20 op=UNLOAD Jan 28 01:19:07.282000 audit[718]: AVC avc: denied { associate } for pid=718 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jan 28 01:19:30.242000 audit: BPF prog-id=21 op=LOAD Jan 28 01:19:30.261000 audit: BPF prog-id=22 op=LOAD Jan 28 01:19:30.273000 audit: BPF prog-id=23 op=LOAD Jan 28 01:19:30.275000 audit: BPF prog-id=12 op=UNLOAD Jan 28 01:19:30.275000 audit: BPF prog-id=13 op=UNLOAD Jan 28 01:19:30.329000 audit: BPF prog-id=24 op=LOAD Jan 28 01:19:30.329000 audit: BPF prog-id=21 op=UNLOAD Jan 28 01:19:30.341000 audit: BPF prog-id=25 op=LOAD Jan 28 01:19:30.360000 audit: BPF prog-id=26 op=LOAD Jan 28 01:19:30.361000 audit: BPF prog-id=22 op=UNLOAD Jan 28 01:19:30.361000 audit: BPF prog-id=23 op=UNLOAD Jan 28 01:19:30.379000 audit: BPF prog-id=27 op=LOAD Jan 28 01:19:30.381000 audit: BPF prog-id=24 op=UNLOAD Jan 28 01:19:30.388000 audit: BPF prog-id=28 op=LOAD Jan 28 01:19:30.399000 audit: BPF prog-id=29 op=LOAD Jan 28 01:19:30.402000 audit: BPF prog-id=25 op=UNLOAD Jan 28 01:19:30.402000 audit: BPF prog-id=26 op=UNLOAD Jan 28 01:19:30.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:30.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:30.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:30.452000 audit: BPF prog-id=27 op=UNLOAD Jan 28 01:19:31.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:31.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:31.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:31.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:31.558000 audit: BPF prog-id=30 op=LOAD Jan 28 01:19:31.559000 audit: BPF prog-id=31 op=LOAD Jan 28 01:19:31.560000 audit: BPF prog-id=32 op=LOAD Jan 28 01:19:31.560000 audit: BPF prog-id=28 op=UNLOAD Jan 28 01:19:31.560000 audit: BPF prog-id=29 op=UNLOAD Jan 28 01:19:31.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:31.761000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jan 28 01:19:30.235206 systemd[1]: Queued start job for default target Multi-User System. Jan 28 01:19:07.216759 /usr/lib64/systemd/system-generators/torcx-generator[718]: time="2026-01-28T01:19:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3033.2.4 /usr/share/oem/torcx/store /var/lib/torcx/store/3033.2.4 /var/lib/torcx/store]" Jan 28 01:19:30.408443 systemd[1]: systemd-journald.service: Deactivated successfully. Jan 28 01:19:07.220927 /usr/lib64/systemd/system-generators/torcx-generator[718]: time="2026-01-28T01:19:07Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jan 28 01:19:30.410297 systemd[1]: systemd-journald.service: Consumed 4.410s CPU time. Jan 28 01:19:07.220974 /usr/lib64/systemd/system-generators/torcx-generator[718]: time="2026-01-28T01:19:07Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jan 28 01:19:07.270932 /usr/lib64/systemd/system-generators/torcx-generator[718]: time="2026-01-28T01:19:07Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jan 28 01:19:07.271048 /usr/lib64/systemd/system-generators/torcx-generator[718]: time="2026-01-28T01:19:07Z" level=debug msg="skipped missing lower profile" missing profile=oem Jan 28 01:19:07.271667 /usr/lib64/systemd/system-generators/torcx-generator[718]: time="2026-01-28T01:19:07Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jan 28 01:19:07.271690 /usr/lib64/systemd/system-generators/torcx-generator[718]: time="2026-01-28T01:19:07Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jan 28 01:19:07.272262 /usr/lib64/systemd/system-generators/torcx-generator[718]: time="2026-01-28T01:19:07Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jan 28 01:19:07.272807 /usr/lib64/systemd/system-generators/torcx-generator[718]: time="2026-01-28T01:19:07Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jan 28 01:19:07.273063 /usr/lib64/systemd/system-generators/torcx-generator[718]: time="2026-01-28T01:19:07Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jan 28 01:19:07.277435 /usr/lib64/systemd/system-generators/torcx-generator[718]: time="2026-01-28T01:19:07Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jan 28 01:19:07.277704 /usr/lib64/systemd/system-generators/torcx-generator[718]: time="2026-01-28T01:19:07Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jan 28 01:19:07.277731 /usr/lib64/systemd/system-generators/torcx-generator[718]: time="2026-01-28T01:19:07Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3033.2.4: no such file or directory" path=/usr/share/oem/torcx/store/3033.2.4 Jan 28 01:19:07.277749 /usr/lib64/systemd/system-generators/torcx-generator[718]: time="2026-01-28T01:19:07Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jan 28 01:19:07.277771 /usr/lib64/systemd/system-generators/torcx-generator[718]: time="2026-01-28T01:19:07Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3033.2.4: no such file or directory" path=/var/lib/torcx/store/3033.2.4 Jan 28 01:19:07.277788 /usr/lib64/systemd/system-generators/torcx-generator[718]: time="2026-01-28T01:19:07Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jan 28 01:19:29.380431 /usr/lib64/systemd/system-generators/torcx-generator[718]: time="2026-01-28T01:19:29Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jan 28 01:19:29.381125 /usr/lib64/systemd/system-generators/torcx-generator[718]: time="2026-01-28T01:19:29Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jan 28 01:19:29.381872 /usr/lib64/systemd/system-generators/torcx-generator[718]: time="2026-01-28T01:19:29Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jan 28 01:19:29.382279 /usr/lib64/systemd/system-generators/torcx-generator[718]: time="2026-01-28T01:19:29Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jan 28 01:19:29.382362 /usr/lib64/systemd/system-generators/torcx-generator[718]: time="2026-01-28T01:19:29Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jan 28 01:19:29.382700 /usr/lib64/systemd/system-generators/torcx-generator[718]: time="2026-01-28T01:19:29Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jan 28 01:19:31.782569 systemd[1]: Started Journal Service. Jan 28 01:19:31.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:31.787637 systemd[1]: Mounted Kernel Trace File System. Jan 28 01:19:31.794094 systemd[1]: Mounted Temporary Directory /tmp. Jan 28 01:19:31.800807 systemd[1]: Finished Create missing system files. Jan 28 01:19:31.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:31.812281 systemd[1]: Finished Create List of Static Device Nodes. Jan 28 01:19:31.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:31.819174 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jan 28 01:19:31.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:31.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:31.832109 systemd[1]: Finished Load Kernel Module configfs. Jan 28 01:19:31.837819 systemd[1]: modprobe@drm.service: Deactivated successfully. Jan 28 01:19:31.838156 systemd[1]: Finished Load Kernel Module drm. Jan 28 01:19:31.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:31.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:31.844007 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jan 28 01:19:31.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:31.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:31.844333 systemd[1]: Finished Load Kernel Module fuse. Jan 28 01:19:31.856185 systemd[1]: Finished Remount Root and Kernel File Systems. Jan 28 01:19:31.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:31.864610 systemd[1]: Finished Apply Kernel Variables. Jan 28 01:19:31.