Sep 30 23:04:02 localhost kernel: Linux version 5.14.0-617.el9.x86_64 (mockbuild@x86-05.stream.rdu2.redhat.com) (gcc (GCC) 11.5.0 20240719 (Red Hat 11.5.0-11), GNU ld version 2.35.2-67.el9) #1 SMP PREEMPT_DYNAMIC Mon Sep 15 21:46:13 UTC 2025 Sep 30 23:04:02 localhost kernel: The list of certified hardware and cloud instances for Red Hat Enterprise Linux 9 can be viewed at the Red Hat Ecosystem Catalog, https://catalog.redhat.com. Sep 30 23:04:02 localhost kernel: Command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-617.el9.x86_64 root=UUID=d6a81468-b74c-4055-b485-def635ab40f8 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Sep 30 23:04:02 localhost kernel: BIOS-provided physical RAM map: Sep 30 23:04:02 localhost kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Sep 30 23:04:02 localhost kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Sep 30 23:04:02 localhost kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Sep 30 23:04:02 localhost kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdafff] usable Sep 30 23:04:02 localhost kernel: BIOS-e820: [mem 0x00000000bffdb000-0x00000000bfffffff] reserved Sep 30 23:04:02 localhost kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Sep 30 23:04:02 localhost kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Sep 30 23:04:02 localhost kernel: BIOS-e820: [mem 0x0000000100000000-0x000000023fffffff] usable Sep 30 23:04:02 localhost kernel: NX (Execute Disable) protection: active Sep 30 23:04:02 localhost kernel: APIC: Static calls initialized Sep 30 23:04:02 localhost kernel: SMBIOS 2.8 present. Sep 30 23:04:02 localhost kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Sep 30 23:04:02 localhost kernel: Hypervisor detected: KVM Sep 30 23:04:02 localhost kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Sep 30 23:04:02 localhost kernel: kvm-clock: using sched offset of 4091506529 cycles Sep 30 23:04:02 localhost kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Sep 30 23:04:02 localhost kernel: tsc: Detected 2799.998 MHz processor Sep 30 23:04:02 localhost kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Sep 30 23:04:02 localhost kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Sep 30 23:04:02 localhost kernel: last_pfn = 0x240000 max_arch_pfn = 0x400000000 Sep 30 23:04:02 localhost kernel: MTRR map: 4 entries (3 fixed + 1 variable; max 19), built from 8 variable MTRRs Sep 30 23:04:02 localhost kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Sep 30 23:04:02 localhost kernel: last_pfn = 0xbffdb max_arch_pfn = 0x400000000 Sep 30 23:04:02 localhost kernel: found SMP MP-table at [mem 0x000f5ae0-0x000f5aef] Sep 30 23:04:02 localhost kernel: Using GB pages for direct mapping Sep 30 23:04:02 localhost kernel: RAMDISK: [mem 0x2d7d0000-0x32bdffff] Sep 30 23:04:02 localhost kernel: ACPI: Early table checksum verification disabled Sep 30 23:04:02 localhost kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Sep 30 23:04:02 localhost kernel: ACPI: RSDT 0x00000000BFFE16BD 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 30 23:04:02 localhost kernel: ACPI: FACP 0x00000000BFFE1571 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 30 23:04:02 localhost kernel: ACPI: DSDT 0x00000000BFFDFC80 0018F1 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 30 23:04:02 localhost kernel: ACPI: FACS 0x00000000BFFDFC40 000040 Sep 30 23:04:02 localhost kernel: ACPI: APIC 0x00000000BFFE15E5 0000B0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 30 23:04:02 localhost kernel: ACPI: WAET 0x00000000BFFE1695 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Sep 30 23:04:02 localhost kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1571-0xbffe15e4] Sep 30 23:04:02 localhost kernel: ACPI: Reserving DSDT table memory at [mem 0xbffdfc80-0xbffe1570] Sep 30 23:04:02 localhost kernel: ACPI: Reserving FACS table memory at [mem 0xbffdfc40-0xbffdfc7f] Sep 30 23:04:02 localhost kernel: ACPI: Reserving APIC table memory at [mem 0xbffe15e5-0xbffe1694] Sep 30 23:04:02 localhost kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1695-0xbffe16bc] Sep 30 23:04:02 localhost kernel: No NUMA configuration found Sep 30 23:04:02 localhost kernel: Faking a node at [mem 0x0000000000000000-0x000000023fffffff] Sep 30 23:04:02 localhost kernel: NODE_DATA(0) allocated [mem 0x23ffd5000-0x23fffffff] Sep 30 23:04:02 localhost kernel: crashkernel reserved: 0x00000000af000000 - 0x00000000bf000000 (256 MB) Sep 30 23:04:02 localhost kernel: Zone ranges: Sep 30 23:04:02 localhost kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Sep 30 23:04:02 localhost kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Sep 30 23:04:02 localhost kernel: Normal [mem 0x0000000100000000-0x000000023fffffff] Sep 30 23:04:02 localhost kernel: Device empty Sep 30 23:04:02 localhost kernel: Movable zone start for each node Sep 30 23:04:02 localhost kernel: Early memory node ranges Sep 30 23:04:02 localhost kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Sep 30 23:04:02 localhost kernel: node 0: [mem 0x0000000000100000-0x00000000bffdafff] Sep 30 23:04:02 localhost kernel: node 0: [mem 0x0000000100000000-0x000000023fffffff] Sep 30 23:04:02 localhost kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000023fffffff] Sep 30 23:04:02 localhost kernel: On node 0, zone DMA: 1 pages in unavailable ranges Sep 30 23:04:02 localhost kernel: On node 0, zone DMA: 97 pages in unavailable ranges Sep 30 23:04:02 localhost kernel: On node 0, zone Normal: 37 pages in unavailable ranges Sep 30 23:04:02 localhost kernel: ACPI: PM-Timer IO Port: 0x608 Sep 30 23:04:02 localhost kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Sep 30 23:04:02 localhost kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Sep 30 23:04:02 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Sep 30 23:04:02 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Sep 30 23:04:02 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Sep 30 23:04:02 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Sep 30 23:04:02 localhost kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Sep 30 23:04:02 localhost kernel: ACPI: Using ACPI (MADT) for SMP configuration information Sep 30 23:04:02 localhost kernel: TSC deadline timer available Sep 30 23:04:02 localhost kernel: CPU topo: Max. logical packages: 8 Sep 30 23:04:02 localhost kernel: CPU topo: Max. logical dies: 8 Sep 30 23:04:02 localhost kernel: CPU topo: Max. dies per package: 1 Sep 30 23:04:02 localhost kernel: CPU topo: Max. threads per core: 1 Sep 30 23:04:02 localhost kernel: CPU topo: Num. cores per package: 1 Sep 30 23:04:02 localhost kernel: CPU topo: Num. threads per package: 1 Sep 30 23:04:02 localhost kernel: CPU topo: Allowing 8 present CPUs plus 0 hotplug CPUs Sep 30 23:04:02 localhost kernel: kvm-guest: APIC: eoi() replaced with kvm_guest_apic_eoi_write() Sep 30 23:04:02 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff] Sep 30 23:04:02 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff] Sep 30 23:04:02 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff] Sep 30 23:04:02 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff] Sep 30 23:04:02 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xbffdb000-0xbfffffff] Sep 30 23:04:02 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff] Sep 30 23:04:02 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff] Sep 30 23:04:02 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff] Sep 30 23:04:02 localhost kernel: PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff] Sep 30 23:04:02 localhost kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices Sep 30 23:04:02 localhost kernel: Booting paravirtualized kernel on KVM Sep 30 23:04:02 localhost kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Sep 30 23:04:02 localhost kernel: setup_percpu: NR_CPUS:8192 nr_cpumask_bits:8 nr_cpu_ids:8 nr_node_ids:1 Sep 30 23:04:02 localhost kernel: percpu: Embedded 64 pages/cpu s225280 r8192 d28672 u262144 Sep 30 23:04:02 localhost kernel: pcpu-alloc: s225280 r8192 d28672 u262144 alloc=1*2097152 Sep 30 23:04:02 localhost kernel: pcpu-alloc: [0] 0 1 2 3 4 5 6 7 Sep 30 23:04:02 localhost kernel: kvm-guest: PV spinlocks disabled, no host support Sep 30 23:04:02 localhost kernel: Kernel command line: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-617.el9.x86_64 root=UUID=d6a81468-b74c-4055-b485-def635ab40f8 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Sep 30 23:04:02 localhost kernel: Unknown kernel command line parameters "BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-617.el9.x86_64", will be passed to user space. Sep 30 23:04:02 localhost kernel: random: crng init done Sep 30 23:04:02 localhost kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Sep 30 23:04:02 localhost kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Sep 30 23:04:02 localhost kernel: Fallback order for Node 0: 0 Sep 30 23:04:02 localhost kernel: Built 1 zonelists, mobility grouping on. Total pages: 2064091 Sep 30 23:04:02 localhost kernel: Policy zone: Normal Sep 30 23:04:02 localhost kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Sep 30 23:04:02 localhost kernel: software IO TLB: area num 8. Sep 30 23:04:02 localhost kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=8, Nodes=1 Sep 30 23:04:02 localhost kernel: ftrace: allocating 49329 entries in 193 pages Sep 30 23:04:02 localhost kernel: ftrace: allocated 193 pages with 3 groups Sep 30 23:04:02 localhost kernel: Dynamic Preempt: voluntary Sep 30 23:04:02 localhost kernel: rcu: Preemptible hierarchical RCU implementation. Sep 30 23:04:02 localhost kernel: rcu: RCU event tracing is enabled. Sep 30 23:04:02 localhost kernel: rcu: RCU restricting CPUs from NR_CPUS=8192 to nr_cpu_ids=8. Sep 30 23:04:02 localhost kernel: Trampoline variant of Tasks RCU enabled. Sep 30 23:04:02 localhost kernel: Rude variant of Tasks RCU enabled. Sep 30 23:04:02 localhost kernel: Tracing variant of Tasks RCU enabled. Sep 30 23:04:02 localhost kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Sep 30 23:04:02 localhost kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=8 Sep 30 23:04:02 localhost kernel: RCU Tasks: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Sep 30 23:04:02 localhost kernel: RCU Tasks Rude: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Sep 30 23:04:02 localhost kernel: RCU Tasks Trace: Setting shift to 3 and lim to 1 rcu_task_cb_adjust=1 rcu_task_cpu_ids=8. Sep 30 23:04:02 localhost kernel: NR_IRQS: 524544, nr_irqs: 488, preallocated irqs: 16 Sep 30 23:04:02 localhost kernel: rcu: srcu_init: Setting srcu_struct sizes based on contention. Sep 30 23:04:02 localhost kernel: kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) Sep 30 23:04:02 localhost kernel: Console: colour VGA+ 80x25 Sep 30 23:04:02 localhost kernel: printk: console [ttyS0] enabled Sep 30 23:04:02 localhost kernel: ACPI: Core revision 20230331 Sep 30 23:04:02 localhost kernel: APIC: Switch to symmetric I/O mode setup Sep 30 23:04:02 localhost kernel: x2apic enabled Sep 30 23:04:02 localhost kernel: APIC: Switched APIC routing to: physical x2apic Sep 30 23:04:02 localhost kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Sep 30 23:04:02 localhost kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Sep 30 23:04:02 localhost kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Sep 30 23:04:02 localhost kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Sep 30 23:04:02 localhost kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Sep 30 23:04:02 localhost kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Sep 30 23:04:02 localhost kernel: Spectre V2 : Mitigation: Retpolines Sep 30 23:04:02 localhost kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Sep 30 23:04:02 localhost kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Sep 30 23:04:02 localhost kernel: RETBleed: Mitigation: untrained return thunk Sep 30 23:04:02 localhost kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Sep 30 23:04:02 localhost kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl Sep 30 23:04:02 localhost kernel: Speculative Return Stack Overflow: IBPB-extending microcode not applied! Sep 30 23:04:02 localhost kernel: Speculative Return Stack Overflow: WARNING: See https://kernel.org/doc/html/latest/admin-guide/hw-vuln/srso.html for mitigation options. Sep 30 23:04:02 localhost kernel: x86/bugs: return thunk changed Sep 30 23:04:02 localhost kernel: Speculative Return Stack Overflow: Vulnerable: Safe RET, no microcode Sep 30 23:04:02 localhost kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Sep 30 23:04:02 localhost kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Sep 30 23:04:02 localhost kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Sep 30 23:04:02 localhost kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Sep 30 23:04:02 localhost kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Sep 30 23:04:02 localhost kernel: Freeing SMP alternatives memory: 40K Sep 30 23:04:02 localhost kernel: pid_max: default: 32768 minimum: 301 Sep 30 23:04:02 localhost kernel: LSM: initializing lsm=lockdown,capability,landlock,yama,integrity,selinux,bpf Sep 30 23:04:02 localhost kernel: landlock: Up and running. Sep 30 23:04:02 localhost kernel: Yama: becoming mindful. Sep 30 23:04:02 localhost kernel: SELinux: Initializing. Sep 30 23:04:02 localhost kernel: LSM support for eBPF active Sep 30 23:04:02 localhost kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 30 23:04:02 localhost kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Sep 30 23:04:02 localhost kernel: smpboot: CPU0: AMD EPYC-Rome Processor (family: 0x17, model: 0x31, stepping: 0x0) Sep 30 23:04:02 localhost kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Sep 30 23:04:02 localhost kernel: ... version: 0 Sep 30 23:04:02 localhost kernel: ... bit width: 48 Sep 30 23:04:02 localhost kernel: ... generic registers: 6 Sep 30 23:04:02 localhost kernel: ... value mask: 0000ffffffffffff Sep 30 23:04:02 localhost kernel: ... max period: 00007fffffffffff Sep 30 23:04:02 localhost kernel: ... fixed-purpose events: 0 Sep 30 23:04:02 localhost kernel: ... event mask: 000000000000003f Sep 30 23:04:02 localhost kernel: signal: max sigframe size: 1776 Sep 30 23:04:02 localhost kernel: rcu: Hierarchical SRCU implementation. Sep 30 23:04:02 localhost kernel: rcu: Max phase no-delay instances is 400. Sep 30 23:04:02 localhost kernel: smp: Bringing up secondary CPUs ... Sep 30 23:04:02 localhost kernel: smpboot: x86: Booting SMP configuration: Sep 30 23:04:02 localhost kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 Sep 30 23:04:02 localhost kernel: smp: Brought up 1 node, 8 CPUs Sep 30 23:04:02 localhost kernel: smpboot: Total of 8 processors activated (44799.96 BogoMIPS) Sep 30 23:04:02 localhost kernel: node 0 deferred pages initialised in 37ms Sep 30 23:04:02 localhost kernel: Memory: 7765784K/8388068K available (16384K kernel code, 5784K rwdata, 13988K rodata, 4072K init, 7304K bss, 616480K reserved, 0K cma-reserved) Sep 30 23:04:02 localhost kernel: devtmpfs: initialized Sep 30 23:04:02 localhost kernel: x86/mm: Memory block size: 128MB Sep 30 23:04:02 localhost kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Sep 30 23:04:02 localhost kernel: futex hash table entries: 2048 (order: 5, 131072 bytes, linear) Sep 30 23:04:02 localhost kernel: pinctrl core: initialized pinctrl subsystem Sep 30 23:04:02 localhost kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Sep 30 23:04:02 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL pool for atomic allocations Sep 30 23:04:02 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Sep 30 23:04:02 localhost kernel: DMA: preallocated 1024 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Sep 30 23:04:02 localhost kernel: audit: initializing netlink subsys (disabled) Sep 30 23:04:02 localhost kernel: audit: type=2000 audit(1759287840.548:1): state=initialized audit_enabled=0 res=1 Sep 30 23:04:02 localhost kernel: thermal_sys: Registered thermal governor 'fair_share' Sep 30 23:04:02 localhost kernel: thermal_sys: Registered thermal governor 'step_wise' Sep 30 23:04:02 localhost kernel: thermal_sys: Registered thermal governor 'user_space' Sep 30 23:04:02 localhost kernel: cpuidle: using governor menu Sep 30 23:04:02 localhost kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Sep 30 23:04:02 localhost kernel: PCI: Using configuration type 1 for base access Sep 30 23:04:02 localhost kernel: PCI: Using configuration type 1 for extended access Sep 30 23:04:02 localhost kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Sep 30 23:04:02 localhost kernel: HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages Sep 30 23:04:02 localhost kernel: HugeTLB: 16380 KiB vmemmap can be freed for a 1.00 GiB page Sep 30 23:04:02 localhost kernel: HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages Sep 30 23:04:02 localhost kernel: HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page Sep 30 23:04:02 localhost kernel: Demotion targets for Node 0: null Sep 30 23:04:02 localhost kernel: cryptd: max_cpu_qlen set to 1000 Sep 30 23:04:02 localhost kernel: ACPI: Added _OSI(Module Device) Sep 30 23:04:02 localhost kernel: ACPI: Added _OSI(Processor Device) Sep 30 23:04:02 localhost kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Sep 30 23:04:02 localhost kernel: ACPI: Added _OSI(Processor Aggregator Device) Sep 30 23:04:02 localhost kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Sep 30 23:04:02 localhost kernel: ACPI: _OSC evaluation for CPUs failed, trying _PDC Sep 30 23:04:02 localhost kernel: ACPI: Interpreter enabled Sep 30 23:04:02 localhost kernel: ACPI: PM: (supports S0 S3 S4 S5) Sep 30 23:04:02 localhost kernel: ACPI: Using IOAPIC for interrupt routing Sep 30 23:04:02 localhost kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Sep 30 23:04:02 localhost kernel: PCI: Using E820 reservations for host bridge windows Sep 30 23:04:02 localhost kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Sep 30 23:04:02 localhost kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Sep 30 23:04:02 localhost kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI EDR HPX-Type3] Sep 30 23:04:02 localhost kernel: acpiphp: Slot [3] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [4] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [5] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [6] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [7] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [8] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [9] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [10] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [11] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [12] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [13] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [14] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [15] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [16] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [17] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [18] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [19] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [20] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [21] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [22] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [23] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [24] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [25] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [26] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [27] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [28] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [29] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [30] registered Sep 30 23:04:02 localhost kernel: acpiphp: Slot [31] registered Sep 30 23:04:02 localhost kernel: PCI host bridge to bus 0000:00 Sep 30 23:04:02 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Sep 30 23:04:02 localhost kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Sep 30 23:04:02 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Sep 30 23:04:02 localhost kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Sep 