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:31.899564 systemd[1]: Mounting FUSE Control File System... Jan 28 01:19:31.907656 systemd[1]: Mounting Kernel Configuration File System... Jan 28 01:19:31.913910 systemd[1]: Condition check resulted in Remount Root File System being skipped. Jan 28 01:19:31.921903 systemd[1]: Starting Rebuild Hardware Database... Jan 28 01:19:31.930647 systemd[1]: Starting Flush Journal to Persistent Storage... Jan 28 01:19:31.936571 systemd[1]: Condition check resulted in Platform Persistent Storage Archival being skipped. Jan 28 01:19:31.939128 systemd[1]: Starting Load/Save Random Seed... Jan 28 01:19:31.946070 systemd[1]: Starting Create System Users... Jan 28 01:19:31.963136 systemd-journald[774]: Time spent on flushing to /var/log/journal/fa1e1d18ced9400a87c9345b0e6351fe is 41.508ms for 1019 entries. Jan 28 01:19:31.963136 systemd-journald[774]: System Journal (/var/log/journal/fa1e1d18ced9400a87c9345b0e6351fe) is 8.0M, max 203.0M, 195.0M free. Jan 28 01:19:31.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:32.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:31.987127 systemd[1]: Finished Coldplug All udev Devices. Jan 28 01:19:31.997292 systemd[1]: Mounted FUSE Control File System. Jan 28 01:19:32.004895 systemd[1]: Mounted Kernel Configuration File System. Jan 28 01:19:32.023731 systemd[1]: Finished Load/Save Random Seed. Jan 28 01:19:32.040256 systemd[1]: Reached target First Boot Complete. Jan 28 01:19:32.083288 systemd[1]: Starting Wait for udev To Complete Device Initialization... Jan 28 01:19:32.124351 systemd[1]: Finished Flush Journal to Persistent Storage. Jan 28 01:19:32.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:32.138355 systemd-sysusers[786]: Creating group sgx with gid 999. Jan 28 01:19:32.143187 systemd-sysusers[786]: Creating group systemd-oom with gid 998. Jan 28 01:19:32.145613 systemd-sysusers[786]: Creating user systemd-oom (systemd Userspace OOM Killer) with uid 998 and gid 998. Jan 28 01:19:32.156039 systemd-sysusers[786]: Creating group systemd-timesync with gid 997. Jan 28 01:19:32.158308 systemd-sysusers[786]: Creating user systemd-timesync (systemd Time Synchronization) with uid 997 and gid 997. Jan 28 01:19:32.162957 systemd-sysusers[786]: Creating group systemd-coredump with gid 996. Jan 28 01:19:32.166750 systemd-sysusers[786]: Creating user systemd-coredump (systemd Core Dumper) with uid 996 and gid 996. Jan 28 01:19:32.425958 systemd[1]: Finished Create System Users. Jan 28 01:19:32.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:32.473082 systemd[1]: Starting Create Static Device Nodes in /dev... Jan 28 01:19:32.841435 systemd[1]: Finished Create Static Device Nodes in /dev. Jan 28 01:19:32.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:35.120255 systemd[1]: Finished Rebuild Hardware Database. Jan 28 01:19:35.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:35.193000 audit: BPF prog-id=33 op=LOAD Jan 28 01:19:35.227000 audit: BPF prog-id=34 op=LOAD Jan 28 01:19:35.232000 audit: BPF prog-id=35 op=LOAD Jan 28 01:19:35.232000 audit: BPF prog-id=17 op=UNLOAD Jan 28 01:19:35.233000 audit: BPF prog-id=18 op=UNLOAD Jan 28 01:19:35.236996 systemd[1]: Starting Rule-based Manager for Device Events and Files... Jan 28 01:19:35.575776 systemd[1]: Started Rule-based Manager for Device Events and Files. Jan 28 01:19:35.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:35.594582 kernel: kauditd_printk_skb: 44 callbacks suppressed Jan 28 01:19:35.594692 kernel: audit: type=1130 audit(1769563175.584:148): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:35.637000 audit: BPF prog-id=36 op=LOAD Jan 28 01:19:35.642064 systemd[1]: Starting Network Configuration... Jan 28 01:19:35.677563 kernel: audit: type=1334 audit(1769563175.637:149): prog-id=36 op=LOAD Jan 28 01:19:35.737723 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Jan 28 01:19:35.776653 kernel: ACPI: Power Button [PWRF] Jan 28 01:19:35.790774 systemd-udevd[804]: Using default interface naming scheme 'v249'. Jan 28 01:19:35.889000 audit[809]: AVC avc: denied { confidentiality } for pid=809 comm="systemd-udevd" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jan 28 01:19:35.981767 kernel: audit: type=1400 audit(1769563175.889:150): avc: denied { confidentiality } for pid=809 comm="systemd-udevd" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jan 28 01:19:36.013065 systemd-networkd[806]: lo: Link UP Jan 28 01:19:36.013078 systemd-networkd[806]: lo: Gained carrier Jan 28 01:19:36.013726 systemd-networkd[806]: Enumeration completed Jan 28 01:19:36.013961 systemd[1]: Started Network Configuration. Jan 28 01:19:36.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:36.033040 systemd-networkd[806]: eth0: Link UP Jan 28 01:19:36.066664 kernel: audit: type=1130 audit(1769563176.020:151): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:36.069185 udevadm[789]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jan 28 01:19:36.083843 systemd-networkd[806]: eth0: Gained carrier Jan 28 01:19:36.217932 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Jan 28 01:19:36.218940 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Jan 28 01:19:36.219107 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Jan 28 01:19:36.220806 systemd-networkd[806]: eth0: DHCPv4 address 10.0.0.3/16 via 10.0.0.1 Jan 28 01:19:36.573713 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Jan 28 01:19:36.583000 kernel: kvm: Nested Virtualization enabled Jan 28 01:19:36.583101 kernel: SVM: kvm: Nested Paging enabled Jan 28 01:19:36.583138 kernel: SVM: Virtual VMLOAD VMSAVE supported Jan 28 01:19:36.583670 kernel: mousedev: PS/2 mouse device common for all mice Jan 28 01:19:36.599879 kernel: EDAC MC: Ver: 3.0.0 Jan 28 01:19:36.963693 systemd[1]: Finished Wait for udev To Complete Device Initialization. Jan 28 01:19:36.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:37.017646 kernel: audit: type=1130 audit(1769563176.982:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:37.024838 systemd[1]: Starting Activation of LVM2 logical volumes... Jan 28 01:19:37.383167 lvm[822]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jan 28 01:19:37.415845 systemd-networkd[806]: eth0: Gained IPv6LL Jan 28 01:19:37.459337 systemd[1]: Finished Activation of LVM2 logical volumes. Jan 28 01:19:37.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:37.474686 systemd[1]: Reached target Local Encrypted Volumes. Jan 28 01:19:37.515834 kernel: audit: type=1130 audit(1769563177.473:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:37.520721 systemd[1]: Starting Activation of LVM2 logical volumes... Jan 28 01:19:37.541619 lvm[823]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jan 28 01:19:37.918015 systemd[1]: Finished Activation of LVM2 logical volumes. Jan 28 01:19:37.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:37.927841 systemd[1]: Reached target Preparation for Local File Systems. Jan 28 01:19:37.978759 kernel: audit: type=1130 audit(1769563177.926:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:37.978627 systemd[1]: Condition check resulted in Virtual Machine and Container Storage (Compatibility) being skipped. Jan 28 01:19:37.978839 systemd[1]: Reached target Containers. Jan 28 01:19:38.004667 systemd[1]: Starting File System Check on /dev/disk/by-label/OEM... Jan 28 01:19:38.073111 systemd[1]: Finished File System Check on /dev/disk/by-label/OEM. Jan 28 01:19:38.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:38.128451 kernel: audit: type=1130 audit(1769563178.080:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:38.171113 systemd[1]: Mounting /usr/share/oem... Jan 28 01:19:38.213588 kernel: BTRFS info (device vda6): disk space caching is enabled Jan 28 01:19:38.213724 kernel: BTRFS info (device vda6): has skinny extents Jan 28 01:19:38.276270 systemd[1]: Mounted /usr/share/oem. Jan 28 01:19:38.282748 systemd[1]: Reached target Local File Systems. Jan 28 01:19:38.299909 systemd[1]: Starting Rebuild Dynamic Linker Cache... Jan 28 01:19:38.307988 systemd[1]: Condition check resulted in Set Up Additional Binary Formats being skipped. Jan 28 01:19:38.308824 systemd[1]: Condition check resulted in Store a System Token in an EFI Variable being skipped. Jan 28 01:19:38.313990 systemd[1]: Starting Commit a transient machine-id on disk... Jan 28 01:19:38.329924 systemd[1]: Starting Create Volatile Files and Directories... Jan 28 01:19:38.367282 systemd-tmpfiles[848]: /usr/lib64/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jan 28 01:19:38.370628 systemd-tmpfiles[848]: /usr/lib64/tmpfiles.d/systemd.conf:33: Duplicate line for path "/var/lib/systemd", ignoring. Jan 28 01:19:38.391761 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jan 28 01:19:38.395684 systemd[1]: Finished Commit a transient machine-id on disk. Jan 28 01:19:38.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:38.465016 kernel: audit: type=1130 audit(1769563178.410:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:38.515669 systemd-tmpfiles[848]: Detected autofs mount point /boot during canonicalization of /boot. Jan 28 01:19:38.515742 systemd-tmpfiles[848]: Skipping /boot Jan 28 01:19:38.534151 systemd-tmpfiles[848]: Detected autofs mount point /boot during canonicalization of /boot. Jan 28 01:19:38.534229 systemd-tmpfiles[848]: Skipping /boot Jan 28 01:19:38.648282 systemd[1]: Finished Create Volatile Files and Directories. Jan 28 01:19:38.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:38.703733 kernel: audit: type=1130 audit(1769563178.655:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:38.728114 systemd[1]: Starting Load Security Auditing Rules... Jan 28 01:19:38.765130 systemd[1]: Starting Clean up broken links in /etc/ssl/certs... Jan 28 01:19:38.785450 systemd[1]: Starting Rebuild Journal Catalog... Jan 28 01:19:38.811000 audit: BPF prog-id=37 op=LOAD Jan 28 01:19:38.815367 systemd[1]: Starting Network Name Resolution... Jan 28 01:19:38.827000 audit: BPF prog-id=38 op=LOAD Jan 28 01:19:38.835376 systemd[1]: Starting Network Time Synchronization... Jan 28 01:19:38.858251 systemd[1]: Starting Record System Boot/Shutdown in UTMP... Jan 28 01:19:38.878045 systemd[1]: Finished Clean up broken links in /etc/ssl/certs. Jan 28 01:19:38.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:38.890771 systemd[1]: Finished Rebuild Journal Catalog. Jan 28 01:19:38.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:38.902932 systemd[1]: Condition check resulted in Update CA bundle at /etc/ssl/certs/ca-certificates.crt being skipped. Jan 28 01:19:38.923000 audit[860]: SYSTEM_BOOT pid=860 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib64/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jan 28 01:19:38.948255 systemd[1]: Finished Record System Boot/Shutdown in UTMP. Jan 28 01:19:38.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:39.041000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jan 28 01:19:39.068208 augenrules[869]: No rules Jan 28 01:19:39.064703 systemd[1]: Finished Load Security Auditing Rules. Jan 28 01:19:39.123995 systemd-resolved[858]: Positive Trust Anchors: Jan 28 01:19:39.124061 systemd-resolved[858]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jan 28 01:19:39.124100 systemd-resolved[858]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jan 28 01:19:39.128299 systemd-resolved[858]: Defaulting to hostname 'linux'. Jan 28 01:19:39.131118 systemd[1]: Started Network Time Synchronization. Jan 28 01:19:39.138817 systemd[1]: Started Network Name Resolution. Jan 28 01:19:39.163206 systemd-timesyncd[859]: Initial synchronization to time server 10.0.0.1:123 (10.0.0.1). Jan 28 01:19:39.163311 systemd[1]: Reached target Network. Jan 28 01:19:39.193960 systemd[1]: Reached target Host and Network Name Lookups. Jan 28 01:19:39.213607 systemd[1]: Reached target System Time Set. Jan 28 01:19:40.872035 systemd[1]: Finished Rebuild Dynamic Linker Cache. Jan 28 01:19:40.901159 systemd[1]: Starting Update is Completed... Jan 28 01:19:40.925657 systemd[1]: Finished Update is Completed. Jan 28 01:19:40.935464 systemd[1]: Reached target System Initialization. Jan 28 01:19:40.957000 systemd[1]: Started Watch for update engine configuration changes. Jan 28 01:19:40.965068 systemd[1]: Started Watch for a cloud-config at /var/lib/flatcar-install/user_data. Jan 28 01:19:40.975814 systemd[1]: Started Daily Log Rotation. Jan 28 01:19:41.023763 systemd[1]: Started Weekly check for MD array's redundancy information.. Jan 28 01:19:41.032724 systemd[1]: Started Daily Cleanup of Temporary Directories. Jan 28 01:19:41.045626 systemd[1]: Condition check resulted in Update Engine Stub Timer being skipped. Jan 28 01:19:41.046155 systemd[1]: Reached target Path Units. Jan 28 01:19:41.052247 systemd[1]: Reached target Timer Units. Jan 28 01:19:41.060027 systemd[1]: Listening on D-Bus System Message Bus Socket. Jan 28 01:19:41.077458 systemd[1]: Starting Docker Socket for the API... Jan 28 01:19:41.106834 systemd[1]: Listening on OpenSSH Server Socket. Jan 28 01:19:41.114472 systemd[1]: Listening on Docker Socket for the API. Jan 28 01:19:41.121987 systemd[1]: Reached target Socket Units. Jan 28 01:19:41.129359 systemd[1]: Reached target Basic System. Jan 28 01:19:41.136657 systemd[1]: Condition check resulted in Configure Addon /usr/share/oem being skipped. Jan 28 01:19:41.136760 systemd[1]: Condition check resulted in Run Addon /usr/share/oem being skipped. Jan 28 01:19:41.150322 systemd[1]: Started D-Bus System Message Bus. Jan 28 01:19:41.171171 systemd[1]: Starting Extend Filesystems... Jan 28 01:19:41.177209 systemd[1]: Condition check resulted in Modifies /etc/environment for CoreOS being skipped. Jan 28 01:19:41.180151 systemd[1]: Starting Generate /run/flatcar/motd... Jan 28 01:19:41.196914 systemd[1]: Starting Install an ssh key from /proc/cmdline... Jan 28 01:19:41.208760 systemd[1]: Starting Generate sshd host keys... Jan 28 01:19:41.214132 systemd[1]: Condition check resulted in Load cloud-config from /usr/share/oem/cloud-config.yml being skipped. Jan 28 01:19:41.214374 systemd[1]: Reached target Load system-provided cloud configs. Jan 28 01:19:41.357196 systemd[1]: Starting User Login Management... Jan 28 01:19:41.363564 extend-filesystems[879]: Found sr0 Jan 28 01:19:41.363564 extend-filesystems[879]: Found vda Jan 28 01:19:41.363564 extend-filesystems[879]: Found vda1 Jan 28 01:19:41.363564 extend-filesystems[879]: Found vda2 Jan 28 01:19:41.363564 extend-filesystems[879]: Found vda3 Jan 28 01:19:41.363564 extend-filesystems[879]: Found usr Jan 28 01:19:41.363564 extend-filesystems[879]: Found vda4 Jan 28 01:19:41.363564 extend-filesystems[879]: Found vda6 Jan 28 01:19:41.363564 extend-filesystems[879]: Found vda7 Jan 28 01:19:41.363564 extend-filesystems[879]: Found vda9 Jan 28 01:19:41.363564 extend-filesystems[879]: Checking size of /dev/vda9 Jan 28 01:19:41.363180 systemd[1]: Condition check resulted in TCG Core Services Daemon being skipped. Jan 28 01:19:41.535882 extend-filesystems[879]: Old size kept for /dev/vda9 Jan 28 01:19:41.382297 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jan 28 01:19:41.384659 systemd[1]: Starting Update Engine... Jan 28 01:19:41.389161 systemd[1]: Condition check resulted in Load cloud-config from url defined in /proc/cmdline being skipped. Jan 28 01:19:41.389267 systemd[1]: Reached target Load user-provided cloud configs. Jan 28 01:19:41.409714 systemd[1]: motdgen.service: Deactivated successfully. Jan 28 01:19:41.410040 systemd[1]: Finished Generate /run/flatcar/motd. Jan 28 01:19:41.432868 systemd[1]: extend-filesystems.service: Deactivated successfully. Jan 28 01:19:41.433202 systemd[1]: Finished Extend Filesystems. Jan 28 01:19:41.441319 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jan 28 01:19:41.441740 systemd[1]: Finished Install an ssh key from /proc/cmdline. Jan 28 01:19:41.531016 systemd-logind[892]: Watching system buttons on /dev/input/event1 (Power Button) Jan 28 01:19:41.531081 systemd-logind[892]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jan 28 01:19:41.534802 systemd-logind[892]: New seat seat0. Jan 