30 23:04:02 localhost kernel: pci_bus 0000:00: root bus resource [mem 0x240000000-0x2bfffffff window] Sep 30 23:04:02 localhost kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Sep 30 23:04:02 localhost kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 conventional PCI endpoint Sep 30 23:04:02 localhost kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 conventional PCI endpoint Sep 30 23:04:02 localhost kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 conventional PCI endpoint Sep 30 23:04:02 localhost kernel: pci 0000:00:01.1: BAR 4 [io 0xc140-0xc14f] Sep 30 23:04:02 localhost kernel: pci 0000:00:01.1: BAR 0 [io 0x01f0-0x01f7]: legacy IDE quirk Sep 30 23:04:02 localhost kernel: pci 0000:00:01.1: BAR 1 [io 0x03f6]: legacy IDE quirk Sep 30 23:04:02 localhost kernel: pci 0000:00:01.1: BAR 2 [io 0x0170-0x0177]: legacy IDE quirk Sep 30 23:04:02 localhost kernel: pci 0000:00:01.1: BAR 3 [io 0x0376]: legacy IDE quirk Sep 30 23:04:02 localhost kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 conventional PCI endpoint Sep 30 23:04:02 localhost kernel: pci 0000:00:01.2: BAR 4 [io 0xc100-0xc11f] Sep 30 23:04:02 localhost kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 conventional PCI endpoint Sep 30 23:04:02 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Sep 30 23:04:02 localhost kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Sep 30 23:04:02 localhost kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 conventional PCI endpoint Sep 30 23:04:02 localhost kernel: pci 0000:00:02.0: BAR 0 [mem 0xfe000000-0xfe7fffff pref] Sep 30 23:04:02 localhost kernel: pci 0000:00:02.0: BAR 2 [mem 0xfe800000-0xfe803fff 64bit pref] Sep 30 23:04:02 localhost kernel: pci 0000:00:02.0: BAR 4 [mem 0xfeb90000-0xfeb90fff] Sep 30 23:04:02 localhost kernel: pci 0000:00:02.0: ROM [mem 0xfeb80000-0xfeb8ffff pref] Sep 30 23:04:02 localhost kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Sep 30 23:04:02 localhost kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 conventional PCI endpoint Sep 30 23:04:02 localhost kernel: pci 0000:00:03.0: BAR 0 [io 0xc080-0xc0bf] Sep 30 23:04:02 localhost kernel: pci 0000:00:03.0: BAR 1 [mem 0xfeb91000-0xfeb91fff] Sep 30 23:04:02 localhost kernel: pci 0000:00:03.0: BAR 4 [mem 0xfe804000-0xfe807fff 64bit pref] Sep 30 23:04:02 localhost kernel: pci 0000:00:03.0: ROM [mem 0xfeb00000-0xfeb7ffff pref] Sep 30 23:04:02 localhost kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 conventional PCI endpoint Sep 30 23:04:02 localhost kernel: pci 0000:00:04.0: BAR 0 [io 0xc000-0xc07f] Sep 30 23:04:02 localhost kernel: pci 0000:00:04.0: BAR 1 [mem 0xfeb92000-0xfeb92fff] Sep 30 23:04:02 localhost kernel: pci 0000:00:04.0: BAR 4 [mem 0xfe808000-0xfe80bfff 64bit pref] Sep 30 23:04:02 localhost kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 conventional PCI endpoint Sep 30 23:04:02 localhost kernel: pci 0000:00:05.0: BAR 0 [io 0xc0c0-0xc0ff] Sep 30 23:04:02 localhost kernel: pci 0000:00:05.0: BAR 4 [mem 0xfe80c000-0xfe80ffff 64bit pref] Sep 30 23:04:02 localhost kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 conventional PCI endpoint Sep 30 23:04:02 localhost kernel: pci 0000:00:06.0: BAR 0 [io 0xc120-0xc13f] Sep 30 23:04:02 localhost kernel: pci 0000:00:06.0: BAR 4 [mem 0xfe810000-0xfe813fff 64bit pref] Sep 30 23:04:02 localhost kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Sep 30 23:04:02 localhost kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Sep 30 23:04:02 localhost kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Sep 30 23:04:02 localhost kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Sep 30 23:04:02 localhost kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Sep 30 23:04:02 localhost kernel: iommu: Default domain type: Translated Sep 30 23:04:02 localhost kernel: iommu: DMA domain TLB invalidation policy: lazy mode Sep 30 23:04:02 localhost kernel: SCSI subsystem initialized Sep 30 23:04:02 localhost kernel: ACPI: bus type USB registered Sep 30 23:04:02 localhost kernel: usbcore: registered new interface driver usbfs Sep 30 23:04:02 localhost kernel: usbcore: registered new interface driver hub Sep 30 23:04:02 localhost kernel: usbcore: registered new device driver usb Sep 30 23:04:02 localhost kernel: pps_core: LinuxPPS API ver. 1 registered Sep 30 23:04:02 localhost kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Sep 30 23:04:02 localhost kernel: PTP clock support registered Sep 30 23:04:02 localhost kernel: EDAC MC: Ver: 3.0.0 Sep 30 23:04:02 localhost kernel: NetLabel: Initializing Sep 30 23:04:02 localhost kernel: NetLabel: domain hash size = 128 Sep 30 23:04:02 localhost kernel: NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO Sep 30 23:04:02 localhost kernel: NetLabel: unlabeled traffic allowed by default Sep 30 23:04:02 localhost kernel: PCI: Using ACPI for IRQ routing Sep 30 23:04:02 localhost kernel: PCI: pci_cache_line_size set to 64 bytes Sep 30 23:04:02 localhost kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Sep 30 23:04:02 localhost kernel: e820: reserve RAM buffer [mem 0xbffdb000-0xbfffffff] Sep 30 23:04:02 localhost kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Sep 30 23:04:02 localhost kernel: pci 0000:00:02.0: vgaarb: bridge control possible Sep 30 23:04:02 localhost kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Sep 30 23:04:02 localhost kernel: vgaarb: loaded Sep 30 23:04:02 localhost kernel: clocksource: Switched to clocksource kvm-clock Sep 30 23:04:02 localhost kernel: VFS: Disk quotas dquot_6.6.0 Sep 30 23:04:02 localhost kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Sep 30 23:04:02 localhost kernel: pnp: PnP ACPI init Sep 30 23:04:02 localhost kernel: pnp 00:03: [dma 2] Sep 30 23:04:02 localhost kernel: pnp: PnP ACPI: found 5 devices Sep 30 23:04:02 localhost kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Sep 30 23:04:02 localhost kernel: NET: Registered PF_INET protocol family Sep 30 23:04:02 localhost kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Sep 30 23:04:02 localhost kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Sep 30 23:04:02 localhost kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Sep 30 23:04:02 localhost kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Sep 30 23:04:02 localhost kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Sep 30 23:04:02 localhost kernel: TCP: Hash tables configured (established 65536 bind 65536) Sep 30 23:04:02 localhost kernel: MPTCP token hash table entries: 8192 (order: 5, 196608 bytes, linear) Sep 30 23:04:02 localhost kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Sep 30 23:04:02 localhost kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Sep 30 23:04:02 localhost kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Sep 30 23:04:02 localhost kernel: NET: Registered PF_XDP protocol family Sep 30 23:04:02 localhost kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Sep 30 23:04:02 localhost kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Sep 30 23:04:02 localhost kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Sep 30 23:04:02 localhost kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] Sep 30 23:04:02 localhost kernel: pci_bus 0000:00: resource 8 [mem 0x240000000-0x2bfffffff window] Sep 30 23:04:02 localhost kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Sep 30 23:04:02 localhost kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Sep 30 23:04:02 localhost kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Sep 30 23:04:02 localhost kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x140 took 81636 usecs Sep 30 23:04:02 localhost kernel: PCI: CLS 0 bytes, default 64 Sep 30 23:04:02 localhost kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Sep 30 23:04:02 localhost kernel: software IO TLB: mapped [mem 0x00000000ab000000-0x00000000af000000] (64MB) Sep 30 23:04:02 localhost kernel: ACPI: bus type thunderbolt registered Sep 30 23:04:02 localhost kernel: Trying to unpack rootfs image as initramfs... Sep 30 23:04:02 localhost kernel: Initialise system trusted keyrings Sep 30 23:04:02 localhost kernel: Key type blacklist registered Sep 30 23:04:02 localhost kernel: workingset: timestamp_bits=36 max_order=21 bucket_order=0 Sep 30 23:04:02 localhost kernel: zbud: loaded Sep 30 23:04:02 localhost kernel: integrity: Platform Keyring initialized Sep 30 23:04:02 localhost kernel: integrity: Machine keyring initialized Sep 30 23:04:02 localhost kernel: Freeing initrd memory: 86080K Sep 30 23:04:02 localhost kernel: NET: Registered PF_ALG protocol family Sep 30 23:04:02 localhost kernel: xor: automatically using best checksumming function avx Sep 30 23:04:02 localhost kernel: Key type asymmetric registered Sep 30 23:04:02 localhost kernel: Asymmetric key parser 'x509' registered Sep 30 23:04:02 localhost kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 246) Sep 30 23:04:02 localhost kernel: io scheduler mq-deadline registered Sep 30 23:04:02 localhost kernel: io scheduler kyber registered Sep 30 23:04:02 localhost kernel: io scheduler bfq registered Sep 30 23:04:02 localhost kernel: atomic64_test: passed for x86-64 platform with CX8 and with SSE Sep 30 23:04:02 localhost kernel: shpchp: Standard Hot Plug PCI Controller Driver version: 0.4 Sep 30 23:04:02 localhost kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 Sep 30 23:04:02 localhost kernel: ACPI: button: Power Button [PWRF] Sep 30 23:04:02 localhost kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Sep 30 23:04:02 localhost kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Sep 30 23:04:02 localhost kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Sep 30 23:04:02 localhost kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Sep 30 23:04:02 localhost kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Sep 30 23:04:02 localhost kernel: Non-volatile memory driver v1.3 Sep 30 23:04:02 localhost kernel: rdac: device handler registered Sep 30 23:04:02 localhost kernel: hp_sw: device handler registered Sep 30 23:04:02 localhost kernel: emc: device handler registered Sep 30 23:04:02 localhost kernel: alua: device handler registered Sep 30 23:04:02 localhost kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Sep 30 23:04:02 localhost kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Sep 30 23:04:02 localhost kernel: uhci_hcd 0000:00:01.2: detected 2 ports Sep 30 23:04:02 localhost kernel: uhci_hcd 0000:00:01.2: irq 11, io port 0x0000c100 Sep 30 23:04:02 localhost kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0001, bcdDevice= 5.14 Sep 30 23:04:02 localhost kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 Sep 30 23:04:02 localhost kernel: usb usb1: Product: UHCI Host Controller Sep 30 23:04:02 localhost kernel: usb usb1: Manufacturer: Linux 5.14.0-617.el9.x86_64 uhci_hcd Sep 30 23:04:02 localhost kernel: usb usb1: SerialNumber: 0000:00:01.2 Sep 30 23:04:02 localhost kernel: hub 1-0:1.0: USB hub found Sep 30 23:04:02 localhost kernel: hub 1-0:1.0: 2 ports detected Sep 30 23:04:02 localhost kernel: usbcore: registered new interface driver usbserial_generic Sep 30 23:04:02 localhost kernel: usbserial: USB Serial support registered for generic Sep 30 23:04:02 localhost kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Sep 30 23:04:02 localhost kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Sep 30 23:04:02 localhost kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Sep 30 23:04:02 localhost kernel: mousedev: PS/2 mouse device common for all mice Sep 30 23:04:02 localhost kernel: rtc_cmos 00:04: RTC can wake from S4 Sep 30 23:04:02 localhost kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1 Sep 30 23:04:02 localhost kernel: rtc_cmos 00:04: registered as rtc0 Sep 30 23:04:02 localhost kernel: rtc_cmos 00:04: setting system clock to 2025-10-01T03:04:01 UTC (1759287841) Sep 30 23:04:02 localhost kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Sep 30 23:04:02 localhost kernel: amd_pstate: the _CPC object is not present in SBIOS or ACPI disabled Sep 30 23:04:02 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4 Sep 30 23:04:02 localhost kernel: hid: raw HID events driver (C) Jiri Kosina Sep 30 23:04:02 localhost kernel: usbcore: registered new interface driver usbhid Sep 30 23:04:02 localhost kernel: usbhid: USB HID core driver Sep 30 23:04:02 localhost kernel: drop_monitor: Initializing network drop monitor service Sep 30 23:04:02 localhost kernel: input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3 Sep 30 23:04:02 localhost kernel: Initializing XFRM netlink socket Sep 30 23:04:02 localhost kernel: NET: Registered PF_INET6 protocol family Sep 30 23:04:02 localhost kernel: Segment Routing with IPv6 Sep 30 23:04:02 localhost kernel: NET: Registered PF_PACKET protocol family Sep 30 23:04:02 localhost kernel: mpls_gso: MPLS GSO support Sep 30 23:04:02 localhost kernel: IPI shorthand broadcast: enabled Sep 30 23:04:02 localhost kernel: AVX2 version of gcm_enc/dec engaged. Sep 30 23:04:02 localhost kernel: AES CTR mode by8 optimization enabled Sep 30 23:04:02 localhost kernel: sched_clock: Marking stable (1280005452, 140893650)->(1536814029, -115914927) Sep 30 23:04:02 localhost kernel: registered taskstats version 1 Sep 30 23:04:02 localhost kernel: Loading compiled-in X.509 certificates Sep 30 23:04:02 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: bb2966091bafcba340f8183756023c985dcc8fe9' Sep 30 23:04:02 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux Driver Update Program (key 3): bf57f3e87362bc7229d9f465321773dfd1f77a80' Sep 30 23:04:02 localhost kernel: Loaded X.509 cert 'Red Hat Enterprise Linux kpatch signing key: 4d38fd864ebe18c5f0b72e3852e2014c3a676fc8' Sep 30 23:04:02 localhost kernel: Loaded X.509 cert 'RH-IMA-CA: Red Hat IMA CA: fb31825dd0e073685b264e3038963673f753959a' Sep 30 23:04:02 localhost kernel: Loaded X.509 cert 'Nvidia GPU OOT signing 001: 55e1cef88193e60419f0b0ec379c49f77545acf0' Sep 30 23:04:02 localhost kernel: Demotion targets for Node 0: null Sep 30 23:04:02 localhost kernel: page_owner is disabled Sep 30 23:04:02 localhost kernel: Key type .fscrypt registered Sep 30 23:04:02 localhost kernel: Key type fscrypt-provisioning registered Sep 30 23:04:02 localhost kernel: Key type big_key registered Sep 30 23:04:02 localhost kernel: Key type encrypted registered Sep 30 23:04:02 localhost kernel: ima: No TPM chip found, activating TPM-bypass! Sep 30 23:04:02 localhost kernel: Loading compiled-in module X.509 certificates Sep 30 23:04:02 localhost kernel: Loaded X.509 cert 'The CentOS Project: CentOS Stream kernel signing key: bb2966091bafcba340f8183756023c985dcc8fe9' Sep 30 23:04:02 localhost kernel: ima: Allocated hash algorithm: sha256 Sep 30 23:04:02 localhost kernel: ima: No architecture policies found Sep 30 23:04:02 localhost kernel: evm: Initialising EVM extended attributes: Sep 30 23:04:02 localhost kernel: evm: security.selinux Sep 30 23:04:02 localhost kernel: evm: security.SMACK64 (disabled) Sep 30 23:04:02 localhost kernel: evm: security.SMACK64EXEC (disabled) Sep 30 23:04:02 localhost kernel: evm: security.SMACK64TRANSMUTE (disabled) Sep 30 23:04:02 localhost kernel: evm: security.SMACK64MMAP (disabled) Sep 30 23:04:02 localhost kernel: evm: security.apparmor (disabled) Sep 30 23:04:02 localhost kernel: evm: security.ima Sep 30 23:04:02 localhost kernel: evm: security.capability Sep 30 23:04:02 localhost kernel: evm: HMAC attrs: 0x1 Sep 30 23:04:02 localhost kernel: usb 1-1: new full-speed USB device number 2 using uhci_hcd Sep 30 23:04:02 localhost kernel: Running certificate verification RSA selftest Sep 30 23:04:02 localhost kernel: Loaded X.509 cert 'Certificate verification self-testing key: f58703bb33ce1b73ee02eccdee5b8817518fe3db' Sep 30 23:04:02 localhost kernel: Running certificate verification ECDSA selftest Sep 30 23:04:02 localhost kernel: Loaded X.509 cert 'Certificate verification ECDSA self-testing key: 2900bcea1deb7bc8479a84a23d758efdfdd2b2d3' Sep 30 23:04:02 localhost kernel: usb 1-1: New USB device found, idVendor=0627, idProduct=0001, bcdDevice= 0.00 Sep 30 23:04:02 localhost kernel: usb 1-1: New USB device strings: Mfr=1, Product=3, SerialNumber=10 Sep 30 23:04:02 localhost kernel: usb 1-1: Product: QEMU USB Tablet Sep 30 23:04:02 localhost kernel: usb 1-1: Manufacturer: QEMU Sep 30 23:04:02 localhost kernel: usb 1-1: SerialNumber: 28754-0000:00:01.2-1 Sep 30 23:04:02 localhost kernel: clk: Disabling unused clocks Sep 30 23:04:02 localhost kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input5 Sep 30 23:04:02 localhost kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0 Sep 30 23:04:02 localhost kernel: Freeing unused decrypted memory: 2028K Sep 30 23:04:02 localhost kernel: Freeing unused kernel image (initmem) memory: 4072K Sep 30 23:04:02 localhost kernel: Write protecting the kernel read-only data: 30720k Sep 30 23:04:02 localhost kernel: Freeing unused kernel image (rodata/data gap) memory: 348K Sep 30 23:04:02 localhost kernel: x86/mm: Checked W+X mappings: passed, no W+X pages found. Sep 30 23:04:02 localhost kernel: Run /init as init process Sep 30 23:04:02 localhost kernel: with arguments: Sep 30 23:04:02 localhost kernel: /init Sep 30 23:04:02 localhost kernel: with environment: Sep 30 23:04:02 localhost kernel: HOME=/ Sep 30 23:04:02 localhost kernel: TERM=linux Sep 30 23:04:02 localhost kernel: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-617.el9.x86_64 Sep 30 23:04:02 localhost systemd[1]: systemd 252-55.