28 01:19:41.580439 systemd[1]: Started User Login Management. Jan 28 01:19:41.599407 update_engine[899]: I0128 01:19:41.596979 899 main.cc:89] Flatcar Update Engine starting Jan 28 01:19:41.641009 update_engine[899]: I0128 01:19:41.632803 899 update_check_scheduler.cc:74] Next update check in 3m51s Jan 28 01:19:41.632998 systemd[1]: Started Update Engine. Jan 28 01:19:41.652893 systemd[1]: Started Cluster reboot manager. Jan 28 01:19:41.741003 sshd_keygen[896]: ssh-keygen: generating new host keys: RSA DSA ECDSA ED25519 Jan 28 01:19:41.791189 systemd[1]: Finished Generate sshd host keys. Jan 28 01:19:41.826656 systemd[1]: Starting Generate /run/issue... Jan 28 01:19:41.842843 locksmithd[921]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jan 28 01:19:41.843095 systemd[1]: issuegen.service: Deactivated successfully. Jan 28 01:19:41.843450 systemd[1]: Finished Generate /run/issue. Jan 28 01:19:41.859205 systemd[1]: Starting Permit User Sessions... Jan 28 01:19:41.897314 systemd[1]: Finished Permit User Sessions. Jan 28 01:19:41.949590 systemd[1]: Started Getty on tty1. Jan 28 01:19:41.967273 systemd[1]: Started Serial Getty on ttyS0. Jan 28 01:19:41.985840 systemd[1]: Reached target Login Prompts. Jan 28 01:19:41.992589 systemd[1]: Reached target Multi-User System. Jan 28 01:19:42.052421 systemd[1]: Starting Record Runlevel Change in UTMP... Jan 28 01:19:42.080330 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jan 28 01:19:42.082826 systemd[1]: Finished Record Runlevel Change in UTMP. Jan 28 01:19:42.090667 systemd[1]: Startup finished in 10.789s (kernel) + 22.483s (initrd) + 37.173s (userspace) = 1min 10.445s. Jan 28 01:19:47.058390 systemd[1]: Created slice Slice /system/sshd. Jan 28 01:19:47.060906 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:43496). Jan 28 01:19:47.239348 sshd[942]: Accepted publickey for core from 10.0.0.1 port 43496 ssh2: RSA SHA256:de5Uq9ItybAxHjxgVpnGcUaov5DABaXpvPFU87JlgB8 Jan 28 01:19:47.249461 sshd[942]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 28 01:19:47.297763 systemd[1]: Created slice User Slice of UID 500. Jan 28 01:19:47.301077 systemd[1]: Starting User Runtime Directory /run/user/500... Jan 28 01:19:47.306132 systemd-logind[892]: New session 1 of user core. Jan 28 01:19:47.333003 systemd[1]: Finished User Runtime Directory /run/user/500. Jan 28 01:19:47.345727 systemd[1]: Starting User Manager for UID 500... Jan 28 01:19:47.355986 systemd[945]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jan 28 01:19:47.497705 systemd[945]: Queued start job for default target Main User Target. Jan 28 01:19:47.498234 systemd[945]: Reached target Paths. Jan 28 01:19:47.498260 systemd[945]: Reached target Sockets. Jan 28 01:19:47.498278 systemd[945]: Reached target Timers. Jan 28 01:19:47.498293 systemd[945]: Reached target Basic System. Jan 28 01:19:47.499329 systemd[945]: Reached target Main User Target. Jan 28 01:19:47.499428 systemd[945]: Startup finished in 128ms. Jan 28 01:19:47.499897 systemd[1]: Started User Manager for UID 500. Jan 28 01:19:47.509721 systemd[1]: Started Session 1 of User core. Jan 28 01:19:47.615162 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:43498). Jan 28 01:19:47.694719 sshd[954]: Accepted publickey for core from 10.0.0.1 port 43498 ssh2: RSA SHA256:de5Uq9ItybAxHjxgVpnGcUaov5DABaXpvPFU87JlgB8 Jan 28 01:19:47.706013 sshd[954]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 28 01:19:47.750453 systemd-logind[892]: New session 2 of user core. Jan 28 01:19:47.759206 systemd[1]: Started Session 2 of User core. Jan 28 01:19:47.912071 sshd[954]: pam_unix(sshd:session): session closed for user core Jan 28 01:19:47.942210 systemd[1]: sshd@1-10.0.0.3:22-10.0.0.1:43498.service: Deactivated successfully. Jan 28 01:19:47.944886 systemd[1]: session-2.scope: Deactivated successfully. Jan 28 01:19:47.947929 systemd-logind[892]: Session 2 logged out. Waiting for processes to exit. Jan 28 01:19:47.949747 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:43506). Jan 28 01:19:47.954183 systemd-logind[892]: Removed session 2. Jan 28 01:19:48.033258 sshd[960]: Accepted publickey for core from 10.0.0.1 port 43506 ssh2: RSA SHA256:de5Uq9ItybAxHjxgVpnGcUaov5DABaXpvPFU87JlgB8 Jan 28 01:19:48.047951 sshd[960]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 28 01:19:48.063943 systemd-logind[892]: New session 3 of user core. Jan 28 01:19:48.072915 systemd[1]: Started Session 3 of User core. Jan 28 01:19:48.164058 sshd[960]: pam_unix(sshd:session): session closed for user core Jan 28 01:19:48.179371 systemd[1]: sshd@2-10.0.0.3:22-10.0.0.1:43506.service: Deactivated successfully. Jan 28 01:19:48.181127 systemd[1]: session-3.scope: Deactivated successfully. Jan 28 01:19:48.183050 systemd-logind[892]: Session 3 logged out. Waiting for processes to exit. Jan 28 01:19:48.197462 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:43508). Jan 28 01:19:48.203447 systemd-logind[892]: Removed session 3. Jan 28 01:19:48.268010 sshd[966]: Accepted publickey for core from 10.0.0.1 port 43508 ssh2: RSA SHA256:de5Uq9ItybAxHjxgVpnGcUaov5DABaXpvPFU87JlgB8 Jan 28 01:19:48.270097 sshd[966]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 28 01:19:48.282662 systemd-logind[892]: New session 4 of user core. Jan 28 01:19:48.292996 systemd[1]: Started Session 4 of User core. Jan 28 01:19:48.427223 sshd[966]: pam_unix(sshd:session): session closed for user core Jan 28 01:19:48.448879 systemd[1]: sshd@3-10.0.0.3:22-10.0.0.1:43508.service: Deactivated successfully. Jan 28 01:19:48.450614 systemd[1]: session-4.scope: Deactivated successfully. Jan 28 01:19:48.453300 systemd-logind[892]: Session 4 logged out. Waiting for processes to exit. Jan 28 01:19:48.461945 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:43520). Jan 28 01:19:48.463974 systemd-logind[892]: Removed session 4. Jan 28 01:19:48.522564 sshd[972]: Accepted publickey for core from 10.0.0.1 port 43520 ssh2: RSA SHA256:de5Uq9ItybAxHjxgVpnGcUaov5DABaXpvPFU87JlgB8 Jan 28 01:19:48.526201 sshd[972]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 28 01:19:48.538325 systemd-logind[892]: New session 5 of user core. Jan 28 01:19:48.551946 systemd[1]: Started Session 5 of User core. Jan 28 01:19:48.699406 sudo[976]: core : PWD=/home/core ; USER=root ; COMMAND=/sbin/setenforce 1 Jan 28 01:19:48.699881 sudo[976]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 28 01:19:48.723420 sudo[976]: pam_unix(sudo:session): session closed for user root Jan 28 01:19:48.732816 sshd[972]: pam_unix(sshd:session): session closed for user core Jan 28 01:19:48.756457 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:43526). Jan 28 01:19:48.765693 dbus-daemon[878]: [system] Reloaded configuration Jan 28 01:19:48.772204 systemd[1]: sshd@4-10.0.0.3:22-10.0.0.1:43520.service: Deactivated successfully. Jan 28 01:19:48.773362 systemd[1]: session-5.scope: Deactivated successfully. Jan 28 01:19:48.777721 systemd-logind[892]: Session 5 logged out. Waiting for processes to exit. Jan 28 01:19:48.782338 systemd-logind[892]: Removed session 5. Jan 28 01:19:48.809678 sshd[979]: Accepted publickey for core from 10.0.0.1 port 43526 ssh2: RSA SHA256:de5Uq9ItybAxHjxgVpnGcUaov5DABaXpvPFU87JlgB8 Jan 28 01:19:48.812671 sshd[979]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 28 01:19:48.821171 systemd-logind[892]: New session 6 of user core. Jan 28 01:19:48.830880 systemd[1]: Started Session 6 of User core. Jan 28 01:19:48.913875 sudo[984]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jan 28 01:19:48.914219 sudo[984]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 28 01:19:48.928803 sudo[984]: pam_unix(sudo:session): session closed for user root Jan 28 01:19:48.945292 sudo[983]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/systemctl restart audit-rules Jan 28 01:19:48.946823 sudo[983]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jan 28 01:19:48.973674 systemd[1]: Stopping Load Security Auditing Rules... Jan 28 01:19:48.980000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jan 28 01:19:48.984847 auditctl[987]: No rules Jan 28 01:19:48.985428 systemd[1]: audit-rules.service: Deactivated successfully. Jan 28 01:19:48.985860 systemd[1]: Stopped Load Security Auditing Rules. Jan 28 01:19:48.987845 systemd[1]: Starting Load Security Auditing Rules... Jan 28 01:19:48.989620 kernel: kauditd_printk_skb: 7 callbacks suppressed Jan 28 01:19:48.989677 kernel: audit: type=1305 audit(1769563188.980:165): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jan 28 01:19:48.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:49.030604 kernel: audit: type=1131 audit(1769563188.983:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:49.074951 augenrules[1004]: No rules Jan 28 01:19:49.076115 systemd[1]: Finished Load Security Auditing Rules. Jan 28 01:19:49.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:49.078002 sudo[983]: pam_unix(sudo:session): session closed for user root Jan 28 01:19:49.101713 kernel: audit: type=1130 audit(1769563189.075:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:49.101900 kernel: audit: type=1106 audit(1769563189.076:168): pid=983 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 28 01:19:49.076000 audit[983]: USER_END pid=983 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 28 01:19:49.102281 sshd[979]: pam_unix(sshd:session): session closed for user core Jan 28 01:19:49.107901 systemd[1]: sshd@5-10.0.0.3:22-10.0.0.1:43526.service: Deactivated successfully. Jan 28 01:19:49.109271 systemd[1]: session-6.scope: Deactivated successfully. Jan 28 01:19:49.111332 systemd-logind[892]: Session 6 logged out. Waiting for processes to exit. Jan 28 01:19:49.113584 systemd-logind[892]: Removed session 6. Jan 28 01:19:49.131385 kernel: audit: type=1104 audit(1769563189.076:169): pid=983 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 28 01:19:49.076000 audit[983]: CRED_DISP pid=983 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 28 01:19:49.103000 audit[979]: USER_END pid=979 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:19:49.186632 kernel: audit: type=1106 audit(1769563189.103:170): pid=979 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:19:49.186771 kernel: audit: type=1104 audit(1769563189.104:171): pid=979 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:19:49.104000 audit[979]: CRED_DISP pid=979 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:19:49.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.3:22-10.0.0.1:43526 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:49.235878 kernel: audit: type=1131 audit(1769563189.108:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.3:22-10.0.0.1:43526 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:49.262869 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:43528). Jan 28 01:19:49.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.3:22-10.0.0.1:43528 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:49.289806 kernel: audit: type=1130 audit(1769563189.261:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.3:22-10.0.0.1:43528 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:19:49.323000 audit[1010]: USER_ACCT pid=1010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:19:49.324738 sshd[1010]: Accepted publickey for core from 10.0.0.1 port 43528 ssh2: RSA SHA256:de5Uq9ItybAxHjxgVpnGcUaov5DABaXpvPFU87JlgB8 Jan 28 01:19:49.359433 sshd[1010]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 28 01:19:49.357000 audit[1010]: CRED_ACQ pid=1010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:19:49.366694 kernel: audit: type=1101 audit(1769563189.323:174): pid=1010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:19:49.371087 systemd-logind[892]: New session 7 of user core. Jan 28 01:19:49.375994 systemd[1]: Started Session 7 of User core. Jan 28 01:19:49.400000 audit[1010]: USER_START pid=1010 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:19:49.402000 audit[1012]: CRED_ACQ pid=1012 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:19:49.468000 audit[1013]: USER_ACCT pid=1013 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 28 01:19:49.468000 audit[1013]: CRED_REFR pid=1013 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jan 28 01:19:49.469716 sudo[1013]: core : PWD=/home/core ; USER=root ; COMMAND=/bin/bash -c cat >/etc/coreos/update.conf.new </etc/coreos/update-payload-key.pub.pem </etc/coreos/update.conf.new </etc/coreos/update-payload-key.pub.pem < Jan 28 01:20:00.739904 update_engine[1268]: Jan 28 01:20:00.739904 update_engine[1268]: Jan 28 01:20:00.739904 update_engine[1268]: Jan 28 01:20:00.739904 update_engine[1268]: Jan 28 01:20:00.739904 update_engine[1268]: Jan 28 01:20:00.739904 update_engine[1268]: Jan 28 01:20:00.739904 update_engine[1268]: Jan 28 01:20:00.739904 update_engine[1268]: Jan 28 01:20:00.739904 update_engine[1268]: I0128 01:20:00.739903 1268 libcurl_http_fetcher.cc:48] Starting/Resuming transfer Jan 28 01:20:00.748754 update_engine[1268]: I0128 01:20:00.748420 1268 libcurl_http_fetcher.cc:152] Setting up curl options for HTTP Jan 28 01:20:00.749101 update_engine[1268]: I0128 01:20:00.748986 1268 libcurl_http_fetcher.cc:435] Setting up timeout source: 1 seconds. Jan 28 01:20:00.770000 audit[1280]: USER_ACCT pid=1280 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:00.772549 sshd[1280]: Accepted publickey for core from 10.0.0.1 port 37770 ssh2: RSA SHA256:de5Uq9ItybAxHjxgVpnGcUaov5DABaXpvPFU87JlgB8 Jan 28 01:20:00.780643 update_engine[1268]: I0128 01:20:00.779851 1268 libcurl_http_fetcher.cc:248] HTTP response code: 200 Jan 28 01:20:00.780643 update_engine[1268]: I0128 01:20:00.780026 1268 libcurl_http_fetcher.cc:305] Transfer completed (200), 791 bytes downloaded Jan 28 01:20:00.780643 update_engine[1268]: I0128 01:20:00.780040 1268 omaha_request_action.cc:619] Omaha request response: Jan 28 01:20:00.780643 update_engine[1268]: Jan 28 01:20:00.780643 update_engine[1268]: Jan 28 01:20:00.780643 update_engine[1268]: Jan 28 01:20:00.780643 update_engine[1268]: Jan 28 01:20:00.780643 update_engine[1268]: Jan 28 01:20:00.780643 update_engine[1268]: Jan 28 01:20:00.780643 update_engine[1268]: Jan 28 01:20:00.780643 update_engine[1268]: Jan 28 01:20:00.780643 update_engine[1268]: Jan 28 01:20:00.780643 update_engine[1268]: Jan 28 01:20:00.780643 update_engine[1268]: Jan 28 01:20:00.780643 update_engine[1268]: Jan 28 01:20:00.780643 update_engine[1268]: Jan 28 01:20:00.780643 update_engine[1268]: Jan 28 01:20:00.780643 update_engine[1268]: Jan 28 01:20:00.780643 update_engine[1268]: Jan 28 01:20:00.780643 update_engine[1268]: Jan 28 01:20:00.780643 update_engine[1268]: Jan 28 01:20:00.780643 update_engine[1268]: Jan 28 01:20:00.780643 update_engine[1268]: Jan 28 01:20:00.788000 audit[1280]: CRED_ACQ pid=1280 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:00.791455 sshd[1280]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 28 01:20:00.795713 update_engine[1268]: I0128 01:20:00.795648 1268 omaha_request_action.cc:447] Omaha Response manifest version = Jan 28 01:20:00.795787 update_engine[1268]: I0128 01:20:00.795723 1268 omaha_request_action.cc:470] Found 1 url(s) Jan 28 01:20:00.795787 update_engine[1268]: I0128 01:20:00.795742 1268 omaha_request_action.cc:506] Processing first of 1 package(s) Jan 28 01:20:00.795787 update_engine[1268]: I0128 01:20:00.795746 1268 omaha_request_action.cc:513] Omaha Response package name = update.gz Jan 28 01:20:00.795787 update_engine[1268]: I0128 01:20:00.795751 1268 omaha_request_action.cc:529] Url0: http://10.0.0.2:34567/packages/update.gz Jan 28 01:20:00.795787 update_engine[1268]: I0128 01:20:00.795761 1268 omaha_request_action.cc:541] Payload size = 450515410 bytes Jan 28 01:20:00.795787 update_engine[1268]: I0128 