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 30 23:04:02 localhost systemd[1]: Detected virtualization kvm. Sep 30 23:04:02 localhost systemd[1]: Detected architecture x86-64. Sep 30 23:04:02 localhost systemd[1]: Running in initrd. Sep 30 23:04:02 localhost systemd[1]: No hostname configured, using default hostname. Sep 30 23:04:02 localhost systemd[1]: Hostname set to . Sep 30 23:04:02 localhost systemd[1]: Initializing machine ID from VM UUID. Sep 30 23:04:02 localhost systemd[1]: Queued start job for default target Initrd Default Target. Sep 30 23:04:02 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Sep 30 23:04:02 localhost systemd[1]: Reached target Local Encrypted Volumes. Sep 30 23:04:02 localhost systemd[1]: Reached target Initrd /usr File System. Sep 30 23:04:02 localhost systemd[1]: Reached target Local File Systems. Sep 30 23:04:02 localhost systemd[1]: Reached target Path Units. Sep 30 23:04:02 localhost systemd[1]: Reached target Slice Units. Sep 30 23:04:02 localhost systemd[1]: Reached target Swaps. Sep 30 23:04:02 localhost systemd[1]: Reached target Timer Units. Sep 30 23:04:02 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Sep 30 23:04:02 localhost systemd[1]: Listening on Journal Socket (/dev/log). Sep 30 23:04:02 localhost systemd[1]: Listening on Journal Socket. Sep 30 23:04:02 localhost systemd[1]: Listening on udev Control Socket. Sep 30 23:04:02 localhost systemd[1]: Listening on udev Kernel Socket. Sep 30 23:04:02 localhost systemd[1]: Reached target Socket Units. Sep 30 23:04:02 localhost systemd[1]: Starting Create List of Static Device Nodes... Sep 30 23:04:02 localhost systemd[1]: Starting Journal Service... Sep 30 23:04:02 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Sep 30 23:04:02 localhost systemd[1]: Starting Apply Kernel Variables... Sep 30 23:04:02 localhost systemd[1]: Starting Create System Users... Sep 30 23:04:02 localhost systemd[1]: Starting Setup Virtual Console... Sep 30 23:04:02 localhost systemd[1]: Finished Create List of Static Device Nodes. Sep 30 23:04:02 localhost systemd[1]: Finished Apply Kernel Variables. Sep 30 23:04:02 localhost systemd[1]: Finished Create System Users. Sep 30 23:04:02 localhost systemd-journald[306]: Journal started Sep 30 23:04:02 localhost systemd-journald[306]: Runtime Journal (/run/log/journal/fd2e59aebd5143ccb03b86c81e926488) is 8.0M, max 153.5M, 145.5M free. Sep 30 23:04:02 localhost systemd-sysusers[310]: Creating group 'users' with GID 100. Sep 30 23:04:02 localhost systemd-sysusers[310]: Creating group 'dbus' with GID 81. Sep 30 23:04:02 localhost systemd-sysusers[310]: Creating user 'dbus' (System Message Bus) with UID 81 and GID 81. Sep 30 23:04:02 localhost systemd[1]: Started Journal Service. Sep 30 23:04:02 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Sep 30 23:04:02 localhost systemd[1]: Starting Create Volatile Files and Directories... Sep 30 23:04:02 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Sep 30 23:04:02 localhost systemd[1]: Finished Create Volatile Files and Directories. Sep 30 23:04:02 localhost systemd[1]: Finished Setup Virtual Console. Sep 30 23:04:02 localhost systemd[1]: dracut ask for additional cmdline parameters was skipped because no trigger condition checks were met. Sep 30 23:04:02 localhost systemd[1]: Starting dracut cmdline hook... Sep 30 23:04:02 localhost dracut-cmdline[325]: dracut-9 dracut-057-102.git20250818.el9 Sep 30 23:04:02 localhost dracut-cmdline[325]: Using kernel command line parameters: BOOT_IMAGE=(hd0,msdos1)/boot/vmlinuz-5.14.0-617.el9.x86_64 root=UUID=d6a81468-b74c-4055-b485-def635ab40f8 ro console=ttyS0,115200n8 no_timer_check net.ifnames=0 crashkernel=1G-2G:192M,2G-64G:256M,64G-:512M Sep 30 23:04:02 localhost systemd[1]: Finished dracut cmdline hook. Sep 30 23:04:02 localhost systemd[1]: Starting dracut pre-udev hook... Sep 30 23:04:02 localhost kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Sep 30 23:04:02 localhost kernel: device-mapper: uevent: version 1.0.3 Sep 30 23:04:02 localhost kernel: device-mapper: ioctl: 4.50.0-ioctl (2025-04-28) initialised: dm-devel@lists.linux.dev Sep 30 23:04:02 localhost kernel: RPC: Registered named UNIX socket transport module. Sep 30 23:04:02 localhost kernel: RPC: Registered udp transport module. Sep 30 23:04:02 localhost kernel: RPC: Registered tcp transport module. Sep 30 23:04:02 localhost kernel: RPC: Registered tcp-with-tls transport module. Sep 30 23:04:02 localhost kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Sep 30 23:04:03 localhost rpc.statd[443]: Version 2.5.4 starting Sep 30 23:04:03 localhost rpc.statd[443]: Initializing NSM state Sep 30 23:04:03 localhost rpc.idmapd[448]: Setting log level to 0 Sep 30 23:04:03 localhost systemd[1]: Finished dracut pre-udev hook. Sep 30 23:04:03 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Sep 30 23:04:03 localhost systemd-udevd[461]: Using default interface naming scheme 'rhel-9.0'. Sep 30 23:04:03 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Sep 30 23:04:03 localhost systemd[1]: Starting dracut pre-trigger hook... Sep 30 23:04:03 localhost systemd[1]: Finished dracut pre-trigger hook. Sep 30 23:04:03 localhost systemd[1]: Starting Coldplug All udev Devices... Sep 30 23:04:03 localhost systemd[1]: Created slice Slice /system/modprobe. Sep 30 23:04:03 localhost systemd[1]: Starting Load Kernel Module configfs... Sep 30 23:04:03 localhost systemd[1]: Finished Coldplug All udev Devices. Sep 30 23:04:03 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 30 23:04:03 localhost systemd[1]: Finished Load Kernel Module configfs. Sep 30 23:04:03 localhost systemd[1]: Mounting Kernel Configuration File System... Sep 30 23:04:03 localhost systemd[1]: nm-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Sep 30 23:04:03 localhost systemd[1]: Reached target Network. Sep 30 23:04:03 localhost systemd[1]: nm-wait-online-initrd.service was skipped because of an unmet condition check (ConditionPathExists=/run/NetworkManager/initrd/neednet). Sep 30 23:04:03 localhost systemd[1]: Starting dracut initqueue hook... Sep 30 23:04:03 localhost systemd[1]: Mounted Kernel Configuration File System. Sep 30 23:04:03 localhost systemd[1]: Reached target System Initialization. Sep 30 23:04:03 localhost systemd[1]: Reached target Basic System. Sep 30 23:04:03 localhost kernel: virtio_blk virtio2: 8/0/0 default/read/poll queues Sep 30 23:04:03 localhost kernel: virtio_blk virtio2: [vda] 83886080 512-byte logical blocks (42.9 GB/40.0 GiB) Sep 30 23:04:03 localhost kernel: vda: vda1 Sep 30 23:04:03 localhost kernel: libata version 3.00 loaded. Sep 30 23:04:03 localhost kernel: ata_piix 0000:00:01.1: version 2.13 Sep 30 23:04:03 localhost kernel: scsi host0: ata_piix Sep 30 23:04:03 localhost kernel: scsi host1: ata_piix Sep 30 23:04:03 localhost kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc140 irq 14 lpm-pol 0 Sep 30 23:04:03 localhost kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc148 irq 15 lpm-pol 0 Sep 30 23:04:03 localhost systemd-udevd[474]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:04:03 localhost systemd[1]: Found device /dev/disk/by-uuid/d6a81468-b74c-4055-b485-def635ab40f8. Sep 30 23:04:03 localhost systemd[1]: Reached target Initrd Root Device. Sep 30 23:04:03 localhost kernel: ata1: found unknown device (class 0) Sep 30 23:04:03 localhost kernel: ata1.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Sep 30 23:04:03 localhost kernel: scsi 0:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Sep 30 23:04:03 localhost kernel: scsi 0:0:0:0: Attached scsi generic sg0 type 5 Sep 30 23:04:03 localhost kernel: sr 0:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Sep 30 23:04:03 localhost kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Sep 30 23:04:03 localhost kernel: sr 0:0:0:0: Attached scsi CD-ROM sr0 Sep 30 23:04:03 localhost systemd[1]: Finished dracut initqueue hook. Sep 30 23:04:03 localhost systemd[1]: Reached target Preparation for Remote File Systems. Sep 30 23:04:03 localhost systemd[1]: Reached target Remote Encrypted Volumes. Sep 30 23:04:03 localhost systemd[1]: Reached target Remote File Systems. Sep 30 23:04:03 localhost systemd[1]: Starting dracut pre-mount hook... Sep 30 23:04:03 localhost systemd[1]: Finished dracut pre-mount hook. Sep 30 23:04:03 localhost systemd[1]: Starting File System Check on /dev/disk/by-uuid/d6a81468-b74c-4055-b485-def635ab40f8... Sep 30 23:04:03 localhost systemd-fsck[556]: /usr/sbin/fsck.xfs: XFS file system. Sep 30 23:04:03 localhost systemd[1]: Finished File System Check on /dev/disk/by-uuid/d6a81468-b74c-4055-b485-def635ab40f8. Sep 30 23:04:03 localhost systemd[1]: Mounting /sysroot... Sep 30 23:04:04 localhost kernel: SGI XFS with ACLs, security attributes, scrub, quota, no debug enabled Sep 30 23:04:04 localhost kernel: XFS (vda1): Mounting V5 Filesystem d6a81468-b74c-4055-b485-def635ab40f8 Sep 30 23:04:04 localhost kernel: XFS (vda1): Ending clean mount Sep 30 23:04:04 localhost systemd[1]: Mounted /sysroot. Sep 30 23:04:04 localhost systemd[1]: Reached target Initrd Root File System. Sep 30 23:04:04 localhost systemd[1]: Starting Mountpoints Configured in the Real Root... Sep 30 23:04:04 localhost systemd[1]: initrd-parse-etc.service: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: Finished Mountpoints Configured in the Real Root. Sep 30 23:04:04 localhost systemd[1]: Reached target Initrd File Systems. Sep 30 23:04:04 localhost systemd[1]: Reached target Initrd Default Target. Sep 30 23:04:04 localhost systemd[1]: Starting dracut mount hook... Sep 30 23:04:04 localhost systemd[1]: Finished dracut mount hook. Sep 30 23:04:04 localhost systemd[1]: Starting dracut pre-pivot and cleanup hook... Sep 30 23:04:04 localhost rpc.idmapd[448]: exiting on signal 15 Sep 30 23:04:04 localhost systemd[1]: var-lib-nfs-rpc_pipefs.mount: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: Finished dracut pre-pivot and cleanup hook. Sep 30 23:04:04 localhost systemd[1]: Starting Cleaning Up and Shutting Down Daemons... Sep 30 23:04:04 localhost systemd[1]: Stopped target Network. Sep 30 23:04:04 localhost systemd[1]: Stopped target Remote Encrypted Volumes. Sep 30 23:04:04 localhost systemd[1]: Stopped target Timer Units. Sep 30 23:04:04 localhost systemd[1]: dbus.socket: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: Closed D-Bus System Message Bus Socket. Sep 30 23:04:04 localhost systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: Stopped dracut pre-pivot and cleanup hook. Sep 30 23:04:04 localhost systemd[1]: Stopped target Initrd Default Target. Sep 30 23:04:04 localhost systemd[1]: Stopped target Basic System. Sep 30 23:04:04 localhost systemd[1]: Stopped target Initrd Root Device. Sep 30 23:04:04 localhost systemd[1]: Stopped target Initrd /usr File System. Sep 30 23:04:04 localhost systemd[1]: Stopped target Path Units. Sep 30 23:04:04 localhost systemd[1]: Stopped target Remote File Systems. Sep 30 23:04:04 localhost systemd[1]: Stopped target Preparation for Remote File Systems. Sep 30 23:04:04 localhost systemd[1]: Stopped target Slice Units. Sep 30 23:04:04 localhost systemd[1]: Stopped target Socket Units. Sep 30 23:04:04 localhost systemd[1]: Stopped target System Initialization. Sep 30 23:04:04 localhost systemd[1]: Stopped target Local File Systems. Sep 30 23:04:04 localhost systemd[1]: Stopped target Swaps. Sep 30 23:04:04 localhost systemd[1]: dracut-mount.service: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: Stopped dracut mount hook. Sep 30 23:04:04 localhost systemd[1]: dracut-pre-mount.service: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: Stopped dracut pre-mount hook. Sep 30 23:04:04 localhost systemd[1]: Stopped target Local Encrypted Volumes. Sep 30 23:04:04 localhost systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: Stopped Dispatch Password Requests to Console Directory Watch. Sep 30 23:04:04 localhost systemd[1]: dracut-initqueue.service: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: Stopped dracut initqueue hook. Sep 30 23:04:04 localhost systemd[1]: systemd-sysctl.service: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: Stopped Apply Kernel Variables. Sep 30 23:04:04 localhost systemd[1]: systemd-tmpfiles-setup.service: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: Stopped Create Volatile Files and Directories. Sep 30 23:04:04 localhost systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: Stopped Coldplug All udev Devices. Sep 30 23:04:04 localhost systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: Stopped dracut pre-trigger hook. Sep 30 23:04:04 localhost systemd[1]: Stopping Rule-based Manager for Device Events and Files... Sep 30 23:04:04 localhost systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: Stopped Setup Virtual Console. Sep 30 23:04:04 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup.service.mount: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: initrd-cleanup.service: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: Finished Cleaning Up and Shutting Down Daemons. Sep 30 23:04:04 localhost systemd[1]: systemd-udevd.service: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: Stopped Rule-based Manager for Device Events and Files. Sep 30 23:04:04 localhost systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: Closed udev Control Socket. Sep 30 23:04:04 localhost systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: Closed udev Kernel Socket. Sep 30 23:04:04 localhost systemd[1]: dracut-pre-udev.service: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: Stopped dracut pre-udev hook. Sep 30 23:04:04 localhost systemd[1]: dracut-cmdline.service: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: Stopped dracut cmdline hook. Sep 30 23:04:04 localhost systemd[1]: Starting Cleanup udev Database... Sep 30 23:04:04 localhost systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: Stopped Create Static Device Nodes in /dev. Sep 30 23:04:04 localhost systemd[1]: kmod-static-nodes.service: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: Stopped Create List of Static Device Nodes. Sep 30 23:04:04 localhost systemd[1]: systemd-sysusers.service: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: Stopped Create System Users. Sep 30 23:04:04 localhost systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: run-credentials-systemd\x2dsysusers.service.mount: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Sep 30 23:04:04 localhost systemd[1]: Finished Cleanup udev Database. Sep 30 23:04:04 localhost systemd[1]: Reached target Switch Root. Sep 30 23:04:04 localhost systemd[1]: Starting Switch Root... Sep 30 23:04:04 localhost systemd[1]: Switching root. Sep 30 23:04:04 localhost systemd-journald[306]: Journal stopped Sep 30 23:04:06 localhost systemd-journald[306]: Received SIGTERM from PID 1 (systemd). Sep 30 23:04:06 localhost kernel: audit: type=1404 audit(1759287845.126:2): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Sep 30 23:04:06 localhost kernel: SELinux: policy capability network_peer_controls=1 Sep 30 23:04:06 localhost kernel: SELinux: policy capability open_perms=1 Sep 30 23:04:06 localhost kernel: SELinux: policy capability extended_socket_class=1 Sep 30 23:04:06 localhost kernel: SELinux: policy capability always_check_network=0 Sep 30 23:04:06 localhost kernel: SELinux: policy capability cgroup_seclabel=1 Sep 30 23:04:06 localhost kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 30 23:04:06 localhost kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Sep 30 23:04:06 localhost kernel: audit: type=1403 audit(1759287845.299:3): auid=4294967295 ses=4294967295 lsm=selinux res=1 Sep 30 23:04:06 localhost systemd[1]: Successfully loaded SELinux policy in 176.690ms. Sep 30 23:04:06 localhost systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 26.199ms. Sep 30 23:04:06 localhost systemd[1]: systemd 252-55.el9 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN -IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY +P11KIT -QRENCODE +TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Sep 30 23:04:06 localhost systemd[1]: Detected virtualization kvm. Sep 30 23:04:06 localhost systemd[1]: Detected architecture x86-64. Sep 30 23:04:06 localhost systemd-rc-local-generator[638]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:04:06 localhost systemd[1]: initrd-switch-root.service: Deactivated successfully. Sep 30 23:04:06 localhost systemd[1]: Stopped Switch Root. Sep 30 23:04:06 localhost systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Sep 30 23:04:06 localhost systemd[1]: Created slice Slice /system/getty. Sep 30 23:04:06 localhost systemd[1]: Created slice Slice /system/serial-getty. Sep 30 23:04:06 localhost systemd[1]: Created slice Slice /system/sshd-keygen. Sep 30 23:04:06 localhost systemd[1]: Created slice User and Session Slice. Sep 30 23:04:06 localhost systemd[1]: Started Dispatch Password Requests to Console Directory Watch. Sep 30 23:04:06 localhost systemd[1]: Started Forward Password Requests to Wall Directory Watch. Sep 30 23:04:06 localhost systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point. Sep 30 23:04:06 localhost systemd[1]: Reached target Local Encrypted Volumes. Sep 30 23:04:06 localhost systemd[1]: Stopped target Switch Root. Sep 30 23:04:06 localhost systemd[1]: Stopped target Initrd File Systems. Sep 30 23:04:06 localhost systemd[1]: Stopped target Initrd Root File System. Sep 30 23:04:06 localhost systemd[1]: Reached target Local Integrity Protected Volumes. Sep 30 23:04:06 localhost systemd[1]: Reached target Path Units. Sep 30 23:04:06 localhost systemd[1]: Reached target rpc_pipefs.target. Sep 30 23:04:06 localhost systemd[1]: Reached target Slice Units. Sep 30 23:04:06 localhost systemd[1]: Reached target Swaps. Sep 30 23:04:06 localhost systemd[1]: Reached target Local Verity Protected Volumes. Sep 30 23:04:06 localhost systemd[1]: Listening on RPCbind Server Activation Socket. Sep 30 23:04:06 localhost systemd[1]: Reached target RPC Port Mapper. Sep 30 23:04:06 localhost systemd[1]: Listening on Process Core Dump Socket. Sep 30 23:04:06 localhost systemd[1]: Listening on initctl Compatibility Named Pipe. Sep 30 23:04:06 localhost systemd[1]: Listening on udev Control Socket. Sep 30 23:04:06 localhost systemd[1]: Listening on udev Kernel Socket. Sep 30 23:04:06 localhost systemd[1]: Mounting Huge Pages File System... Sep 30 23:04:06 localhost systemd[1]: Mounting POSIX Message Queue File System... Sep 30 23:04:06 localhost systemd[1]: Mounting Kernel Debug File System... Sep 30 23:04:06 localhost systemd[1]: Mounting Kernel Trace File System... Sep 30 23:04:06 localhost systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Sep 30 23:04:06 localhost systemd[1]: Starting Create List of Static Device Nodes... Sep 30 23:04:06 localhost systemd[1]: Starting Load Kernel Module configfs... Sep 30 23:04:06 localhost systemd[1]: Starting Load Kernel Module drm... Sep 30 23:04:06 localhost systemd[1]: Starting Load Kernel Module efi_pstore... Sep 30 23:04:06 localhost systemd[1]: Starting Load Kernel Module fuse... Sep 30 23:04:06 localhost systemd[1]: Starting Read and set NIS domainname from /etc/sysconfig/network... Sep 30 23:04:06 localhost systemd[1]: systemd-fsck-root.service: Deactivated successfully. Sep 30 23:04:06 localhost systemd[1]: Stopped File System Check on Root Device. Sep 30 23:04:06 localhost systemd[1]: Stopped Journal Service. Sep 30 23:04:06 localhost kernel: fuse: init (API version 7.37) Sep 30 23:04:06 localhost systemd[1]: Starting Journal Service... Sep 30 23:04:06 localhost systemd[1]: Load Kernel Modules was skipped because no trigger condition checks were met. Sep 30 23:04:06 localhost systemd[1]: Starting Generate network units from Kernel command line... Sep 30 23:04:06 localhost systemd[1]: TPM2 PCR Machine ID Measurement was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 30 23:04:06 localhost systemd[1]: Starting Remount Root and Kernel File Systems... Sep 30 23:04:06 localhost systemd[1]: Repartition Root Disk was skipped because no trigger condition checks were met. Sep 30 23:04:06 localhost systemd[1]: Starting Apply Kernel Variables... Sep 30 23:04:06 localhost kernel: ACPI: bus type drm_connector registered Sep 30 23:04:06 localhost systemd[1]: Starting Coldplug All udev Devices... Sep 30 23:04:06 localhost kernel: xfs filesystem being remounted at / supports timestamps until 2038 (0x7fffffff) Sep 30 23:04:06 localhost systemd-journald[679]: Journal started Sep 30 23:04:06 localhost systemd-journald[679]: Runtime Journal (/run/log/journal/21983c68f36a73745cc172a394ebc51d) is 8.0M, max 153.5M, 145.5M free. Sep 30 23:04:05 localhost systemd[1]: Queued start job for default target Multi-User System. Sep 30 23:04:05 localhost systemd[1]: systemd-journald.service: Deactivated successfully. Sep 30 23:04:06 localhost systemd[1]: Started Journal Service. Sep 30 23:04:06 localhost systemd[1]: Mounted Huge Pages File System. Sep 30 23:04:06 localhost systemd[1]: Mounted POSIX Message Queue File System. Sep 30 23:04:06 localhost systemd[1]: Mounted Kernel Debug File System. Sep 30 23:04:06 localhost systemd[1]: Mounted Kernel Trace File System. Sep 30 23:04:06 localhost systemd[1]: Finished Create List of Static Device Nodes. Sep 30 23:04:06 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 30 23:04:06 localhost systemd[1]: Finished Load Kernel Module configfs. Sep 30 23:04:06 localhost systemd[1]: modprobe@drm.service: Deactivated successfully. Sep 30 23:04:06 localhost systemd[1]: Finished Load Kernel Module drm. Sep 30 23:04:06 localhost systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Sep 30 23:04:06 localhost systemd[1]: Finished Load Kernel Module efi_pstore. Sep 30 23:04:06 localhost systemd[1]: modprobe@fuse.service: Deactivated successfully. Sep 30 23:04:06 localhost systemd[1]: Finished Load Kernel Module fuse. Sep 30 23:04:06 localhost systemd[1]: Finished Read and set NIS domainname from /etc/sysconfig/network. Sep 30 23:04:06 localhost systemd[1]: Finished Generate network units from Kernel command line. Sep 30 23:04:06 localhost systemd[1]: Finished Remount Root and Kernel File Systems. Sep 30 23:04:06 localhost systemd[1]: Finished Apply Kernel Variables. Sep 30 23:04:06 localhost systemd[1]: Mounting FUSE Control File System... Sep 30 23:04:06 localhost systemd[1]: First Boot Wizard was skipped because of an unmet condition check (ConditionFirstBoot=yes). Sep 30 23:04:06 localhost systemd[1]: Starting Rebuild Hardware Database... Sep 30 23:04:06 localhost systemd[1]: Starting Flush Journal to Persistent Storage... Sep 30 23:04:06 localhost systemd[1]: Platform Persistent Storage Archival was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Sep 30 23:04:06 localhost systemd[1]: Starting Load/Save