01:20:00.795778 1268 omaha_request_action.cc:565] Found 1 action(s). Processing the postinstall action. Jan 28 01:20:00.795940 update_engine[1268]: I0128 01:20:00.795795 1268 payload_state.cc:51] Resetting all persisted state as this is a new response Jan 28 01:20:00.795940 update_engine[1268]: I0128 01:20:00.795802 1268 payload_state.cc:360] Current Response Signature = Jan 28 01:20:00.795940 update_engine[1268]: NumURLs = 1 Jan 28 01:20:00.795940 update_engine[1268]: Url0 = http://10.0.0.2:34567/packages/update.gz Jan 28 01:20:00.795940 update_engine[1268]: Payload Size = 450515410 Jan 28 01:20:00.795940 update_engine[1268]: Payload Sha256 Hash = IZawuJPGhl+i9cLvCF00GfqGXd2ULJMn8NTh9aFkKuE= Jan 28 01:20:00.795940 update_engine[1268]: Is Delta Payload = 0 Jan 28 01:20:00.795940 update_engine[1268]: Max Failure Count Per Url = 10 Jan 28 01:20:00.795940 update_engine[1268]: Disable Payload Backoff = 1 Jan 28 01:20:00.795940 update_engine[1268]: I0128 01:20:00.795930 1268 payload_state.cc:381] Payload Attempt Number = 0 Jan 28 01:20:00.796165 update_engine[1268]: I0128 01:20:00.795991 1268 payload_state.cc:404] Current URL Index = 0 Jan 28 01:20:00.796165 update_engine[1268]: I0128 01:20:00.796044 1268 payload_state.cc:425] Current URL (Url0)'s Failure Count = 0 Jan 28 01:20:00.796165 update_engine[1268]: I0128 01:20:00.796093 1268 payload_state.cc:287] Resetting backoff expiry time as payload backoff is disabled Jan 28 01:20:00.796165 update_engine[1268]: I0128 01:20:00.796100 1268 payload_state.cc:452] Backoff Expiry Time = 01/01/70 00:00:00 UTC Jan 28 01:20:00.796165 update_engine[1268]: I0128 01:20:00.796154 1268 payload_state.cc:203] Payload backoff logic is disabled. Can proceed with the download Jan 28 01:20:00.796369 update_engine[1268]: I0128 01:20:00.796173 1268 action_processor.cc:82] ActionProcessor::ActionComplete: finished OmahaRequestAction, starting OmahaResponseHandlerAction Jan 28 01:20:00.796369 update_engine[1268]: I0128 01:20:00.796181 1268 omaha_response_handler_action.cc:43] Using Url0 as the download url this time Jan 28 01:20:00.796369 update_engine[1268]: I0128 01:20:00.796203 1268 prefs.cc:51] update-state-next-operation not present in /var/lib/update_engine/prefs Jan 28 01:20:00.796369 update_engine[1268]: E0128 01:20:00.796207 1268 payload_processor.cc:488] prefs->GetInt64(kPrefsUpdateStateNextOperation, &next_operation) && next_operation != kUpdateStateOperationInvalid && next_operation > 0 failed. Jan 28 01:20:00.798151 update_engine[1268]: I0128 01:20:00.798079 1268 omaha_response_handler_action.cc:85] Using this install plan: Jan 28 01:20:00.798151 update_engine[1268]: I0128 01:20:00.798143 1268 install_plan.cc:53] InstallPlan: , new_update, url: http://10.0.0.2:34567/packages/update.gz, payload size: 450515410, payload hash: IZawuJPGhl+i9cLvCF00GfqGXd2ULJMn8NTh9aFkKuE=, partition_path: /dev/vda4, kernel_path: /boot/flatcar/vmlinuz-b, pcr_policy_path: /var/lib/update_engine/pcrs-b.zip, old_partition_path: /dev/vda3, old_kernel_path: /boot/flatcar/vmlinuz-a Jan 28 01:20:00.798445 update_engine[1268]: I0128 01:20:00.798262 1268 action_processor.cc:82] ActionProcessor::ActionComplete: finished OmahaResponseHandlerAction, starting FilesystemCopierAction Jan 28 01:20:00.810223 update_engine[1268]: I0128 01:20:00.809895 1268 filesystem_copier_action.cc:296] Filesystem size: 1073741824 Jan 28 01:20:00.816796 systemd-logind[892]: New session 25 of user core. Jan 28 01:20:00.818778 systemd[1]: Started Session 25 of User core. Jan 28 01:20:00.922000 audit[1280]: USER_START pid=1280 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:00.925000 audit[1296]: CRED_ACQ pid=1296 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:01.000696 sshd[1280]: pam_unix(sshd:session): session closed for user core Jan 28 01:20:01.006000 audit[1280]: USER_END pid=1280 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:01.007000 audit[1280]: CRED_DISP pid=1280 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:01.009691 systemd[1]: sshd@24-10.0.0.3:22-10.0.0.1:37770.service: Deactivated successfully. Jan 28 01:20:01.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.3:22-10.0.0.1:37770 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:20:01.010915 systemd[1]: session-25.scope: Deactivated successfully. Jan 28 01:20:01.015681 systemd-logind[892]: Session 25 logged out. Waiting for processes to exit. Jan 28 01:20:01.019314 systemd-logind[892]: Removed session 25. Jan 28 01:20:13.148764 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:49170). Jan 28 01:20:13.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.3:22-10.0.0.1:49170 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:20:13.168017 kernel: kauditd_printk_skb: 253 callbacks suppressed Jan 28 01:20:13.196904 kernel: audit: type=1130 audit(1769563213.150:706): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.3:22-10.0.0.1:49170 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:20:13.400000 audit[1304]: USER_ACCT pid=1304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:13.407175 sshd[1304]: Accepted publickey for core from 10.0.0.1 port 49170 ssh2: RSA SHA256:de5Uq9ItybAxHjxgVpnGcUaov5DABaXpvPFU87JlgB8 Jan 28 01:20:13.409789 sshd[1304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 28 01:20:13.480889 kernel: audit: type=1101 audit(1769563213.400:707): pid=1304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:13.482913 kernel: audit: type=1103 audit(1769563213.407:708): pid=1304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:13.407000 audit[1304]: CRED_ACQ pid=1304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:13.555306 systemd-logind[892]: New session 26 of user core. Jan 28 01:20:13.697372 kernel: audit: type=1006 audit(1769563213.407:709): pid=1304 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Jan 28 01:20:13.685447 systemd[1]: Started Session 26 of User core. Jan 28 01:20:13.803000 audit[1304]: USER_START pid=1304 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:13.880678 kernel: audit: type=1105 audit(1769563213.803:710): pid=1304 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:13.880896 kernel: audit: type=1103 audit(1769563213.815:711): pid=1309 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:13.815000 audit[1309]: CRED_ACQ pid=1309 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:13.997184 sshd[1304]: pam_unix(sshd:session): session closed for user core Jan 28 01:20:14.001000 audit[1304]: USER_END pid=1304 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:14.005766 systemd[1]: sshd@25-10.0.0.3:22-10.0.0.1:49170.service: Deactivated successfully. Jan 28 01:20:14.007050 systemd[1]: session-26.scope: Deactivated successfully. Jan 28 01:20:14.008335 systemd-logind[892]: Session 26 logged out. Waiting for processes to exit. Jan 28 01:20:14.013390 systemd-logind[892]: Removed session 26. Jan 28 01:20:14.001000 audit[1304]: CRED_DISP pid=1304 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:14.101150 kernel: audit: type=1106 audit(1769563214.001:712): pid=1304 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:14.101207 kernel: audit: type=1104 audit(1769563214.001:713): pid=1304 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:14.153301 kernel: audit: type=1131 audit(1769563214.001:714): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.3:22-10.0.0.1:49170 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:20:14.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.3:22-10.0.0.1:49170 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:20:24.