OS Random Seed... Sep 30 23:04:06 localhost systemd[1]: Starting Create System Users... Sep 30 23:04:06 localhost systemd[1]: Mounted FUSE Control File System. Sep 30 23:04:06 localhost systemd-journald[679]: Runtime Journal (/run/log/journal/21983c68f36a73745cc172a394ebc51d) is 8.0M, max 153.5M, 145.5M free. Sep 30 23:04:06 localhost systemd-journald[679]: Received client request to flush runtime journal. Sep 30 23:04:06 localhost systemd[1]: Finished Flush Journal to Persistent Storage. Sep 30 23:04:06 localhost systemd[1]: Finished Load/Save OS Random Seed. Sep 30 23:04:06 localhost systemd[1]: First Boot Complete was skipped because of an unmet condition check (ConditionFirstBoot=yes). Sep 30 23:04:06 localhost systemd[1]: Finished Create System Users. Sep 30 23:04:06 localhost systemd[1]: Starting Create Static Device Nodes in /dev... Sep 30 23:04:06 localhost systemd[1]: Finished Coldplug All udev Devices. Sep 30 23:04:06 localhost systemd[1]: Finished Create Static Device Nodes in /dev. Sep 30 23:04:06 localhost systemd[1]: Reached target Preparation for Local File Systems. Sep 30 23:04:06 localhost systemd[1]: Reached target Local File Systems. Sep 30 23:04:06 localhost systemd[1]: Starting Rebuild Dynamic Linker Cache... Sep 30 23:04:06 localhost systemd[1]: Mark the need to relabel after reboot was skipped because of an unmet condition check (ConditionSecurity=!selinux). Sep 30 23:04:06 localhost systemd[1]: Set Up Additional Binary Formats was skipped because no trigger condition checks were met. Sep 30 23:04:06 localhost systemd[1]: Update Boot Loader Random Seed was skipped because no trigger condition checks were met. Sep 30 23:04:06 localhost systemd[1]: Starting Automatic Boot Loader Update... Sep 30 23:04:06 localhost systemd[1]: Commit a transient machine-id on disk was skipped because of an unmet condition check (ConditionPathIsMountPoint=/etc/machine-id). Sep 30 23:04:06 localhost systemd[1]: Starting Create Volatile Files and Directories... Sep 30 23:04:06 localhost bootctl[697]: Couldn't find EFI system partition, skipping. Sep 30 23:04:06 localhost systemd[1]: Finished Automatic Boot Loader Update. Sep 30 23:04:06 localhost systemd[1]: Finished Create Volatile Files and Directories. Sep 30 23:04:06 localhost systemd[1]: Starting Security Auditing Service... Sep 30 23:04:06 localhost systemd[1]: Starting RPC Bind... Sep 30 23:04:06 localhost systemd[1]: Starting Rebuild Journal Catalog... Sep 30 23:04:06 localhost auditd[703]: audit dispatcher initialized with q_depth=2000 and 1 active plugins Sep 30 23:04:06 localhost auditd[703]: Init complete, auditd 3.1.5 listening for events (startup state enable) Sep 30 23:04:06 localhost systemd[1]: Started RPC Bind. Sep 30 23:04:06 localhost systemd[1]: Finished Rebuild Journal Catalog. Sep 30 23:04:06 localhost augenrules[708]: /sbin/augenrules: No change Sep 30 23:04:06 localhost augenrules[723]: No rules Sep 30 23:04:06 localhost augenrules[723]: enabled 1 Sep 30 23:04:06 localhost augenrules[723]: failure 1 Sep 30 23:04:06 localhost augenrules[723]: pid 703 Sep 30 23:04:06 localhost augenrules[723]: rate_limit 0 Sep 30 23:04:06 localhost augenrules[723]: backlog_limit 8192 Sep 30 23:04:06 localhost augenrules[723]: lost 0 Sep 30 23:04:06 localhost augenrules[723]: backlog 2 Sep 30 23:04:06 localhost augenrules[723]: backlog_wait_time 60000 Sep 30 23:04:06 localhost augenrules[723]: backlog_wait_time_actual 0 Sep 30 23:04:06 localhost augenrules[723]: enabled 1 Sep 30 23:04:06 localhost augenrules[723]: failure 1 Sep 30 23:04:06 localhost augenrules[723]: pid 703 Sep 30 23:04:06 localhost augenrules[723]: rate_limit 0 Sep 30 23:04:06 localhost augenrules[723]: backlog_limit 8192 Sep 30 23:04:06 localhost augenrules[723]: lost 0 Sep 30 23:04:06 localhost augenrules[723]: backlog 1 Sep 30 23:04:06 localhost augenrules[723]: backlog_wait_time 60000 Sep 30 23:04:06 localhost augenrules[723]: backlog_wait_time_actual 0 Sep 30 23:04:06 localhost augenrules[723]: enabled 1 Sep 30 23:04:06 localhost augenrules[723]: failure 1 Sep 30 23:04:06 localhost augenrules[723]: pid 703 Sep 30 23:04:06 localhost augenrules[723]: rate_limit 0 Sep 30 23:04:06 localhost augenrules[723]: backlog_limit 8192 Sep 30 23:04:06 localhost augenrules[723]: lost 0 Sep 30 23:04:06 localhost augenrules[723]: backlog 0 Sep 30 23:04:06 localhost augenrules[723]: backlog_wait_time 60000 Sep 30 23:04:06 localhost augenrules[723]: backlog_wait_time_actual 0 Sep 30 23:04:06 localhost systemd[1]: Started Security Auditing Service. Sep 30 23:04:06 localhost systemd[1]: Starting Record System Boot/Shutdown in UTMP... Sep 30 23:04:06 localhost systemd[1]: Finished Record System Boot/Shutdown in UTMP. Sep 30 23:04:06 localhost systemd[1]: Finished Rebuild Dynamic Linker Cache. Sep 30 23:04:06 localhost systemd[1]: Finished Rebuild Hardware Database. Sep 30 23:04:06 localhost systemd[1]: Starting Rule-based Manager for Device Events and Files... Sep 30 23:04:06 localhost systemd[1]: Starting Update is Completed... Sep 30 23:04:06 localhost systemd[1]: Finished Update is Completed. Sep 30 23:04:06 localhost systemd-udevd[731]: Using default interface naming scheme 'rhel-9.0'. Sep 30 23:04:06 localhost systemd[1]: Started Rule-based Manager for Device Events and Files. Sep 30 23:04:06 localhost systemd[1]: Reached target System Initialization. Sep 30 23:04:06 localhost systemd[1]: Started dnf makecache --timer. Sep 30 23:04:06 localhost systemd[1]: Started Daily rotation of log files. Sep 30 23:04:06 localhost systemd[1]: Started Daily Cleanup of Temporary Directories. Sep 30 23:04:06 localhost systemd[1]: Reached target Timer Units. Sep 30 23:04:06 localhost systemd[1]: Listening on D-Bus System Message Bus Socket. Sep 30 23:04:06 localhost systemd[1]: Listening on SSSD Kerberos Cache Manager responder socket. Sep 30 23:04:06 localhost systemd[1]: Reached target Socket Units. Sep 30 23:04:06 localhost systemd[1]: Starting D-Bus System Message Bus... Sep 30 23:04:06 localhost systemd[1]: TPM2 PCR Barrier (Initialization) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 30 23:04:06 localhost systemd[1]: Condition check resulted in /dev/ttyS0 being skipped. Sep 30 23:04:06 localhost systemd[1]: Starting Load Kernel Module configfs... Sep 30 23:04:06 localhost systemd-udevd[746]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:04:06 localhost systemd[1]: modprobe@configfs.service: Deactivated successfully. Sep 30 23:04:06 localhost systemd[1]: Finished Load Kernel Module configfs. Sep 30 23:04:07 localhost systemd[1]: Started D-Bus System Message Bus. Sep 30 23:04:07 localhost kernel: input: PC Speaker as /devices/platform/pcspkr/input/input6 Sep 30 23:04:07 localhost systemd[1]: Reached target Basic System. Sep 30 23:04:07 localhost dbus-broker-lau[769]: Ready Sep 30 23:04:07 localhost systemd[1]: Starting NTP client/server... Sep 30 23:04:07 localhost chronyd[781]: chronyd version 4.6.1 starting (+CMDMON +NTP +REFCLOCK +RTC +PRIVDROP +SCFILTER +SIGND +ASYNCDNS +NTS +SECHASH +IPV6 +DEBUG) Sep 30 23:04:07 localhost chronyd[781]: Loaded 0 symmetric keys Sep 30 23:04:07 localhost chronyd[781]: Using right/UTC timezone to obtain leap second data Sep 30 23:04:07 localhost chronyd[781]: Loaded seccomp filter (level 2) Sep 30 23:04:07 localhost systemd[1]: Starting Cloud-init: Local Stage (pre-network)... Sep 30 23:04:07 localhost systemd[1]: Starting Restore /run/initramfs on shutdown... Sep 30 23:04:07 localhost systemd[1]: Starting IPv4 firewall with iptables... Sep 30 23:04:07 localhost systemd[1]: Started irqbalance daemon. Sep 30 23:04:07 localhost systemd[1]: Load CPU microcode update was skipped because of an unmet condition check (ConditionPathExists=/sys/devices/system/cpu/microcode/reload). Sep 30 23:04:07 localhost systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Sep 30 23:04:07 localhost systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Sep 30 23:04:07 localhost systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Sep 30 23:04:07 localhost systemd[1]: Reached target sshd-keygen.target. Sep 30 23:04:07 localhost systemd[1]: System Security Services Daemon was skipped because no trigger condition checks were met. Sep 30 23:04:07 localhost systemd[1]: Reached target User and Group Name Lookups. Sep 30 23:04:07 localhost kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Sep 30 23:04:07 localhost kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Sep 30 23:04:07 localhost kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Sep 30 23:04:07 localhost kernel: kvm_amd: TSC scaling supported Sep 30 23:04:07 localhost kernel: kvm_amd: Nested Virtualization enabled Sep 30 23:04:07 localhost kernel: kvm_amd: Nested Paging enabled Sep 30 23:04:07 localhost kernel: kvm_amd: LBR virtualization supported Sep 30 23:04:07 localhost kernel: [drm] pci: virtio-vga detected at 0000:00:02.0 Sep 30 23:04:07 localhost kernel: virtio-pci 0000:00:02.0: vgaarb: deactivate vga console Sep 30 23:04:07 localhost kernel: Console: switching to colour dummy device 80x25 Sep 30 23:04:07 localhost kernel: [drm] features: -virgl +edid -resource_blob -host_visible Sep 30 23:04:07 localhost kernel: [drm] features: -context_init Sep 30 23:04:07 localhost kernel: [drm] number of scanouts: 1 Sep 30 23:04:07 localhost kernel: [drm] number of cap sets: 0 Sep 30 23:04:07 localhost kernel: [drm] Initialized virtio_gpu 0.1.0 for 0000:00:02.0 on minor 0 Sep 30 23:04:07 localhost kernel: fbcon: virtio_gpudrmfb (fb0) is primary device Sep 30 23:04:07 localhost kernel: Console: switching to colour frame buffer device 128x48 Sep 30 23:04:07 localhost kernel: virtio-pci 0000:00:02.0: [drm] fb0: virtio_gpudrmfb frame buffer device Sep 30 23:04:07 localhost kernel: Warning: Deprecated Driver is detected: nft_compat will not be maintained in a future major release and may be disabled Sep 30 23:04:07 localhost kernel: Warning: Deprecated Driver is detected: nft_compat_module_init will not be maintained in a future major release and may be disabled Sep 30 23:04:07 localhost systemd[1]: Starting User Login Management... Sep 30 23:04:07 localhost systemd[1]: Started NTP client/server. Sep 30 23:04:07 localhost systemd[1]: Finished Restore /run/initramfs on shutdown. Sep 30 23:04:07 localhost systemd-logind[804]: New seat seat0. Sep 30 23:04:07 localhost systemd-logind[804]: Watching system buttons on /dev/input/event0 (Power Button) Sep 30 23:04:07 localhost systemd-logind[804]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Sep 30 23:04:07 localhost systemd[1]: Started User Login Management. Sep 30 23:04:07 localhost iptables.init[790]: iptables: Applying firewall rules: [ OK ] Sep 30 23:04:07 localhost systemd[1]: Finished IPv4 firewall with iptables. Sep 30 23:04:07 localhost cloud-init[840]: Cloud-init v. 24.4-7.el9 running 'init-local' at Wed, 01 Oct 2025 03:04:07 +0000. Up 7.55 seconds. Sep 30 23:04:08 localhost kernel: ISO 9660 Extensions: Microsoft Joliet Level 3 Sep 30 23:04:08 localhost kernel: ISO 9660 Extensions: RRIP_1991A Sep 30 23:04:08 localhost systemd[1]: run-cloud\x2dinit-tmp-tmpn11hqc4u.mount: Deactivated successfully. Sep 30 23:04:08 localhost systemd[1]: Starting Hostname Service... Sep 30 23:04:08 localhost systemd[1]: Started Hostname Service. Sep 30 23:04:08 np0005463759.novalocal systemd-hostnamed[854]: Hostname set to (static) Sep 30 23:04:08 np0005463759.novalocal systemd[1]: Finished Cloud-init: Local Stage (pre-network). Sep 30 23:04:08 np0005463759.novalocal systemd[1]: Reached target Preparation for Network. Sep 30 23:04:08 np0005463759.novalocal systemd[1]: Starting Network Manager... Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5112] NetworkManager (version 1.54.1-1.el9) is starting... (boot:0a2d7a4a-5121-442b-862c-51e86e62c3ee) Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5117] Read config: /etc/NetworkManager/NetworkManager.conf, /run/NetworkManager/conf.d/15-carrier-timeout.conf Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5254] manager[0x5605ae0db080]: monitoring kernel firmware directory '/lib/firmware'. Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5305] hostname: hostname: using hostnamed Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5306] hostname: static hostname changed from (none) to "np0005463759.novalocal" Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5310] dns-mgr: init: dns=default,systemd-resolved rc-manager=symlink (auto) Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5441] manager[0x5605ae0db080]: rfkill: Wi-Fi hardware radio set enabled Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5441] manager[0x5605ae0db080]: rfkill: WWAN hardware radio set enabled Sep 30 23:04:08 np0005463759.novalocal systemd[1]: Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5560] Loaded device plugin: NMTeamFactory (/usr/lib64/NetworkManager/1.54.1-1.el9/libnm-device-plugin-team.so) Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5561] manager: rfkill: Wi-Fi enabled by radio killswitch; enabled by state file Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5562] manager: rfkill: WWAN enabled by radio killswitch; enabled by state file Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5563] manager: Networking is enabled by state file Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5567] settings: Loaded settings plugin: keyfile (internal) Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5605] settings: Loaded settings plugin: ifcfg-rh ("/usr/lib64/NetworkManager/1.54.1-1.el9/libnm-settings-plugin-ifcfg-rh.so") Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5640] Warning: the ifcfg-rh plugin is deprecated, please migrate connections to the keyfile format using "nmcli connection migrate" Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5687] dhcp: init: Using DHCP client 'internal' Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5692] manager: (lo): new Loopback device (/org/freedesktop/NetworkManager/Devices/1) Sep 30 23:04:08 np0005463759.novalocal systemd[1]: Starting Network Manager Script Dispatcher Service... Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5713] device (lo): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5747] device (lo): state change: unavailable -> disconnected (reason 'connection-assumed', managed-type: 'external') Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5759] device (lo): Activation: starting connection 'lo' (5f9ecef7-97b0-4c29-84c0-a5b0ceb7a871) Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5774] manager: (eth0): new Ethernet device (/org/freedesktop/NetworkManager/Devices/2) Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5779] device (eth0): state change: unmanaged -> unavailable (reason 'managed', managed-type: 'external') Sep 30 23:04:08 np0005463759.novalocal systemd[1]: Started Network Manager. Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5815] bus-manager: acquired D-Bus service "org.freedesktop.NetworkManager" Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5821] device (lo): state change: disconnected -> prepare (reason 'none', managed-type: 'external') Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5826] device (lo): state change: prepare -> config (reason 'none', managed-type: 'external') Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5829] device (lo): state change: config -> ip-config (reason 'none', managed-type: 'external') Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5833] device (eth0): carrier: link connected Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5838] device (lo): state change: ip-config -> ip-check (reason 'none', managed-type: 'external') Sep 30 23:04:08 np0005463759.novalocal systemd[1]: Reached target Network. Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5847] device (eth0): state change: unavailable -> disconnected (reason 'carrier-changed', managed-type: 'full') Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5859] policy: auto-activating connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5866] device (eth0): Activation: starting connection 'System eth0' (5fb06bd0-0bb0-7ffb-45f1-d6edd65f3e03) Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5867] device (eth0): state change: disconnected -> prepare (reason 'none', managed-type: 'full') Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5871] manager: NetworkManager state is now CONNECTING Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5873] device (eth0): state change: prepare -> config (reason 'none', managed-type: 'full') Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5882] device (eth0): state change: config -> ip-config (reason 'none', managed-type: 'full') Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5886] dhcp4 (eth0): activation: beginning transaction (timeout in 45 seconds) Sep 30 23:04:08 np0005463759.novalocal systemd[1]: Starting Network Manager Wait Online... Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5930] dhcp4 (eth0): state changed new lease, address=38.102.83.151 Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5941] policy: set 'System eth0' (eth0) as default for IPv4 routing and DNS Sep 30 23:04:08 np0005463759.novalocal systemd[1]: Starting GSSAPI Proxy Daemon... Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5971] device (eth0): state change: ip-config -> ip-check (reason 'none', managed-type: 'full') Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5982] device (lo): state change: ip-check -> secondaries (reason 'none', managed-type: 'external') Sep 30 23:04:08 np0005463759.novalocal systemd[1]: Started Network Manager Script Dispatcher Service. Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5985] device (lo): state change: secondaries -> activated (reason 'none', managed-type: 'external') Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.5994] device (lo): Activation: successful, device activated. Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.6019] device (eth0): state change: ip-check -> secondaries (reason 'none', managed-type: 'full') Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.6021] device (eth0): state change: secondaries -> activated (reason 'none', managed-type: 'full') Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.6028] manager: NetworkManager state is now CONNECTED_SITE Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.6033] device (eth0): Activation: successful, device activated. Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.6041] manager: NetworkManager state is now CONNECTED_GLOBAL Sep 30 23:04:08 np0005463759.novalocal NetworkManager[858]: [1759287848.6046] manager: startup complete Sep 30 23:04:08 np0005463759.novalocal systemd[1]: Started GSSAPI Proxy Daemon. Sep 30 23:04:08 np0005463759.novalocal systemd[1]: Finished Network Manager Wait Online. Sep 30 23:04:08 np0005463759.novalocal systemd[1]: Starting Cloud-init: Network Stage... Sep 30 23:04:08 np0005463759.novalocal systemd[1]: RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Sep 30 23:04:08 np0005463759.novalocal systemd[1]: Reached target NFS client services. Sep 30 23:04:08 np0005463759.novalocal systemd[1]: Reached target Preparation for Remote File Systems. Sep 30 23:04:08 np0005463759.novalocal systemd[1]: Reached target Remote File Systems. Sep 30 23:04:08 np0005463759.novalocal systemd[1]: TPM2 PCR Barrier (User) was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Sep 30 23:04:08 np0005463759.novalocal cloud-init[922]: Cloud-init v. 24.4-7.el9 running 'init' at Wed, 01 Oct 2025 03:04:08 +0000. Up 8.66 seconds. Sep 30 23:04:08 np0005463759.novalocal cloud-init[922]: ci-info: +++++++++++++++++++++++++++++++++++++++Net device info+++++++++++++++++++++++++++++++++++++++ Sep 30 23:04:08 np0005463759.novalocal cloud-init[922]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Sep 30 23:04:08 np0005463759.novalocal cloud-init[922]: ci-info: | Device | Up | Address | Mask | Scope | Hw-Address | Sep 30 23:04:08 np0005463759.novalocal cloud-init[922]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Sep 30 23:04:08 np0005463759.novalocal cloud-init[922]: ci-info: | eth0 | True | 38.102.83.151 | 255.255.255.0 | global | fa:16:3e:bd:12:1a | Sep 30 23:04:08 np0005463759.novalocal cloud-init[922]: ci-info: | eth0 | True | fe80::f816:3eff:febd:121a/64 | . | link | fa:16:3e:bd:12:1a | Sep 30 23:04:08 np0005463759.novalocal cloud-init[922]: ci-info: | lo | True | 127.0.0.1 | 255.0.0.0 | host | . | Sep 30 23:04:08 np0005463759.novalocal cloud-init[922]: ci-info: | lo | True | ::1/128 | . | host | . | Sep 30 23:04:08 np0005463759.novalocal cloud-init[922]: ci-info: +--------+------+------------------------------+---------------+--------+-------------------+ Sep 30 23:04:08 np0005463759.novalocal cloud-init[922]: ci-info: +++++++++++++++++++++++++++++++++Route IPv4 info+++++++++++++++++++++++++++++++++ Sep 30 23:04:08 np0005463759.novalocal cloud-init[922]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Sep 30 23:04:08 np0005463759.novalocal cloud-init[922]: ci-info: | Route | Destination | Gateway | Genmask | Interface | Flags | Sep 30 23:04:08 np0005463759.novalocal cloud-init[922]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Sep 30 23:04:08 np0005463759.novalocal cloud-init[922]: ci-info: | 0 | 0.0.0.0 | 38.102.83.1 | 0.0.0.0 | eth0 | UG | Sep 30 23:04:08 np0005463759.novalocal cloud-init[922]: ci-info: | 1 | 38.102.83.0 | 0.0.0.0 | 255.255.255.0 | eth0 | U | Sep 30 23:04:08 np0005463759.novalocal cloud-init[922]: ci-info: | 2 | 169.254.169.254 | 38.102.83.126 | 255.255.255.255 | eth0 | UGH | Sep 30 23:04:08 np0005463759.novalocal cloud-init[922]: ci-info: +-------+-----------------+---------------+-----------------+-----------+-------+ Sep 30 23:04:08 np0005463759.novalocal cloud-init[922]: ci-info: +++++++++++++++++++Route IPv6 info+++++++++++++++++++ Sep 30 23:04:08 np0005463759.novalocal cloud-init[922]: ci-info: +-------+-------------+---------+-----------+-------+ Sep 30 23:04:08 np0005463759.novalocal cloud-init[922]: ci-info: | Route | Destination | Gateway | Interface | Flags | Sep 30 23:04:08 np0005463759.novalocal cloud-init[922]: ci-info: +-------+-------------+---------+-----------+-------+ Sep 30 23:04:08 np0005463759.novalocal cloud-init[922]: ci-info: | 1 | fe80::/64 | :: | eth0 | U | Sep 30 23:04:08 np0005463759.novalocal cloud-init[922]: ci-info: | 3 | multicast | :: | eth0 | U | Sep 30 23:04:09 np0005463759.novalocal cloud-init[922]: ci-info: +-------+-------------+---------+-----------+-------+ Sep 30 23:04:09 np0005463759.novalocal useradd[988]: new group: name=cloud-user, GID=1001 Sep 30 23:04:09 np0005463759.novalocal useradd[988]: new user: name=cloud-user, UID=1001, GID=1001, home=/home/cloud-user, shell=/bin/bash, from=none Sep 30 23:04:09 np0005463759.novalocal useradd[988]: add 'cloud-user' to group 'adm' Sep 30 23:04:09 np0005463759.novalocal useradd[988]: add 'cloud-user' to group 'systemd-journal' Sep 30 23:04:09 np0005463759.novalocal useradd[988]: add 'cloud-user' to shadow group 'adm' Sep 30 23:04:09 np0005463759.novalocal useradd[988]: add 'cloud-user' to shadow group 'systemd-journal' Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: Generating public/private rsa key pair. Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: Your identification has been saved in /etc/ssh/ssh_host_rsa_key Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: The key fingerprint is: Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: SHA256:vSpV/fO3RHa6Lu/qtSOK5aa4pc6baCakswrIrN6LV/c root@np0005463759.novalocal Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: The key's randomart image is: Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: +---[RSA 3072]----+ Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: | | Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: | | Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: | . | Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: | .. . | Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: | S.. . o.| Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: |+ . . .. . =..| Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: |o= . ..o o o+ | Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: |= +.oo.= E. o.ooo| Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: |*=.*o.O++ooooB*oo| Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: +----[SHA256]-----+ Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: Generating public/private ecdsa key pair. Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: The key fingerprint is: Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: SHA256:Gg1I2/tLNFDI1LCbtPA0w1PIOd1sklE5zaDZ8ea8qAM root@np0005463759.novalocal Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: The key's randomart image is: Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: +---[ECDSA 256]---+ Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: | .+oB+*+= | Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: | . =B+=+*oo | Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: | + %.oo..o | Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: | = % + | Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: | B S o | Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: | E= . . . | Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: | ..o . . | Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: | ..o | Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: | o. | Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: +----[SHA256]-----+ Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: Generating public/private ed25519 key pair. Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: Your identification has been saved in /etc/ssh/ssh_host_ed25519_key Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: Your public key has been saved in /etc/ssh/ssh_host_ed25519_key.pub Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: The key fingerprint is: Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: SHA256:/IJWUj7pAwFGYxkxfQ8q0X/yzSQRdtf5MFOnfnwzqug root@np0005463759.novalocal Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: The key's randomart image is: Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: +--[ED25519 256]--+ Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: | .X* o.. .o+| Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: | oo+o o... .+oo| Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: | ..+.o . .+.| Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: | . .=o.+ .. ..| Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: | .o S+ = .o+| Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: | * o. o ..+| Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: | o + . . | Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: | . o. . | Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: | .E . | Sep 30 23:04:10 np0005463759.novalocal cloud-init[922]: +----[SHA256]-----+ Sep 30 23:04:10 np0005463759.novalocal sm-notify[1003]: Version 2.5.4 starting Sep 30 23:04:10 np0005463759.novalocal systemd[1]: Finished Cloud-init: Network Stage. Sep 30 23:04:10 np0005463759.novalocal sshd[1005]: Server listening on 0.0.0.0 port 22. Sep 30 23:04:10 np0005463759.novalocal systemd[1]: Reached target Cloud-config availability. Sep 30 23:04:10 np0005463759.novalocal sshd[1005]: Server listening on :: port 22. Sep 30 23:04:10 np0005463759.novalocal systemd[1]: Reached target Network is Online. Sep 30 23:04:10 np0005463759.novalocal systemd[1]: Starting Cloud-init: Config Stage... Sep 30 23:04:10 np0005463759.novalocal systemd[1]: Starting Notify NFS peers of a restart... Sep 30 23:04:10 np0005463759.novalocal systemd[1]: Starting System Logging Service... Sep 30 23:04:10 np0005463759.novalocal systemd[1]: Starting OpenSSH server daemon... Sep 30 23:04:10 np0005463759.novalocal systemd[1]: Starting Permit User Sessions... Sep 30 23:04:10 np0005463759.novalocal systemd[1]: Started Notify NFS peers of a restart. Sep 30 23:04:10 np0005463759.novalocal systemd[1]: Started OpenSSH server daemon. Sep 30 23:04:10 np0005463759.novalocal systemd[1]: Finished Permit User Sessions. Sep 30 23:04:10 np0005463759.novalocal systemd[1]: Started Command Scheduler. Sep 30 23:04:10 np0005463759.novalocal systemd[1]: Started Getty on tty1. Sep 30 23:04:10 np0005463759.novalocal crond[1007]: (CRON) STARTUP (1.5.7) Sep 30 23:04:10 np0005463759.novalocal crond[1007]: (CRON) INFO (Syslog will be used instead of sendmail.) Sep 30 23:04:10 np0005463759.novalocal crond[1007]: (CRON) INFO (RANDOM_DELAY will be scaled with factor 17% if used.) Sep 30 23:04:10 np0005463759.novalocal crond[1007]: (CRON) INFO (running with inotify support) Sep 30 23:04:10 np0005463759.novalocal systemd[1]: Started Serial Getty on ttyS0. Sep 30 23:04:10 np0005463759.novalocal systemd[1]: Reached target Login Prompts. Sep 30 23:04:10 np0005463759.novalocal rsyslogd[1004]: [origin software="rsyslogd" swVersion="8.2506.0-2.el9" x-pid="1004" x-info="https://www.rsyslog.com"] start Sep 30 23:04:10 np0005463759.novalocal rsyslogd[1004]: imjournal: No statefile exists, /var/lib/rsyslog/imjournal.state will be created (ignore if this is first run): No such file or directory [v8.2506.0-2.el9 try https://www.rsyslog.com/e/2040 ] Sep 30 23:04:10 np0005463759.novalocal systemd[1]: Started System Logging Service. Sep 30 23:04:10 np0005463759.novalocal systemd[1]: Reached target Multi-User System. Sep 30 23:04:10 np0005463759.novalocal systemd[1]: Starting Record Runlevel Change in UTMP... Sep 30 23:04:10 np0005463759.novalocal systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Sep 30 23:04:10 np0005463759.novalocal systemd[1]: Finished Record Runlevel Change in UTMP. Sep 30 23:04:10 np0005463759.novalocal rsyslogd[1004]: imjournal: journal files changed, reloading... [v8.2506.0-2.el9 try https://www.rsyslog.com/e/0 ] Sep 30 23:04:10 np0005463759.novalocal cloud-init[1016]: Cloud-init v. 24.4-7.el9 running 'modules:config' at Wed, 01 Oct 2025 03:04:10 +0000. Up 10.23 seconds. Sep 30 23:04:10 np0005463759.novalocal systemd[1]: Finished Cloud-init: Config Stage. Sep 30 23:04:10 np0005463759.novalocal systemd[1]: Starting Cloud-init: Final Stage... Sep 30 23:04:10 np0005463759.novalocal sshd-session[1018]: Connection closed by 38.102.83.114 port 39388 [preauth] Sep 30 23:04:10 np0005463759.novalocal sshd-session[1020]: Unable to negotiate with 38.102.83.114 port 39392: no matching host key type found. Their offer: ssh-ed25519,ssh-ed25519-cert-v01@openssh.com [preauth] Sep 30 23:04:10 np0005463759.novalocal sshd-session[1022]: Connection reset by 38.102.83.114 port 39400 [preauth] Sep 30 23:04:10 np0005463759.novalocal sshd-session[1024]: Unable to negotiate with 38.102.83.114 port 39402: no matching host key type found. Their offer: ecdsa-sha2-nistp384,ecdsa-sha2-nistp384-cert-v01@openssh.com [preauth] Sep 30 23:04:10 np0005463759.novalocal sshd-session[1026]: Unable to negotiate with 38.102.83.114 port 39410: no matching host key type found. Their offer: ecdsa-sha2-nistp521,ecdsa-sha2-nistp521-cert-v01@openssh.com [preauth] Sep 30 23:04:10 np0005463759.novalocal sshd-session[1034]: Unable to negotiate with 38.102.83.114 port 39442: no matching host key type found. Their offer: ssh-rsa,ssh-rsa-cert-v01@openssh.com [preauth] Sep 30 23:04:10 np0005463759.novalocal cloud-init[1035]: Cloud-init v. 24.4-7.el9 running 'modules:final' at Wed, 01 Oct 2025 03:04:10 +0000. Up 10.58 seconds. Sep 30 23:04:10 np0005463759.novalocal sshd-session[1037]: Unable to negotiate with 38.102.83.114 port 39456: no matching host key type found. Their offer: ssh-dss,ssh-dss-cert-v01@openssh.com [preauth] Sep 30 23:04:10 np0005463759.novalocal sshd-session[1029]: Connection closed by 38.102.83.114 port 39420 [preauth] Sep 30 23:04:10 np0005463759.novalocal cloud-init[1040]: ############################################################# Sep 30 23:04:10 np0005463759.novalocal cloud-init[1041]: -----BEGIN SSH HOST KEY FINGERPRINTS----- Sep 30 23:04:10 np0005463759.novalocal cloud-init[1043]: 256 SHA256:Gg1I2/tLNFDI1LCbtPA0w1PIOd1sklE5zaDZ8ea8qAM root@np0005463759.novalocal (ECDSA) Sep 30 23:04:10 np0005463759.novalocal sshd-session[1032]: Connection closed by 38.102.83.114 port 39434 [preauth] Sep 30 23:04:10 np0005463759.novalocal cloud-init[1045]: 256 SHA256:/IJWUj7pAwFGYxkxfQ8q0X/yzSQRdtf5MFOnfnwzqug root@np0005463759.novalocal (ED25519) Sep 30 23:04:10 np0005463759.novalocal cloud-init[1047]: 3072 SHA256:vSpV/fO3RHa6Lu/qtSOK5aa4pc6baCakswrIrN6LV/c root@np0005463759.novalocal (RSA) Sep 30 23:04:10 np0005463759.novalocal cloud-init[1048]: -----END SSH HOST KEY FINGERPRINTS----- Sep 30 23:04:10 np0005463759.novalocal cloud-init[1049]: ############################################################# Sep 30 23:04:11 np0005463759.novalocal cloud-init[1035]: Cloud-init v. 24.4-7.el9 finished at Wed, 01 Oct 2025 03:04:11 +0000. Datasource DataSourceConfigDrive [net,ver=2][source=/dev/sr0]. Up 10.77 seconds Sep 30 23:04:11 np0005463759.novalocal systemd[1]: Finished Cloud-init: Final Stage. Sep 30 23:04:11 np0005463759.novalocal systemd[1]: Reached target Cloud-init target. Sep 30 23:04:11 np0005463759.novalocal systemd[1]: Startup finished in 1.780s (kernel) + 3.070s (initrd) + 5.988s (userspace) = 10.839s. Sep 30 23:04:13 np0005463759.novalocal chronyd[781]: Selected source 167.160.187.179 (2.centos.pool.ntp.org) Sep 30 23:04:13 np0005463759.novalocal chronyd[781]: System clock TAI offset set to 37 seconds Sep 30 23:04:17 np0005463759.novalocal irqbalance[792]: Cannot change IRQ 25 affinity: Operation not permitted Sep 30 23:04:17 np0005463759.novalocal irqbalance[792]: IRQ 25 affinity is now unmanaged Sep 30 23:04:17 np0005463759.novalocal irqbalance[792]: Cannot change IRQ 31 affinity: Operation not permitted Sep 30 23:04:17 np0005463759.novalocal irqbalance[792]: IRQ 31 affinity is now unmanaged Sep 30 23:04:17 np0005463759.novalocal irqbalance[792]: Cannot change IRQ 28 affinity: Operation not permitted Sep 30 23:04:17 np0005463759.novalocal irqbalance[792]: IRQ 28 affinity is now unmanaged Sep 30 23:04:17 np0005463759.novalocal irqbalance[792]: Cannot change IRQ 32 affinity: Operation not permitted Sep 30 23:04:17 np0005463759.novalocal irqbalance[792]: IRQ 32 affinity is now unmanaged Sep 30 23:04:17 np0005463759.novalocal irqbalance[792]: Cannot change IRQ 30 affinity: Operation not permitted Sep 30 23:04:17 np0005463759.novalocal irqbalance[792]: IRQ 30 affinity is now unmanaged Sep 30 23:04:17 np0005463759.novalocal irqbalance[792]: Cannot change IRQ 29 affinity: Operation not permitted Sep 30 23:04:17 np0005463759.novalocal irqbalance[792]: IRQ 29 affinity is now unmanaged Sep 30 23:04:18 np0005463759.novalocal sshd-session[1053]: Accepted publickey for zuul-worker from 38.102.83.114 port 40324 ssh2: RSA SHA256:zhs3MiW0JhxzckYcMHQES8SMYHj1iGcomnyzmbiwor8 Sep 30 23:04:18 np0005463759.novalocal systemd[1]: Created slice User Slice of UID 1000. Sep 30 23:04:18 np0005463759.novalocal systemd[1]: Starting User Runtime Directory /run/user/1000... Sep 30 23:04:18 np0005463759.novalocal systemd-logind[804]: New session 1 of user zuul-worker. Sep 30 23:04:18 np0005463759.novalocal systemd[1]: Finished User Runtime Directory /run/user/1000. Sep 30 23:04:18 np0005463759.novalocal systemd[1]: Starting User Manager for UID 1000... Sep 30 23:04:18 np0005463759.novalocal systemd[1057]: pam_unix(systemd-user:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Sep 30 23:04:18 np0005463759.novalocal systemd[1057]: Queued start job for default target Main User Target. Sep 30 23:04:18 np0005463759.novalocal systemd[1057]: Created slice User Application Slice. Sep 30 23:04:18 np0005463759.novalocal systemd[1057]: Started Mark boot as successful after the user session has run 2 minutes. Sep 30 23:04:18 np0005463759.novalocal systemd[1057]: Started Daily Cleanup of User's Temporary Directories. Sep 30 23:04:18 np0005463759.novalocal systemd[1057]: Reached target Paths. Sep 30 23:04:18 np0005463759.novalocal systemd[1057]: Reached target Timers. Sep 30 23:04:18 np0005463759.novalocal systemd[1057]: Starting D-Bus User Message Bus Socket... Sep 30 23:04:18 np0005463759.novalocal systemd[1057]: Starting Create User's Volatile Files and Directories... Sep 30 23:04:18 np0005463759.novalocal systemd[1057]: Listening on D-Bus User Message Bus Socket. Sep 30 23:04:18 np0005463759.novalocal systemd[1057]: Reached target Sockets. Sep 30 23:04:18 np0005463759.novalocal systemd[1057]: Finished Create User's Volatile Files and Directories. Sep 30 23:04:18 np0005463759.novalocal systemd[1057]: Reached target Basic System. Sep 30 23:04:18 np0005463759.novalocal systemd[1057]: Reached target Main User Target. Sep 30 23:04:18 np0005463759.novalocal systemd[1057]: Startup finished in 118ms. Sep 30 23:04:18 np0005463759.novalocal systemd[1]: Started User Manager for UID 1000. Sep 30 23:04:18 np0005463759.novalocal systemd[1]: Started Session 1 of User zuul-worker. Sep 30 23:04:18 np0005463759.novalocal sshd-session[1053]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Sep 30 23:04:18 np0005463759.novalocal systemd[1]: NetworkManager-dispatcher.service: Deactivated successfully. Sep 30 23:04:19 np0005463759.novalocal python3[1139]: ansible-setup Invoked with gather_subset=['!all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Sep 30 23:04:20 np0005463759.novalocal python3[1167]: ansible-ansible.legacy.setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Sep 30 23:04:24 np0005463759.novalocal python3[1225]: ansible-setup Invoked with gather_subset=['network'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Sep 30 23:04:25 np0005463759.novalocal python3[1265]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Sep 30 23:04:26 np0005463759.novalocal python3[1291]: ansible-authorized_key Invoked with user=zuul-worker state=present key=ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQC2iqKNsE7Im8hIcwpVY2lJ87RlReTILo+09l1a59tSHfY13NFOOwag9JTLjiHJJ+r0oHOn/QqSbc4SGFJ0+3GZNADSKxkIolvjlakGl5u0cAW7xcLWhiM5TjsxoZqtmnrcpGayUQDHr/KyogYPF3RaUhqUSqsMoLTCyscG2yydT9paYwvX18PomAxHcxsTeRZzkNDC1S/tUyQhrrI+RhrqAbgXlp1leBnGUqpkV4q0n4/EeS0QLYYjYVP/T6a2sORbMB2SUS+XTfBM3Ut8kAxggdlonZ6BmtP950iDu+63sQXoYSg83DTmYcxiZV3B9P9gPOJ1p8FCCtKdp6/ZF/UwDxq1OJoXdXBpd3TG5F56zU1wGndwT9JCqpFcA9tQpFa1abF3TZQK6UMdEcUO/LKtFdLNE/qHH2g6w/z7aeYHcP5JGfwYlHUnYpBEMGdav4SArh32zC73sEM6AtTLRF20RCNGJgslKWUl91t8ppy1Xh9ZPpBwdoDg4CMuC0MnPoc= zuul-build-sshkey manage_dir=True exclusive=False validate_certs=True follow=False path=None key_options=None comment=None Sep 30 23:04:27 np0005463759.novalocal python3[1315]: ansible-file Invoked with state=directory path=/home/zuul-worker/.ssh mode=448 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Sep 30 23:04:27 np0005463759.novalocal python3[1414]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Sep 30 23:04:28 np0005463759.novalocal python3[1485]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1759287867.2882042-163-156107679140532/source dest=/home/zuul-worker/.ssh/id_rsa mode=384 force=False _original_basename=d92e846e06aa4b3bbafc26cf1912d298_id_rsa follow=False checksum=d5bb2e9da25a3a9b492d58ed79593eb65e59a4ef backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Sep 30 23:04:28 np0005463759.novalocal python3[1608]: ansible-ansible.legacy.stat Invoked with path=/home/zuul-worker/.ssh/id_rsa.pub follow=False get_checksum=False checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Sep 30 23:04:28 np0005463759.novalocal python3[1679]: ansible-ansible.legacy.copy Invoked with src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1759287868.2779334-174-91580788210748/source dest=/home/zuul-worker/.ssh/id_rsa.pub mode=420 force=False _original_basename=d92e846e06aa4b3bbafc26cf1912d298_id_rsa.pub follow=False checksum=ca2e1b915250717b0b8506e69e8403d85e600ea1 backup=False unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Sep 30 23:04:30 np0005463759.novalocal python3[1727]: ansible-ping Invoked with data=pong Sep 30 23:04:31 np0005463759.novalocal python3[1751]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=[] fact_path=/etc/ansible/facts.d Sep 30 23:04:32 np0005463759.novalocal python3[1809]: ansible-zuul_debug_info Invoked with ipv4_route_required=False ipv6_route_required=False image_manifest_files=['/etc/dib-builddate.txt', '/etc/image-hostname.txt'] image_manifest=None traceroute_host=None Sep 30 23:04:33 np0005463759.novalocal python3[1841]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Sep 30 23:04:33 np0005463759.novalocal python3[1865]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Sep 30 23:04:34 np0005463759.novalocal python3[1889]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Sep 30 23:04:34 np0005463759.novalocal python3[1913]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Sep 30 23:04:34 np0005463759.novalocal python3[1937]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Sep 30 23:04:34 np0005463759.novalocal python3[1961]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Sep 30 23:04:37 np0005463759.novalocal python3[1985]: ansible-zuul_console Invoked with path=/tmp/console-{log_uuid}.log port=19885 state=present Sep 30 23:04:38 np0005463759.novalocal sshd-session[1988]: Accepted publickey for zuul-worker from 38.102.83.114 port 59404 ssh2: RSA SHA256:oucp1QYXTzmJgOjMfG+LRMImvL8hDutcJ4f2Bkf0Frg Sep 30 23:04:38 np0005463759.novalocal systemd-logind[804]: New session 3 of user zuul-worker. Sep 30 23:04:38 np0005463759.novalocal systemd[1]: Started Session 3 of User zuul-worker. Sep 30 23:04:38 np0005463759.novalocal sshd-session[1988]: pam_unix(sshd:session): session opened for user zuul-worker(uid=1000) by zuul-worker(uid=0) Sep 30 23:04:38 np0005463759.novalocal systemd[1]: systemd-hostnamed.service: Deactivated successfully. Sep 30 23:04:40 np0005463759.novalocal sshd-session[1991]: Received disconnect from 38.102.83.114 port 59404:11: disconnected by user Sep 30 23:04:40 np0005463759.novalocal sshd-session[1991]: Disconnected from user zuul-worker 38.102.83.114 port 59404 Sep 30 23:04:40 np0005463759.novalocal sshd-session[1988]: pam_unix(sshd:session): session closed for user zuul-worker Sep 30 23:04:40 np0005463759.novalocal systemd[1]: session-3.scope: Deactivated successfully. Sep 30 23:04:40 np0005463759.novalocal systemd[1]: session-3.scope: Consumed 1.708s CPU time. Sep 30 23:04:40 np0005463759.novalocal systemd-logind[804]: Session 3 logged out. Waiting for processes to exit. Sep 30 23:04:40 np0005463759.novalocal systemd-logind[804]: Removed session 3. Sep 30 23:04:41 np0005463759.novalocal python3[2041]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Sep 30 23:04:41 np0005463759.novalocal python3[2065]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Sep 30 23:04:41 np0005463759.novalocal python3[2089]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Sep 30 23:04:41 np0005463759.novalocal python3[2113]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/logs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Sep 30 23:04:42 np0005463759.novalocal python3[2137]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/artifacts state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Sep 30 23:04:42 np0005463759.novalocal python3[2161]: ansible-file Invoked with path=/home/zuul-worker/zuul-output/docs state=directory mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Sep 30 23:04:43 np0005463759.novalocal python3[2186]: ansible-ansible.legacy.command Invoked with _raw_params=sudo -n true zuul_log_id=fa163ef9-e89a-4f2b-6d25-000000000028-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Sep 30 23:04:43 np0005463759.novalocal sudo[2187]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/true Sep 30 23:04:43 np0005463759.novalocal sudo[2187]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:04:43 np0005463759.novalocal sudo[2187]: pam_unix(sudo:session): session closed for user root Sep 30 23:04:44 np0005463759.novalocal python3[2215]: ansible-file Invoked with path=/home/zuul-worker/.pydistutils.cfg state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Sep 30 23:04:44 np0005463759.novalocal sudo[2291]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-szltldsqrambrsmuosgbvtbvnyhgkrrb ; /usr/bin/python3' Sep 30 23:04:44 np0005463759.novalocal sudo[2291]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:04:44 np0005463759.novalocal python3[2293]: ansible-ansible.legacy.stat Invoked with path=/etc/pip.conf follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Sep 30 23:04:44 np0005463759.novalocal sudo[2291]: pam_unix(sudo:session): session closed for user root Sep 30 23:04:44 np0005463759.novalocal sudo[2364]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-easgwcqrdcuscqeddhtgoyumvehfnkxv ; /usr/bin/python3' Sep 30 23:04:44 np0005463759.novalocal sudo[2364]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:04:45 np0005463759.novalocal python3[2366]: ansible-ansible.legacy.copy Invoked with dest=/etc/pip.conf group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1759287884.349242-91-60074277909944/source follow=False _original_basename=pip.conf.j2 checksum=5b65c9094402b8db60a77928be1f816342638afe backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Sep 30 23:04:45 np0005463759.novalocal sudo[2364]: pam_unix(sudo:session): session closed for user root Sep 30 23:04:45 np0005463759.novalocal sudo[2466]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-whdvxpbcrnxzxgftjrykwmbxrxcfjnmw ; /usr/bin/python3' Sep 30 23:04:45 np0005463759.novalocal sudo[2466]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:04:45 np0005463759.novalocal python3[2468]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Sep 30 23:04:46 np0005463759.novalocal sudo[2466]: pam_unix(sudo:session): session closed for user root Sep 30 23:04:46 np0005463759.novalocal sudo[2541]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-uhoxpuxbaftbgiyuglejhadpvkfbzzbc ; /usr/bin/python3' Sep 30 23:04:46 np0005463759.novalocal sudo[2541]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:04:46 np0005463759.novalocal python3[2543]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1759287885.5781653-103-113098647262391/source follow=False _original_basename=centos.repo.j2 checksum=0268eb1686bc9b047a2096dbaf287658b0d20a19 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Sep 30 23:04:46 np0005463759.novalocal sudo[2541]: pam_unix(sudo:session): session closed for user root Sep 30 23:04:46 np0005463759.novalocal sudo[2643]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-egbsbjmmnazuevihhvryauzwjraecgbl ; /usr/bin/python3' Sep 30 23:04:46 np0005463759.novalocal sudo[2643]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:04:46 np0005463759.novalocal python3[2645]: ansible-ansible.legacy.stat Invoked with path=/etc/yum.repos.d/centos-addons.repo follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Sep 30 23:04:46 np0005463759.novalocal sudo[2643]: pam_unix(sudo:session): session closed for user root Sep 30 23:04:47 np0005463759.novalocal sudo[2718]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-sbxjxepygoxrhztmnzvyuknffajqtidu ; /usr/bin/python3' Sep 30 23:04:47 np0005463759.novalocal sudo[2718]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:04:47 np0005463759.novalocal python3[2720]: ansible-ansible.legacy.copy Invoked with dest=/etc/yum.repos.d/centos-addons.repo group=root mode=420 owner=root src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1759287886.5962114-103-222329800835028/source follow=False _original_basename=centos-addons.repo.j2 checksum=2917e612982cadeb3009a3bf37bf30cbcd7f2044 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Sep 30 23:04:47 np0005463759.novalocal sudo[2718]: pam_unix(sudo:session): session closed for user root Sep 30 23:04:47 np0005463759.novalocal sudo[2768]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-yzbgoxgsdooqfrlndkxuximvanrgilth ; /usr/bin/python3' Sep 30 23:04:47 np0005463759.novalocal sudo[2768]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:04:48 np0005463759.novalocal python3[2770]: ansible-ini_file Invoked with path=/etc/dnf.conf section=main option=deltarpm value=0 mode=420 backup=False state=present exclusive=True no_extra_spaces=False ignore_spaces=False allow_no_value=False create=True follow=False unsafe_writes=False values=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Sep 30 23:04:48 np0005463759.novalocal python3[2770]: ansible-ini_file [WARNING] Module remote_tmp /root/.ansible/tmp did not exist and was created with a mode of 0700, this may cause issues when running as another user. To avoid this, create the remote_tmp dir with the correct permissions manually Sep 30 23:04:48 np0005463759.novalocal sudo[2768]: pam_unix(sudo:session): session closed for user root Sep 30 23:04:48 np0005463759.novalocal sudo[2794]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-oazlblbkqqroiffrekbdqvjcwddiutta ; /usr/bin/python3' Sep 30 23:04:48 np0005463759.novalocal sudo[2794]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:04:48 np0005463759.novalocal python3[2796]: ansible-ansible.legacy.command Invoked with _raw_params=dnf clean all zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Sep 30 23:04:49 np0005463759.novalocal sudo[2794]: pam_unix(sudo:session): session closed for user root Sep 30 23:04:49 np0005463759.novalocal sudo[2822]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-tubweatjmgcllikyuqdfktcohfbzhump ; /usr/bin/python3' Sep 30 23:04:49 np0005463759.novalocal sudo[2822]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:04:49 np0005463759.novalocal python3[2824]: ansible-ansible.legacy.command Invoked with _raw_params=dnf makecache -v zuul_log_id=in-loop-ignore zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Sep 30 23:04:59 np0005463759.novalocal sudo[2822]: pam_unix(sudo:session): session closed for user root Sep 30 23:05:00 np0005463759.novalocal python3[2865]: ansible-file Invoked with path=/home/zuul-worker/workspace state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Sep 30 23:05:01 np0005463759.novalocal python3[2890]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=PYTHON2=0 PYTHON3=1 # Not all platforms install a `pip` when installing python # specific pip packages. We first check if pip$VERSION is # available and if not fallback to checking if just `pip` # is present. if [ "$PYTHON2" -eq "1" ] ; then command -v pip2 || command -v pip || exit 1 python2 -m wheel --help || exit 1 fi if [ "$PYTHON3" -eq "1" ] ; then command -v pip3 || command -v pip || exit 1 python3 -m wheel --help || exit 1 fi _uses_shell=True zuul_log_id=fa163ef9-e89a-d543-1993-000000000089-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Sep 30 23:05:01 np0005463759.novalocal sudo[2918]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-sznhmcqnahlhnoegomhghqltnsinjnyv ; /usr/bin/python3' Sep 30 23:05:01 np0005463759.novalocal sudo[2918]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:05:01 np0005463759.novalocal python3[2920]: ansible-ansible.legacy.dnf Invoked with name=['python3-pip', 'python3-setuptools', 'python3-wheel'] state=present allow_downgrade=False autoremove=False bugfix=False cacheonly=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True sslverify=True lock_timeout=30 allowerasing=False nobest=False use_backend=auto conf_file=None disable_excludes=None download_dir=None list=None releasever=None Sep 30 23:05:03 np0005463759.novalocal systemd[1]: Starting PackageKit Daemon... Sep 30 23:05:03 np0005463759.novalocal PackageKit[2926]: daemon start Sep 30 23:05:03 np0005463759.novalocal systemd[1]: Starting Authorization Manager... Sep 30 23:05:03 np0005463759.novalocal polkitd[2930]: Started polkitd version 0.117 Sep 30 23:05:03 np0005463759.novalocal polkitd[2930]: Loading rules from directory /etc/polkit-1/rules.d Sep 30 23:05:03 np0005463759.novalocal polkitd[2930]: Loading rules from directory /usr/share/polkit-1/rules.d Sep 30 23:05:03 np0005463759.novalocal polkitd[2930]: Finished loading, compiling and executing 3 rules Sep 30 23:05:03 np0005463759.novalocal polkitd[2930]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Sep 30 23:05:03 np0005463759.novalocal systemd[1]: Started Authorization Manager. Sep 30 23:05:03 np0005463759.novalocal systemd[1]: Started PackageKit Daemon. Sep 30 23:05:03 np0005463759.novalocal sudo[2918]: pam_unix(sudo:session): session closed for user root Sep 30 23:05:04 np0005463759.novalocal python3[2970]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v python3 _uses_shell=True zuul_log_id=fa163ef9-e89a-d543-1993-000000000093-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Sep 30 23:05:05 np0005463759.novalocal python3[2998]: ansible-ansible.legacy.command Invoked with executable=/bin/bash _raw_params=command -v tox /home/zuul-worker/.local/tox/bin/tox || exit 1 _uses_shell=True zuul_log_id=fa163ef9-e89a-d543-1993-000000000021-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None creates=None removes=None stdin=None Sep 30 23:05:06 np0005463759.novalocal python3[3026]: ansible-ansible.legacy.command Invoked with _raw_params=/usr/bin/python3 -m venv /home/zuul-worker/.local/tox zuul_log_id=fa163ef9-e89a-d543-1993-000000000024-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Sep 30 23:05:09 np0005463759.novalocal python3[3058]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/pip install tox zuul_log_id=fa163ef9-e89a-d543-1993-000000000025-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Sep 30 23:05:12 np0005463759.novalocal python3[3088]: ansible-ansible.legacy.command Invoked with _raw_params=/home/zuul-worker/.local/tox/bin/tox --version zuul_log_id=fa163ef9-e89a-d543-1993-000000000028-1-cloudcentos9stream zuul_ansible_split_streams=False _uses_shell=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Sep 30 23:05:12 np0005463759.novalocal sudo[3115]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ciguuotpmemosnpgeaqvjkdmyktfnsqx ; /usr/bin/python3' Sep 30 23:05:12 np0005463759.novalocal sudo[3115]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:05:12 np0005463759.novalocal python3[3117]: ansible-file Invoked with state=link src=/home/zuul-worker/.local/tox/bin/tox dest=/usr/local/bin/tox path=/usr/local/bin/tox recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None Sep 30 23:05:12 np0005463759.novalocal sudo[3115]: pam_unix(sudo:session): session closed for user root Sep 30 23:05:12 np0005463759.novalocal python3[3142]: ansible-ansible.legacy.command Invoked with _raw_params=export WBASE="/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo"; mkdir -p $WBASE/playbooks/roles ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-common" $WBASE/playbooks/roles/common; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-logs" $WBASE/playbooks/roles/logs; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-kolla" $WBASE/playbooks/roles/kolla; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-packstack" $WBASE/playbooks/roles/packstack; # noqa 204 ln -s "/home/zuul-worker/src/review.rdoproject.org/rdo-infra/ansible-role-weirdo-puppet-openstack" $WBASE/playbooks/roles/puppet-openstack; # noqa 204 ln -s "/home/zuul-worker/src/github.com/openstack-k8s-operators/ci-framework/roles/build_containers" $WBASE/playbooks/roles/build_containers; # noqa 204 _uses_shell=True zuul_log_id=fa163ef9-e89a-d543-1993-00000000003f-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Sep 30 23:05:13 np0005463759.novalocal sudo[3175]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zgxefronweutktfxvfseuislsymtxtdc ; /usr/bin/python3' Sep 30 23:05:13 np0005463759.novalocal sudo[3175]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:05:13 np0005463759.novalocal python3[3177]: ansible-file Invoked with path=/etc/ci state=directory owner=root group=root mode=493 recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None seuser=None serole=None selevel=None setype=None attributes=None Sep 30 23:05:13 np0005463759.novalocal sudo[3175]: pam_unix(sudo:session): session closed for user root Sep 30 23:05:13 np0005463759.novalocal sudo[3253]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-crawhgirgvqktdmmgyrrrqcnhewduvgj ; /usr/bin/python3' Sep 30 23:05:13 np0005463759.novalocal sudo[3253]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:05:13 np0005463759.novalocal python3[3255]: ansible-ansible.legacy.stat Invoked with path=/etc/ci/mirror_info.sh follow=False get_checksum=True checksum_algorithm=sha1 get_md5=False get_mime=True get_attributes=True Sep 30 23:05:13 np0005463759.novalocal sudo[3253]: pam_unix(sudo:session): session closed for user root Sep 30 23:05:14 np0005463759.novalocal sudo[3326]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xpmziawskzxqkxygwoeawqdqnlmxruqa ; /usr/bin/python3' Sep 30 23:05:14 np0005463759.novalocal sudo[3326]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:05:14 np0005463759.novalocal python3[3328]: ansible-ansible.legacy.copy Invoked with dest=/etc/ci/mirror_info.sh owner=root group=root mode=420 src=/home/zuul-worker/.ansible/tmp/ansible-tmp-1759287913.4929442-81-194868885127114/source follow=False _original_basename=mirror_info.sh.j2 checksum=ea5d641d750b2605d80a15d4106dfb6027081c92 backup=False force=True unsafe_writes=False content=NOT_LOGGING_PARAMETER validate=None directory_mode=None remote_src=None local_follow=None seuser=None serole=None selevel=None setype=None attributes=None Sep 30 23:05:14 np0005463759.novalocal sudo[3326]: pam_unix(sudo:session): session closed for user root Sep 30 23:05:14 np0005463759.novalocal sudo[3377]: zuul-worker : PWD=/home/zuul-worker ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-xmbhuryggfcocuullyredsznqksycjta ; /usr/bin/python3' Sep 30 23:05:14 np0005463759.novalocal sudo[3377]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:05:14 np0005463759.novalocal python3[3379]: ansible-ansible.legacy.command Invoked with _raw_params=dnf install -y python3-pip rpmlint python3-rpm _uses_shell=True zuul_log_id=fa163ef9-e89a-d543-1993-000000000052-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Sep 30 23:05:15 np0005463759.novalocal sudo[3377]: pam_unix(sudo:session): session closed for user root Sep 30 23:05:16 np0005463759.novalocal python3[3406]: ansible-pip Invoked with name=['rdopkg'] virtualenv=/home/zuul-worker/rdopkg-venv virtualenv_command=/usr/bin/python3 -m venv virtualenv_site_packages=True state=present editable=False version=None requirements=None virtualenv_python=None extra_args=None chdir=None executable=None umask=None Sep 30 23:05:21 np0005463759.novalocal python3[3439]: ansible-ansible.legacy.command Invoked with _raw_params=set -e -x source '/home/zuul-worker/rdopkg-venv/bin/activate' MASTER="$(rdopkg info | grep -e "in development phase" | awk '{print $1}')" RELEASE="dalmatian" DIST_VER="9" # Find out if it is puppet or packstack and scenario if [[ "weirdo-dalmatian-promote-puppet-scenario005-centos-stream-9" == *"puppet"* ]]; then project="puppet-openstack" else project="packstack" fi scenario="scenario005" # Set version related variables if [ $RELEASE = $MASTER ]; then VERSION="master" O_RELEASE="master" else VERSION="$(rdopkg release -r "$RELEASE" | grep upstream_branch | awk '{print $2}')" O_RELEASE="$RELEASE" fi if [[ "promotion" == "promotion" ]]; then enable_puppet_modules_rpm=false dlrn_repo="puppet-ci-testing" else enable_puppet_modules_rpm=true dlrn_repo="puppet-passed-ci" fi # Prepare Ansible inventory to use localhost pushd /home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo cat <hosts localhost ansible_connection=local ansible_python_interpreter=/usr/bin/python3 [openstack_nodes] localhost log_destination=/var/log/weirdo EOF REPOS_URL="http://trunk.rdoproject.org/centos${DIST_VER}-${O_RELEASE}/${dlrn_repo}/delorean.repo,https://trunk.rdoproject.org/centos${DIST_VER}-${O_RELEASE}/delorean-deps.repo" # noqa 204 tox -e ansible-playbook -- -vv -b -i hosts playbooks/$project-$scenario.yml \ -e version=$VERSION \ -e openstack_release=$O_RELEASE \ -e selinux_enforcing="false" \ -e tempest_from_source=false \ -e enable_puppet_modules_rpm=${enable_puppet_modules_rpm} \ -e trunk_repositories=$REPOS_URL \ _uses_shell=True zuul_log_id=fa163ef9-e89a-d543-1993-000000000005-1-cloudcentos9stream zuul_ansible_split_streams=False warn=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Sep 30 23:06:26 np0005463759.novalocal sshd-session[3702]: Received disconnect from 192.227.153.63 port 58140:11: Bye Bye [preauth] Sep 30 23:06:26 np0005463759.novalocal sshd-session[3702]: Disconnected from authenticating user root 192.227.153.63 port 58140 [preauth] Sep 30 23:06:27 np0005463759.novalocal