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.3:22-10.0.0.1:33352 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:20:24.059806 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:33352). Jan 28 01:20:24.095587 kernel: audit: type=1130 audit(1769563224.059:715): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.3:22-10.0.0.1:33352 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:20:24.166000 audit[1314]: USER_ACCT pid=1314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:24.168108 sshd[1314]: Accepted publickey for core from 10.0.0.1 port 33352 ssh2: RSA SHA256:de5Uq9ItybAxHjxgVpnGcUaov5DABaXpvPFU87JlgB8 Jan 28 01:20:24.171865 sshd[1314]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 28 01:20:24.170000 audit[1314]: CRED_ACQ pid=1314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:24.225937 systemd-logind[892]: New session 27 of user core. Jan 28 01:20:24.322226 kernel: audit: type=1101 audit(1769563224.166:716): pid=1314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:24.322718 kernel: audit: type=1103 audit(1769563224.170:717): pid=1314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:24.322764 kernel: audit: type=1006 audit(1769563224.170:718): pid=1314 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Jan 28 01:20:24.307882 systemd[1]: Started Session 27 of User core. Jan 28 01:20:24.486000 audit[1314]: USER_START pid=1314 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:24.499000 audit[1316]: CRED_ACQ pid=1316 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:24.639092 kernel: audit: type=1105 audit(1769563224.486:719): pid=1314 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:24.745804 kernel: audit: type=1103 audit(1769563224.499:720): pid=1316 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:25.819665 sshd[1314]: pam_unix(sshd:session): session closed for user core Jan 28 01:20:25.824000 audit[1314]: USER_END pid=1314 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:25.830441 systemd[1]: sshd@26-10.0.0.3:22-10.0.0.1:33352.service: Deactivated successfully. Jan 28 01:20:25.834282 systemd[1]: session-27.scope: Deactivated successfully. Jan 28 01:20:25.834752 systemd[1]: session-27.scope: Consumed 1.145s CPU time. Jan 28 01:20:25.841779 systemd-logind[892]: Session 27 logged out. Waiting for processes to exit. Jan 28 01:20:25.844698 systemd-logind[892]: Removed session 27. Jan 28 01:20:25.825000 audit[1314]: CRED_DISP pid=1314 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:25.927610 kernel: audit: type=1106 audit(1769563225.824:721): pid=1314 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:25.927721 kernel: audit: type=1104 audit(1769563225.825:722): pid=1314 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:25.927741 kernel: audit: type=1131 audit(1769563225.825:723): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.3:22-10.0.0.1:33352 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:20:25.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.3:22-10.0.0.1:33352 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:20:35.901684 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:59794). Jan 28 01:20:35.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.3:22-10.0.0.1:59794 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:20:35.958828 kernel: audit: type=1130 audit(1769563235.906:724): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.3:22-10.0.0.1:59794 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:20:35.999000 audit[1323]: USER_ACCT pid=1323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:36.002431 sshd[1323]: Accepted publickey for core from 10.0.0.1 port 59794 ssh2: RSA SHA256:de5Uq9ItybAxHjxgVpnGcUaov5DABaXpvPFU87JlgB8 Jan 28 01:20:36.048646 sshd[1323]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 28 01:20:36.043000 audit[1323]: CRED_ACQ pid=1323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:36.063382 kernel: audit: type=1101 audit(1769563235.999:725): pid=1323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:36.063982 kernel: audit: type=1103 audit(1769563236.043:726): pid=1323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:36.072611 systemd-logind[892]: New session 28 of user core. Jan 28 01:20:36.157754 kernel: audit: type=1006 audit(1769563236.047:727): pid=1323 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Jan 28 01:20:36.157211 systemd[1]: Started Session 28 of User core. Jan 28 01:20:36.209000 audit[1323]: USER_START pid=1323 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:36.213000 audit[1325]: CRED_ACQ pid=1325 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:36.301358 sshd[1323]: pam_unix(sshd:session): session closed for user core Jan 28 01:20:36.305419 systemd[1]: sshd@27-10.0.0.3:22-10.0.0.1:59794.service: Deactivated successfully. Jan 28 01:20:36.307040 systemd[1]: session-28.scope: Deactivated successfully. Jan 28 01:20:36.309093 systemd-logind[892]: Session 28 logged out. Waiting for processes to exit. Jan 28 01:20:36.311316 systemd-logind[892]: Removed session 28. Jan 28 01:20:36.329706 kernel: audit: type=1105 audit(1769563236.209:728): pid=1323 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:36.336275 kernel: audit: type=1103 audit(1769563236.213:729): pid=1325 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:36.336336 kernel: audit: type=1106 audit(1769563236.302:730): pid=1323 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:36.302000 audit[1323]: USER_END pid=1323 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:36.302000 audit[1323]: CRED_DISP pid=1323 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:36.426300 kernel: audit: type=1104 audit(1769563236.302:731): pid=1323 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:36.426698 kernel: audit: type=1131 audit(1769563236.304:732): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.3:22-10.0.0.1:59794 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:20:36.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.3:22-10.0.0.1:59794 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:20:45.651784 update_engine[1268]: I0128 01:20:45.650887 1268 update_attempter.cc:495] Already updated boot flags. Skipping. Jan 28 01:20:46.368134 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:48934). Jan 28 01:20:46.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.3:22-10.0.0.1:48934 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:20:46.423948 kernel: audit: type=1130 audit(1769563246.366:733): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.3:22-10.0.0.1:48934 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:20:46.629000 audit[1331]: USER_ACCT pid=1331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:46.633963 sshd[1331]: Accepted publickey for core from 10.0.0.1 port 48934 ssh2: RSA SHA256:de5Uq9ItybAxHjxgVpnGcUaov5DABaXpvPFU87JlgB8 Jan 28 01:20:46.685406 sshd[1331]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 28 01:20:46.692738 kernel: audit: type=1101 audit(1769563246.629:734): pid=1331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:46.692819 kernel: audit: type=1103 audit(1769563246.682:735): pid=1331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:46.682000 audit[1331]: CRED_ACQ pid=1331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:46.700650 systemd-logind[892]: New session 29 of user core. Jan 28 01:20:46.769413 kernel: audit: type=1006 audit(1769563246.682:736): pid=1331 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Jan 28 01:20:46.769331 systemd[1]: Started Session 29 of User core. Jan 28 01:20:46.856000 audit[1331]: USER_START pid=1331 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:47.003912 kernel: audit: type=1105 audit(1769563246.856:737): pid=1331 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:47.021252 kernel: audit: type=1103 audit(1769563246.863:738): pid=1333 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:46.863000 audit[1333]: CRED_ACQ pid=1333 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:47.085961 sshd[1331]: pam_unix(sshd:session): session closed for user core Jan 28 01:20:47.086000 audit[1331]: USER_END pid=1331 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:47.090199 systemd[1]: sshd@28-10.0.0.3:22-10.0.0.1:48934.service: Deactivated successfully. Jan 28 01:20:47.094701 systemd[1]: session-29.scope: Deactivated successfully. Jan 28 01:20:47.095947 systemd-logind[892]: Session 29 logged out. Waiting for processes to exit. Jan 28 01:20:47.098366 systemd-logind[892]: Removed session 29. Jan 28 01:20:47.157803 kernel: audit: type=1106 audit(1769563247.086:739): pid=1331 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:47.157925 kernel: audit: type=1104 audit(1769563247.086:740): pid=1331 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:47.086000 audit[1331]: CRED_DISP pid=1331 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:47.