sudo[3728]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-mymxrzghmhsgrfblwzxnagujjukdidls ; /usr/bin/python3' Sep 30 23:06:27 np0005463759.novalocal sudo[3728]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:06:27 np0005463759.novalocal python3[3730]: ansible-setup Invoked with gather_subset=['all'] gather_timeout=10 filter=* fact_path=/etc/ansible/facts.d Sep 30 23:06:27 np0005463759.novalocal sudo[3728]: pam_unix(sudo:session): session closed for user root Sep 30 23:06:28 np0005463759.novalocal sudo[3768]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wgrdgnsrzoxakyzkmwmroycvwyrynwwn ; /usr/bin/python3' Sep 30 23:06:28 np0005463759.novalocal sudo[3768]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:06:28 np0005463759.novalocal python3[3770]: ansible-command Invoked with _raw_params=sudo dnf config-manager --enable crb _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Sep 30 23:06:28 np0005463759.novalocal python3[3770]: ansible-command [WARNING] Consider using 'become', 'become_method', and 'become_user' rather than running sudo Sep 30 23:06:28 np0005463759.novalocal sudo[3771]: root : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/dnf config-manager --enable crb Sep 30 23:06:28 np0005463759.novalocal sudo[3771]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:06:28 np0005463759.novalocal sudo[3771]: pam_unix(sudo:session): session closed for user root Sep 30 23:06:28 np0005463759.novalocal sudo[3768]: pam_unix(sudo:session): session closed for user root Sep 30 23:06:28 np0005463759.novalocal sudo[3781]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jfhiyzrdrlxvfqqspnkqronetvsmbnue ; /usr/bin/python3' Sep 30 23:06:28 np0005463759.novalocal sudo[3781]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:06:29 np0005463759.novalocal python3[3783]: ansible-systemd Invoked with name=firewalld state=stopped daemon_reload=False daemon_reexec=False no_block=False enabled=None force=None masked=None user=None scope=None Sep 30 23:06:30 np0005463759.novalocal sudo[3781]: pam_unix(sudo:session): session closed for user root Sep 30 23:06:30 np0005463759.novalocal sudo[3792]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wudsnzrydoicjkdugerbhwhkhxudebkq ; /usr/bin/python3' Sep 30 23:06:30 np0005463759.novalocal sudo[3792]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:06:30 np0005463759.novalocal python3[3794]: ansible-dnf Invoked with name=['firewalld'] state=absent allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Sep 30 23:06:31 np0005463759.novalocal sudo[3792]: pam_unix(sudo:session): session closed for user root Sep 30 23:06:31 np0005463759.novalocal sudo[3810]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rbmqirlrfxhuzbyrzcjtqjbcjanouxdc ; /usr/bin/python3' Sep 30 23:06:31 np0005463759.novalocal sudo[3810]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:06:31 np0005463759.novalocal python3[3812]: ansible-dnf Invoked with name=['tuned', 'subscription-manager'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Sep 30 23:06:34 np0005463759.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Sep 30 23:06:34 np0005463759.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Sep 30 23:06:34 np0005463759.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Sep 30 23:06:34 np0005463759.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Sep 30 23:06:34 np0005463759.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Sep 30 23:06:34 np0005463759.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Sep 30 23:06:35 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:06:35 np0005463759.novalocal systemd[1]: Starting man-db-cache-update.service... Sep 30 23:06:35 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:06:35 np0005463759.novalocal systemd-rc-local-generator[3886]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:06:35 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:06:37 np0005463759.novalocal sudo[3810]: pam_unix(sudo:session): session closed for user root Sep 30 23:06:37 np0005463759.novalocal sudo[5174]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-nwtruvpqbdztqjpwinuzbpvbxrenfjeg ; /usr/bin/python3' Sep 30 23:06:37 np0005463759.novalocal sudo[5174]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:06:37 np0005463759.novalocal python3[5196]: ansible-systemd Invoked with name=tuned enabled=True state=started daemon_reload=False daemon_reexec=False no_block=False force=None masked=None user=None scope=None Sep 30 23:06:37 np0005463759.novalocal systemd[1]: Starting Dynamic System Tuning Daemon... Sep 30 23:06:38 np0005463759.novalocal systemd[1]: Started Dynamic System Tuning Daemon. Sep 30 23:06:38 np0005463759.novalocal sudo[5174]: pam_unix(sudo:session): session closed for user root Sep 30 23:06:38 np0005463759.novalocal sudo[6166]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jpvbsfutdwxnybyvupfhgxgzvbdigqls ; /usr/bin/python3' Sep 30 23:06:38 np0005463759.novalocal sudo[6166]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:06:38 np0005463759.novalocal python3[6196]: ansible-command Invoked with _raw_params=tuned-adm active warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Sep 30 23:06:38 np0005463759.novalocal sudo[6166]: pam_unix(sudo:session): session closed for user root Sep 30 23:06:38 np0005463759.novalocal sudo[6625]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-hdjdztzzhneyclkfiketxuptuuwbefou ; /usr/bin/python3' Sep 30 23:06:38 np0005463759.novalocal sudo[6625]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:06:39 np0005463759.novalocal python3[6651]: ansible-command Invoked with _raw_params=tuned-adm profile throughput-performance warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Sep 30 23:06:40 np0005463759.novalocal sudo[6625]: pam_unix(sudo:session): session closed for user root Sep 30 23:06:40 np0005463759.novalocal sudo[7879]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-yizmprvqhtlcyexylnwfzvpeozosvcsz ; /usr/bin/python3' Sep 30 23:06:40 np0005463759.novalocal sudo[7879]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:06:40 np0005463759.novalocal python3[7893]: ansible-file Invoked with path=/var/log/weirdo state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Sep 30 23:06:40 np0005463759.novalocal sudo[7879]: pam_unix(sudo:session): session closed for user root Sep 30 23:06:40 np0005463759.novalocal sudo[8032]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-atpmazlofzerfdjyeduahnjthsfdfeax ; /usr/bin/python3' Sep 30 23:06:40 np0005463759.novalocal sudo[8032]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:06:40 np0005463759.novalocal python3[8055]: ansible-file Invoked with path=/var/log/weirdo-project state=directory recurse=True force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Sep 30 23:06:40 np0005463759.novalocal sudo[8032]: pam_unix(sudo:session): session closed for user root Sep 30 23:06:41 np0005463759.novalocal sudo[8462]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-lxmdrhzmakeijtfdybarmlmxrdusqqpw ; /usr/bin/python3' Sep 30 23:06:41 np0005463759.novalocal sudo[8462]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:06:41 np0005463759.novalocal python3[8475]: ansible-get_url Invoked with url=http://trunk.rdoproject.org/centos9-dalmatian/puppet-ci-testing/delorean.repo dest=/etc/yum.repos.d/ force=False http_agent=ansible-httpget use_proxy=True validate_certs=True force_basic_auth=False sha256sum= checksum= timeout=10 follow=False unsafe_writes=False url_username=None url_password=NOT_LOGGING_PARAMETER client_cert=None client_key=None backup=None headers=None tmp_dest=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None content=NOT_LOGGING_PARAMETER remote_src=None regexp=None delimiter=None directory_mode=None Sep 30 23:06:41 np0005463759.novalocal sudo[8462]: pam_unix(sudo:session): session closed for user root Sep 30 23:06:41 np0005463759.novalocal sudo[8686]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-pzmvnptldxythzsbdivqupxaifstpvzn ; /usr/bin/python3' Sep 30 23:06:41 np0005463759.novalocal sudo[8686]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:06:41 np0005463759.novalocal python3[8700]: ansible-get_url Invoked with url=https://trunk.rdoproject.org/centos9-dalmatian/delorean-deps.repo dest=/etc/yum.repos.d/ force=False http_agent=ansible-httpget use_proxy=True validate_certs=True force_basic_auth=False sha256sum= checksum= timeout=10 follow=False unsafe_writes=False url_username=None url_password=NOT_LOGGING_PARAMETER client_cert=None client_key=None backup=None headers=None tmp_dest=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None content=NOT_LOGGING_PARAMETER remote_src=None regexp=None delimiter=None directory_mode=None Sep 30 23:06:42 np0005463759.novalocal sudo[8686]: pam_unix(sudo:session): session closed for user root Sep 30 23:06:42 np0005463759.novalocal sudo[8902]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-aqizlfxbphmbckmjvbagukrsmtqtcaqj ; /usr/bin/python3' Sep 30 23:06:42 np0005463759.novalocal sudo[8902]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:06:42 np0005463759.novalocal python3[8920]: ansible-command Invoked with _raw_params=if [ -f /etc/ci/mirror_info.sh ]; then source /etc/ci/mirror_info.sh sed -i -e "s|https://trunk.rdoproject.org|${NODEPOOL_RDO_PROXY}|g" /etc/yum.repos.d/*.repo # For CentOS8 sed -i -e "s|http://mirror.centos.org/centos|${NODEPOOL_CENTOS_MIRROR}|g" /etc/yum.repos.d/*.repo # For CentOS9 sed -i -e "s|http://mirror.stream.centos.org|${NODEPOOL_CENTOS_MIRROR}|g" /etc/yum.repos.d/*.repo fi _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Sep 30 23:06:42 np0005463759.novalocal sudo[8902]: pam_unix(sudo:session): session closed for user root Sep 30 23:06:42 np0005463759.novalocal sudo[9285]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vdmnkvtwkuwrxmkmzsvhqwhmcjhjfgwr ; /usr/bin/python3' Sep 30 23:06:42 np0005463759.novalocal sudo[9285]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:06:42 np0005463759.novalocal python3[9300]: ansible-command Invoked with _raw_params=repoquery --disablerepo='*' --enablerepo='delorean*' -a --qf '%{sourcerpm}'|sort -u|sed 's/.src.rpm//g' >/var/log/weirdo/rdo-trunk-deps-start.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Sep 30 23:06:46 np0005463759.novalocal sudo[9285]: pam_unix(sudo:session): session closed for user root Sep 30 23:06:46 np0005463759.novalocal sudo[10589]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-rwzsxgrklgalcsfkdcnkjgrkrwrdpkap ; /usr/bin/python3' Sep 30 23:06:46 np0005463759.novalocal sudo[10589]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:06:46 np0005463759.novalocal python3[10601]: ansible-command Invoked with _raw_params=dnf clean all _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None creates=None removes=None stdin=None Sep 30 23:06:46 np0005463759.novalocal python3[10601]: ansible-command [WARNING] Consider using the dnf module rather than running 'dnf'. If you need to use command because dnf is insufficient you can add 'warn: false' to this command task or set 'command_warnings=False' in ansible.cfg to get rid of this message. Sep 30 23:06:47 np0005463759.novalocal sudo[10589]: pam_unix(sudo:session): session closed for user root Sep 30 23:06:47 np0005463759.novalocal sudo[10840]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ljxixifebajwivadligiwmemurcertzl ; /usr/bin/python3' Sep 30 23:06:47 np0005463759.novalocal sudo[10840]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:06:47 np0005463759.novalocal python3[10849]: ansible-dnf Invoked with name=['*'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Sep 30 23:07:07 np0005463759.novalocal irqbalance[792]: Cannot change IRQ 27 affinity: Operation not permitted Sep 30 23:07:07 np0005463759.novalocal irqbalance[792]: IRQ 27 affinity is now unmanaged Sep 30 23:07:10 np0005463759.novalocal systemd[1057]: Starting Mark boot as successful... Sep 30 23:07:10 np0005463759.novalocal systemd[1057]: Finished Mark boot as successful. Sep 30 23:07:17 np0005463759.novalocal NetworkManager[858]: [1759288037.1422] manager: kernel firmware directory '/lib/firmware' changed Sep 30 23:07:29 np0005463759.novalocal systemd[1]: Stopping GSSAPI Proxy Daemon... Sep 30 23:07:29 np0005463759.novalocal systemd[1]: gssproxy.service: Deactivated successfully. Sep 30 23:07:29 np0005463759.novalocal systemd[1]: Stopped GSSAPI Proxy Daemon. Sep 30 23:07:29 np0005463759.novalocal systemd[1]: Starting GSSAPI Proxy Daemon... Sep 30 23:07:29 np0005463759.novalocal systemd[1]: Started GSSAPI Proxy Daemon. Sep 30 23:07:29 np0005463759.novalocal systemd[1]: Stopping GSSAPI Proxy Daemon... Sep 30 23:07:29 np0005463759.novalocal systemd[1]: gssproxy.service: Deactivated successfully. Sep 30 23:07:29 np0005463759.novalocal systemd[1]: Stopped GSSAPI Proxy Daemon. Sep 30 23:07:29 np0005463759.novalocal systemd[1]: Starting GSSAPI Proxy Daemon... Sep 30 23:07:29 np0005463759.novalocal systemd[1]: Started GSSAPI Proxy Daemon. Sep 30 23:07:29 np0005463759.novalocal systemd[1]: Stopping GSSAPI Proxy Daemon... Sep 30 23:07:29 np0005463759.novalocal systemd[1]: gssproxy.service: Deactivated successfully. Sep 30 23:07:29 np0005463759.novalocal systemd[1]: Stopped GSSAPI Proxy Daemon. Sep 30 23:07:29 np0005463759.novalocal systemd[1]: Starting GSSAPI Proxy Daemon... Sep 30 23:07:29 np0005463759.novalocal systemd[1]: Started GSSAPI Proxy Daemon. Sep 30 23:07:30 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Sep 30 23:07:30 np0005463759.novalocal systemd[1]: Finished man-db-cache-update.service. Sep 30 23:07:30 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Consumed 1min 6.496s CPU time. Sep 30 23:07:30 np0005463759.novalocal systemd[1]: run-r43a31d79caa344e6a77a0d4a88ad089b.service: Deactivated successfully. Sep 30 23:07:44 np0005463759.novalocal dracut[27278]: dracut-057-102.git20250818.el9 Sep 30 23:07:44 np0005463759.novalocal dracut[27280]: Executing: /usr/bin/dracut -f /boot/initramfs-5.14.0-620.el9.x86_64.img 5.14.0-620.el9.x86_64 Sep 30 23:07:44 np0005463759.novalocal dracut[27280]: dracut module 'systemd-networkd' will not be installed, because command 'networkctl' could not be found! Sep 30 23:07:44 np0005463759.novalocal dracut[27280]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd' could not be found! Sep 30 23:07:44 np0005463759.novalocal dracut[27280]: dracut module 'systemd-networkd' will not be installed, because command '/usr/lib/systemd/systemd-networkd-wait-online' could not be found! Sep 30 23:07:44 np0005463759.novalocal dracut[27280]: dracut module 'systemd-resolved' will not be installed, because command 'resolvectl' could not be found! Sep 30 23:07:44 np0005463759.novalocal dracut[27280]: dracut module 'systemd-resolved' will not be installed, because command '/usr/lib/systemd/systemd-resolved' could not be found! Sep 30 23:07:44 np0005463759.novalocal dracut[27280]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-timesyncd' could not be found! Sep 30 23:07:44 np0005463759.novalocal dracut[27280]: dracut module 'systemd-timesyncd' will not be installed, because command '/usr/lib/systemd/systemd-time-wait-sync' could not be found! Sep 30 23:07:44 np0005463759.novalocal dracut[27280]: dracut module 'busybox' will not be installed, because command 'busybox' could not be found! Sep 30 23:07:44 np0005463759.novalocal dracut[27280]: dracut module 'dbus-daemon' will not be installed, because command 'dbus-daemon' could not be found! Sep 30 23:07:44 np0005463759.novalocal dracut[27280]: dracut module 'rngd' will not be installed, because command 'rngd' could not be found! Sep 30 23:07:44 np0005463759.novalocal dracut[27280]: dracut module 'connman' will not be installed, because command 'connmand' could not be found! Sep 30 23:07:44 np0005463759.novalocal dracut[27280]: dracut module 'connman' will not be installed, because command 'connmanctl' could not be found! Sep 30 23:07:44 np0005463759.novalocal dracut[27280]: dracut module 'connman' will not be installed, because command 'connmand-wait-online' could not be found! Sep 30 23:07:44 np0005463759.novalocal dracut[27280]: dracut module 'network-wicked' will not be installed, because command 'wicked' could not be found! Sep 30 23:07:44 np0005463759.novalocal dracut[27280]: 62bluetooth: Could not find any command of '/usr/lib/bluetooth/bluetoothd /usr/libexec/bluetooth/bluetoothd'! Sep 30 23:07:44 np0005463759.novalocal dracut[27280]: dracut module 'lvmmerge' will not be installed, because command 'lvm' could not be found! Sep 30 23:07:44 np0005463759.novalocal dracut[27280]: dracut module 'lvmthinpool-monitor' will not be installed, because command 'lvm' could not be found! Sep 30 23:07:44 np0005463759.novalocal dracut[27280]: dracut module 'btrfs' will not be installed, because command 'btrfs' could not be found! Sep 30 23:07:44 np0005463759.novalocal dracut[27280]: dracut module 'dmraid' will not be installed, because command 'dmraid' could not be found! Sep 30 23:07:44 np0005463759.novalocal dracut[27280]: dracut module 'lvm' will not be installed, because command 'lvm' could not be found! Sep 30 23:07:44 np0005463759.novalocal dracut[27280]: dracut module 'mdraid' will not be installed, because command 'mdadm' could not be found! Sep 30 23:07:44 np0005463759.novalocal dracut[27280]: dracut module 'multipath' will not be installed, because command 'multipath' could not be found! Sep 30 23:07:44 np0005463759.novalocal dracut[27280]: dracut module 'pcsc' will not be installed, because command 'pcscd' could not be found! Sep 30 23:07:45 np0005463759.novalocal dracut[27280]: dracut module 'tpm2-tss' will not be installed, because command 'tpm2' could not be found! Sep 30 23:07:45 np0005463759.novalocal dracut[27280]: dracut module 'cifs' will not be installed, because command 'mount.cifs' could not be found! Sep 30 23:07:45 np0005463759.novalocal dracut[27280]: dracut module 'fcoe' will not be installed, because command 'dcbtool' could not be found! Sep 30 23:07:45 np0005463759.novalocal dracut[27280]: dracut module 'fcoe' will not be installed, because command 'fipvlan' could not be found! Sep 30 23:07:45 np0005463759.novalocal dracut[27280]: dracut module 'fcoe' will not be installed, because command 'lldpad' could not be found! Sep 30 23:07:45 np0005463759.novalocal dracut[27280]: dracut module 'fcoe' will not be installed, because command 'fcoemon' could not be found! Sep 30 23:07:45 np0005463759.novalocal dracut[27280]: dracut module 'fcoe' will not be installed, because command 'fcoeadm' could not be found! Sep 30 23:07:45 np0005463759.novalocal dracut[27280]: dracut module 'fcoe-uefi' will not be installed, because command 'dcbtool' could not be found! Sep 30 23:07:45 np0005463759.novalocal dracut[27280]: dracut module 'fcoe-uefi' will not be installed, because command 'fipvlan' could not be found! Sep 30 23:07:45 np0005463759.novalocal dracut[27280]: dracut module 'fcoe-uefi' will not be installed, because command 'lldpad' could not be found! Sep 30 23:07:45 np0005463759.novalocal dracut[27280]: dracut module 'iscsi' will not be installed, because command 'iscsi-iname' could not be found! Sep 30 23:07:45 np0005463759.novalocal dracut[27280]: dracut module 'iscsi' will not be installed, because command 'iscsiadm' could not be found! Sep 30 23:07:45 np0005463759.novalocal dracut[27280]: dracut module 'iscsi' will not be installed, because command 'iscsid' could not be found! Sep 30 23:07:45 np0005463759.novalocal dracut[27280]: dracut module 'nbd' will not be installed, because command 'nbd-client' could not be found! Sep 30 23:07:45 np0005463759.novalocal dracut[27280]: dracut module 'nvmf' will not be installed, because command 'nvme' could not be found! Sep 30 23:07:45 np0005463759.novalocal dracut[27280]: dracut module 'biosdevname' will not be installed, because command 'biosdevname' could not be found! Sep 30 23:07:45 np0005463759.novalocal dracut[27280]: dracut module 'memstrack' will not be installed, because command 'memstrack' could not be found! Sep 30 23:07:45 np0005463759.novalocal dracut[27280]: memstrack is not available Sep 30 23:07:45 np0005463759.novalocal dracut[27280]: If you need to use rd.memdebug>=4, please install