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.3:22-10.0.0.1:48934 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:20:47.260829 kernel: audit: type=1131 audit(1769563247.088:741): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.3:22-10.0.0.1:48934 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:20:57.236723 systemd[1]: Started OpenSSH per-connection server daemon (10.0.0.1:48654). Jan 28 01:20:57.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.3:22-10.0.0.1:48654 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:20:57.362403 kernel: audit: type=1130 audit(1769563257.236:742): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.3:22-10.0.0.1:48654 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:20:57.780000 audit[1339]: USER_ACCT pid=1339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:57.936626 kernel: audit: type=1101 audit(1769563257.780:743): pid=1339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:57.936695 kernel: audit: type=1103 audit(1769563257.826:744): pid=1339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:57.826000 audit[1339]: CRED_ACQ pid=1339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:57.936830 sshd[1339]: Accepted publickey for core from 10.0.0.1 port 48654 ssh2: RSA SHA256:de5Uq9ItybAxHjxgVpnGcUaov5DABaXpvPFU87JlgB8 Jan 28 01:20:58.081069 kernel: audit: type=1006 audit(1769563257.826:745): pid=1339 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 Jan 28 01:20:57.829300 sshd[1339]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jan 28 01:20:57.905271 systemd-logind[892]: New session 30 of user core. Jan 28 01:20:58.079375 systemd[1]: Started Session 30 of User core. Jan 28 01:20:58.143000 audit[1339]: USER_START pid=1339 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:58.161000 audit[1341]: CRED_ACQ pid=1341 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:58.457382 kernel: audit: type=1105 audit(1769563258.143:746): pid=1339 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:58.469219 kernel: audit: type=1103 audit(1769563258.161:747): pid=1341 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:58.804297 sshd[1339]: pam_unix(sshd:session): session closed for user core Jan 28 01:20:58.869000 audit[1339]: USER_END pid=1339 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:58.874751 systemd[1]: sshd@29-10.0.0.3:22-10.0.0.1:48654.service: Deactivated successfully. Jan 28 01:20:58.877040 systemd[1]: session-30.scope: Deactivated successfully. Jan 28 01:20:58.879068 systemd-logind[892]: Session 30 logged out. Waiting for processes to exit. Jan 28 01:20:58.887822 systemd-logind[892]: Removed session 30. Jan 28 01:20:58.870000 audit[1339]: CRED_DISP pid=1339 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:59.058098 kernel: audit: type=1106 audit(1769563258.869:748): pid=1339 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:59.120797 kernel: audit: type=1104 audit(1769563258.870:749): pid=1339 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jan 28 01:20:59.121116 kernel: audit: type=1131 audit(1769563258.874:750): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.3:22-10.0.0.1:48654 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:20:58.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.3:22-10.0.0.1:48654 comm="systemd" exe="/usr/lib64/systemd/systemd" hostname=? addr=? terminal=? res=success' Jan 28 01:21:04.388973 update_engine[1268]: I0128 01:21:04.384824 1268 filesystem_copier_action.cc:274] Hash: W2tlmDO1e7ue6lfdobBruQSsP93+fWBhNnXM6T/sIeY= Jan 28 01:21:04.388973 update_engine[1268]: I0128 01:21:04.385869 1268 action_processor.cc:82] ActionProcessor::ActionComplete: finished FilesystemCopierAction, starting KernelCopierAction Jan 28 01:21:05.217083 update_engine[1268]: E0128 01:21:05.215209 1268 kernel_copier_action.cc:60] Failed to copy kernel from /boot/flatcar/vmlinuz-a to /boot/flatcar/vmlinuz-b Jan 28 01:21:05.217083 update_engine[1268]: I0128 01:21:05.216445 1268 action_processor.cc:68] ActionProcessor::ActionComplete: KernelCopierAction action failed. Aborting processing. Jan 28 01:21:05.217083 update_engine[1268]: I0128 01:21:05.216655 1268 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type KernelCopierAction Jan 28 01:21:05.217083 update_engine[1268]: I0128 01:21:05.216662 1268 update_attempter.cc:302] Processing Done. Jan 28 01:21:05.217083 update_engine[1268]: E0128 01:21:05.217442 1268 update_attempter.cc:615] Update failed. Jan 28 01:21:05.217083 update_engine[1268]: I0128 01:21:05.217643 1268 payload_state.cc:97] Updating payload state for error code: 1 (kActionCodeError) Jan 28 01:21:05.221224 update_engine[1268]: I0128 01:21:05.217753 1268 payload_state.cc:276] Incrementing the URL failure count Jan 28 01:21:05.221224 update_engine[1268]: I0128 01:21:05.217758 1268 payload_state.cc:425] Current URL (Url0)'s Failure Count = 1 Jan 28 01:21:05.221224 update_engine[1268]: I0128 01:21:05.220145 1268 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Jan 28 01:21:05.221224 update_engine[1268]: I0128 01:21:05.220374 1268 omaha_request_action.cc:268] Posting an Omaha request to http://10.0.0.2:34567/v1/update Jan 28 01:21:05.221224 update_engine[1268]: I0128 01:21:05.220386 1268 omaha_request_action.cc:269] Request: Jan 28 01:21:05.221224 update_engine[1268]: Jan 28 01:21:05.221224 update_engine[1268]: Jan 28 01:21:05.221224 update_engine[1268]: Jan 28 01:21:05.221224 update_engine[1268]: Jan 28 01:21:05.221224 update_engine[1268]: Jan 28 01:21:05.221224 update_engine[1268]: Jan 28 01:21:05.221224 update_engine[1268]: I0128 01:21:05.220391 1268 libcurl_http_fetcher.cc:48] Starting/Resuming transfer Jan 28 01:21:05.224878 update_engine[1268]: I0128 01:21:05.224766 1268 libcurl_http_fetcher.cc:152] Setting up curl options for HTTP Jan 28 01:21:05.228420 update_engine[1268]: I0128 01:21:05.228148 1268 libcurl_http_fetcher.cc:435] Setting up timeout source: 1 seconds. Jan 28 01:21:05.608848 update_engine[1268]: I0128 01:21:05.608031 1268 libcurl_http_fetcher.cc:248] HTTP response code: 200 Jan 28 01:21:05.608848 update_engine[1268]: I0128 01:21:05.608426 1268 libcurl_http_fetcher.cc:305] Transfer completed (200), 241 bytes downloaded Jan 28 01:21:05.608848 update_engine[1268]: I0128 01:21:05.608440 1268 omaha_request_action.cc:619] Omaha request response: Jan 28 01:21:05.608848 update_engine[1268]: Jan 28 01:21:05.608848 update_engine[1268]: Jan 28 01:21:05.608848 update_engine[1268]: Jan 28 01:21:05.608848 update_engine[1268]: Jan 28 01:21:05.608848 update_engine[1268]: Jan 28 01:21:05.608848 update_engine[1268]: Jan 28 01:21:05.610223 update_engine[1268]: E0128 01:21:05.608976 1268 omaha_request_action.cc:626] HTTP reported success but Omaha reports an error. Jan 28 01:21:05.610223 update_engine[1268]: I0128 01:21:05.608990 1268 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Jan 28 01:21:05.610223 update_engine[1268]: I0128 01:21:05.608995 1268 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Jan 28 01:21:05.610223 update_engine[1268]: I0128 01:21:05.608999 1268 update_attempter.cc:302] Processing Done. Jan 28 01:21:05.610223 update_engine[1268]: I0128 01:21:05.609006 1268 update_attempter.cc:306] Error event sent.