memstrack and procps-ng Sep 30 23:07:45 np0005463759.novalocal dracut[27280]: *** Including module: bash *** Sep 30 23:07:45 np0005463759.novalocal dracut[27280]: *** Including module: systemd *** Sep 30 23:07:45 np0005463759.novalocal dracut[27280]: *** Including module: fips *** Sep 30 23:07:46 np0005463759.novalocal dracut[27280]: *** Including module: systemd-initrd *** Sep 30 23:07:46 np0005463759.novalocal dracut[27280]: *** Including module: systemd-sysusers *** Sep 30 23:07:46 np0005463759.novalocal dracut[27280]: *** Including module: modsign *** Sep 30 23:07:46 np0005463759.novalocal dracut[27280]: *** Including module: dbus-broker *** Sep 30 23:07:46 np0005463759.novalocal dracut[27280]: *** Including module: dbus *** Sep 30 23:07:46 np0005463759.novalocal dracut[27280]: *** Including module: i18n *** Sep 30 23:07:46 np0005463759.novalocal dracut[27280]: *** Including module: network-manager *** Sep 30 23:07:46 np0005463759.novalocal dracut[27280]: *** Including module: network *** Sep 30 23:07:46 np0005463759.novalocal dracut[27280]: *** Including module: ifcfg *** Sep 30 23:07:46 np0005463759.novalocal dracut[27280]: *** Including module: prefixdevname *** Sep 30 23:07:46 np0005463759.novalocal dracut[27280]: *** Including module: crypt *** Sep 30 23:07:46 np0005463759.novalocal dracut[27280]: *** Including module: dm *** Sep 30 23:07:47 np0005463759.novalocal dracut[27280]: Skipping udev rule: 64-device-mapper.rules Sep 30 23:07:47 np0005463759.novalocal dracut[27280]: Skipping udev rule: 60-persistent-storage-dm.rules Sep 30 23:07:47 np0005463759.novalocal dracut[27280]: Skipping udev rule: 55-dm.rules Sep 30 23:07:47 np0005463759.novalocal dracut[27280]: *** Including module: kernel-modules *** Sep 30 23:07:52 np0005463759.novalocal dracut[27280]: *** Including module: kernel-modules-extra *** Sep 30 23:07:52 np0005463759.novalocal dracut[27280]: kernel-modules-extra: configuration source "/run/depmod.d" does not exist Sep 30 23:07:52 np0005463759.novalocal dracut[27280]: kernel-modules-extra: configuration source "/lib/depmod.d" does not exist Sep 30 23:07:52 np0005463759.novalocal dracut[27280]: kernel-modules-extra: parsing configuration file "/etc/depmod.d/dist.conf" Sep 30 23:07:52 np0005463759.novalocal dracut[27280]: kernel-modules-extra: /etc/depmod.d/dist.conf: added "updates extra built-in weak-updates" to the list of search directories Sep 30 23:07:52 np0005463759.novalocal dracut[27280]: *** Including module: kernel-network-modules *** Sep 30 23:07:53 np0005463759.novalocal dracut[27280]: *** Including module: nvdimm *** Sep 30 23:07:53 np0005463759.novalocal dracut[27280]: *** Including module: qemu *** Sep 30 23:07:53 np0005463759.novalocal dracut[27280]: *** Including module: qemu-net *** Sep 30 23:07:53 np0005463759.novalocal dracut[27280]: *** Including module: lunmask *** Sep 30 23:07:53 np0005463759.novalocal dracut[27280]: *** Including module: nfs *** Sep 30 23:07:53 np0005463759.novalocal dracut[27280]: *** Including module: resume *** Sep 30 23:07:53 np0005463759.novalocal dracut[27280]: *** Including module: rootfs-block *** Sep 30 23:07:53 np0005463759.novalocal dracut[27280]: *** Including module: terminfo *** Sep 30 23:07:53 np0005463759.novalocal dracut[27280]: *** Including module: udev-rules *** Sep 30 23:07:54 np0005463759.novalocal dracut[27280]: Skipping udev rule: 91-permissions.rules Sep 30 23:07:54 np0005463759.novalocal dracut[27280]: Skipping udev rule: 80-drivers-modprobe.rules Sep 30 23:07:54 np0005463759.novalocal dracut[27280]: *** Including module: virtfs *** Sep 30 23:07:54 np0005463759.novalocal dracut[27280]: *** Including module: virtiofs *** Sep 30 23:07:54 np0005463759.novalocal dracut[27280]: *** Including module: dracut-systemd *** Sep 30 23:07:54 np0005463759.novalocal dracut[27280]: *** Including module: usrmount *** Sep 30 23:07:54 np0005463759.novalocal dracut[27280]: *** Including module: base *** Sep 30 23:07:54 np0005463759.novalocal dracut[27280]: *** Including module: fs-lib *** Sep 30 23:07:54 np0005463759.novalocal dracut[27280]: *** Including module: microcode_ctl-fw_dir_override *** Sep 30 23:07:54 np0005463759.novalocal dracut[27280]: microcode_ctl module: mangling fw_dir Sep 30 23:07:54 np0005463759.novalocal dracut[27280]: microcode_ctl: reset fw_dir to "/lib/firmware/updates /lib/firmware" Sep 30 23:07:54 np0005463759.novalocal dracut[27280]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel"... Sep 30 23:07:55 np0005463759.novalocal dracut[27280]: microcode_ctl: intel: caveats check for kernel version "5.14.0-620.el9.x86_64" passed, adding "/usr/share/microcode_ctl/ucode_with_caveats/intel" to fw_dir variable Sep 30 23:07:55 np0005463759.novalocal dracut[27280]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07"... Sep 30 23:07:55 np0005463759.novalocal dracut[27280]: microcode_ctl: intel-06-2d-07: caveats check for kernel version "5.14.0-620.el9.x86_64" passed, adding "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07" to fw_dir variable Sep 30 23:07:55 np0005463759.novalocal dracut[27280]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4e-03"... Sep 30 23:07:55 np0005463759.novalocal dracut[27280]: microcode_ctl: kernel version "5.14.0-620.el9.x86_64" failed early load check for "intel-06-4e-03", skipping Sep 30 23:07:55 np0005463759.novalocal dracut[27280]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-4f-01"... Sep 30 23:07:55 np0005463759.novalocal dracut[27280]: microcode_ctl: kernel version "5.14.0-620.el9.x86_64" failed early load check for "intel-06-4f-01", skipping Sep 30 23:07:55 np0005463759.novalocal dracut[27280]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04"... Sep 30 23:07:55 np0005463759.novalocal dracut[27280]: microcode_ctl: intel-06-55-04: caveats check for kernel version "5.14.0-620.el9.x86_64" passed, adding "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04" to fw_dir variable Sep 30 23:07:55 np0005463759.novalocal dracut[27280]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03"... Sep 30 23:07:55 np0005463759.novalocal dracut[27280]: microcode_ctl: intel-06-5e-03: caveats check for kernel version "5.14.0-620.el9.x86_64" passed, adding "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03" to fw_dir variable Sep 30 23:07:55 np0005463759.novalocal dracut[27280]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01"... Sep 30 23:07:55 np0005463759.novalocal dracut[27280]: microcode_ctl: intel-06-8c-01: caveats check for kernel version "5.14.0-620.el9.x86_64" passed, adding "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01" to fw_dir variable Sep 30 23:07:55 np0005463759.novalocal dracut[27280]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-0xca"... Sep 30 23:07:55 np0005463759.novalocal dracut[27280]: microcode_ctl: kernel version "5.14.0-620.el9.x86_64" failed early load check for "intel-06-8e-9e-0x-0xca", skipping Sep 30 23:07:55 np0005463759.novalocal dracut[27280]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-dell"... Sep 30 23:07:55 np0005463759.novalocal dracut[27280]: microcode_ctl: intel-06-8e-9e-0x-dell: caveats check for kernel version "5.14.0-620.el9.x86_64" passed, adding "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-dell" to fw_dir variable Sep 30 23:07:55 np0005463759.novalocal dracut[27280]: microcode_ctl: processing data directory "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8f-08"... Sep 30 23:07:55 np0005463759.novalocal dracut[27280]: microcode_ctl: intel-06-8f-08: caveats check for kernel version "5.14.0-620.el9.x86_64" passed, adding "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8f-08" to fw_dir variable Sep 30 23:07:55 np0005463759.novalocal dracut[27280]: microcode_ctl: final fw_dir: "/usr/share/microcode_ctl/ucode_with_caveats/intel-06-8f-08 /usr/share/microcode_ctl/ucode_with_caveats/intel-06-8e-9e-0x-dell /usr/share/microcode_ctl/ucode_with_caveats/intel-06-8c-01 /usr/share/microcode_ctl/ucode_with_caveats/intel-06-5e-03 /usr/share/microcode_ctl/ucode_with_caveats/intel-06-55-04 /usr/share/microcode_ctl/ucode_with_caveats/intel-06-2d-07 /usr/share/microcode_ctl/ucode_with_caveats/intel /lib/firmware/updates /lib/firmware" Sep 30 23:07:55 np0005463759.novalocal dracut[27280]: *** Including module: openssl *** Sep 30 23:07:55 np0005463759.novalocal dracut[27280]: *** Including module: shutdown *** Sep 30 23:07:55 np0005463759.novalocal dracut[27280]: *** Including modules done *** Sep 30 23:07:55 np0005463759.novalocal dracut[27280]: *** Installing kernel module dependencies *** Sep 30 23:07:57 np0005463759.novalocal irqbalance[792]: Cannot change IRQ 26 affinity: Operation not permitted Sep 30 23:07:57 np0005463759.novalocal irqbalance[792]: IRQ 26 affinity is now unmanaged Sep 30 23:07:58 np0005463759.novalocal dracut[27280]: *** Installing kernel module dependencies done *** Sep 30 23:07:58 np0005463759.novalocal dracut[27280]: *** Resolving executable dependencies *** Sep 30 23:08:01 np0005463759.novalocal dracut[27280]: *** Resolving executable dependencies done *** Sep 30 23:08:01 np0005463759.novalocal dracut[27280]: *** Generating early-microcode cpio image *** Sep 30 23:08:01 np0005463759.novalocal dracut[27280]: *** Constructing GenuineIntel.bin *** Sep 30 23:08:01 np0005463759.novalocal dracut[27280]: *** Constructing GenuineIntel.bin *** Sep 30 23:08:01 np0005463759.novalocal dracut[27280]: *** Constructing GenuineIntel.bin *** Sep 30 23:08:01 np0005463759.novalocal dracut[27280]: *** Constructing GenuineIntel.bin *** Sep 30 23:08:01 np0005463759.novalocal dracut[27280]: *** Constructing GenuineIntel.bin *** Sep 30 23:08:01 np0005463759.novalocal dracut[27280]: *** Constructing GenuineIntel.bin *** Sep 30 23:08:01 np0005463759.novalocal dracut[27280]: *** Constructing GenuineIntel.bin *** Sep 30 23:08:02 np0005463759.novalocal dracut[27280]: *** Constructing GenuineIntel.bin *** Sep 30 23:08:02 np0005463759.novalocal dracut[27280]: *** Store current command line parameters *** Sep 30 23:08:02 np0005463759.novalocal dracut[27280]: *** Creating image file '/boot/initramfs-5.14.0-620.el9.x86_64.img' *** Sep 30 23:08:02 np0005463759.novalocal dracut[27280]: *** Hardlinking files *** Sep 30 23:08:02 np0005463759.novalocal dracut[27280]: Mode: real Sep 30 23:08:02 np0005463759.novalocal dracut[27280]: Files: 2145 Sep 30 23:08:02 np0005463759.novalocal dracut[27280]: Linked: 14 files Sep 30 23:08:02 np0005463759.novalocal dracut[27280]: Compared: 0 xattrs Sep 30 23:08:02 np0005463759.novalocal dracut[27280]: Compared: 465 files Sep 30 23:08:02 np0005463759.novalocal dracut[27280]: Saved: 1.07 MiB Sep 30 23:08:02 np0005463759.novalocal dracut[27280]: Duration: 0.076453 seconds Sep 30 23:08:02 np0005463759.novalocal dracut[27280]: *** Hardlinking files done *** Sep 30 23:08:02 np0005463759.novalocal dracut[27280]: dracut: using auto-determined compression method 'pigz' Sep 30 23:08:04 np0005463759.novalocal dracut[27280]: Image: /var/tmp/dracut.YGE6iA/initramfs.img: 116M Sep 30 23:08:04 np0005463759.novalocal dracut[27280]: ======================================================================== Sep 30 23:08:04 np0005463759.novalocal dracut[27280]: Early CPIO image Sep 30 23:08:04 np0005463759.novalocal dracut[27280]: ======================================================================== Sep 30 23:08:05 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 . Sep 30 23:08:05 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2 Aug 18 10:11 early_cpio Sep 30 23:08:05 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 kernel Sep 30 23:08:05 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 kernel/x86 Sep 30 23:08:05 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 kernel/x86/microcode Sep 30 23:08:05 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 20655104 Aug 18 10:11 kernel/x86/microcode/GenuineIntel.bin Sep 30 23:08:05 np0005463759.novalocal dracut[27280]: ======================================================================== Sep 30 23:08:05 np0005463759.novalocal dracut[27280]: Version: dracut-057-102.git20250818.el9 Sep 30 23:08:06 np0005463759.novalocal dracut[27280]: Arguments: -f Sep 30 23:08:06 np0005463759.novalocal dracut[27280]: dracut modules: Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: bash Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: systemd Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: fips Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: systemd-initrd Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: systemd-sysusers Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: modsign Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: dbus-broker Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: dbus Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: i18n Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: network-manager Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: network Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: ifcfg Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: prefixdevname Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: crypt Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: dm Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: kernel-modules Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: kernel-modules-extra Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: kernel-network-modules Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: nvdimm Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: qemu Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: qemu-net Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: lunmask Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: nfs Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: resume Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: rootfs-block Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: terminfo Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: udev-rules Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: virtfs Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: virtiofs Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: dracut-systemd Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: usrmount Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: base Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: fs-lib Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: microcode_ctl-fw_dir_override Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: openssl Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: shutdown Sep 30 23:08:07 np0005463759.novalocal dracut[27280]: ======================================================================== Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: drwxr-xr-x 12 root root 0 Aug 18 10:11 . Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: crw-r--r-- 1 root root 5, 1 Aug 18 10:11 dev/console Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: crw-r--r-- 1 root root 1, 11 Aug 18 10:11 dev/kmsg Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: crw-r--r-- 1 root root 1, 3 Aug 18 10:11 dev/null Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: crw-r--r-- 1 root root 1, 8 Aug 18 10:11 dev/random Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: crw-r--r-- 1 root root 1, 9 Aug 18 10:11 dev/urandom Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 7 Aug 18 10:11 bin -> usr/bin Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 dev Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: drwxr-xr-x 11 root root 0 Aug 18 10:11 etc Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 etc/authselect Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3012 Aug 18 10:11 etc/authselect/nsswitch.conf Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 etc/cmdline.d Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 etc/conf.d Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 124 Aug 18 10:11 etc/conf.d/systemd.conf Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 etc/crypto-policies Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 etc/crypto-policies/back-ends Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 57 Aug 18 10:11 etc/crypto-policies/back-ends/opensslcnf.config -> ../../../usr/share/crypto-policies/DEFAULT/opensslcnf.txt Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: drwxr-xr-x 7 root root 0 Aug 18 10:11 etc/dbus-1 Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 etc/dbus-1/interfaces Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 etc/dbus-1/services Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 etc/dbus-1/session.d Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 etc/dbus-1/system-services Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 etc/dbus-1/system.d Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 409 Jan 9 2020 etc/dbus-1/system.d/teamd.conf Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 147 Aug 18 10:11 etc/fipsmodules Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 0 Aug 18 10:11 etc/fstab.empty Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 270 Aug 18 10:11 etc/group Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5799 Aug 18 10:11 etc/idmapd.conf Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 25 Aug 18 10:11 etc/initrd-release -> ../usr/lib/initrd-release Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5447 Aug 18 10:11 etc/ld.so.cache Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 28 Aug 2 2021 etc/ld.so.conf Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: -r--r--r-- 1 root root 0 Aug 18 10:11 etc/machine-id Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 etc/modprobe.d Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 387 Aug 18 10:11 etc/modprobe.d/fips.conf Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 15 Aug 18 10:11 etc/modprobe.d/nfs.conf Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 17 Aug 18 10:11 etc/mtab -> /proc/self/mounts Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 767 Jul 30 2024 etc/netconfig Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 24 Aug 18 10:11 etc/nsswitch.conf -> authselect/nsswitch.conf Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 14 Aug 18 10:11 etc/os-release -> initrd-release Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 239 Aug 18 10:11 etc/passwd Sep 30 23:08:08 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 etc/pki Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 etc/pki/tls Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4690 Aug 18 10:11 etc/pki/tls/openssl.cnf Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6568 Jun 23 2020 etc/protocols Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1634 Aug 1 2021 etc/rpc Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 692252 Jun 23 2020 etc/services Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 etc/systemd Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 64 Aug 18 10:11 etc/systemd/journald.conf Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 7 root root 0 Aug 18 10:11 etc/systemd/system Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 43 Aug 18 10:11 etc/systemd/system/dbus.service -> /usr/lib/systemd/system/dbus-broker.service Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 37 Aug 18 10:11 etc/systemd/system/default.target -> /usr/lib/systemd/system/initrd.target Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 etc/systemd/system/emergency.target.wants Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 54 Aug 18 10:11 etc/systemd/system/emergency.target.wants/systemd-vconsole-setup.service -> /usr/lib/systemd/system/systemd-vconsole-setup.service Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 etc/systemd/system/initrd.target.wants Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 50 Aug 18 10:11 etc/systemd/system/initrd.target.wants/dracut-cmdline-ask.service -> /usr/lib/systemd/system/dracut-cmdline-ask.service Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 46 Aug 18 10:11 etc/systemd/system/initrd.target.wants/dracut-cmdline.service -> /usr/lib/systemd/system/dracut-cmdline.service Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 48 Aug 18 10:11 etc/systemd/system/initrd.target.wants/dracut-initqueue.service -> /usr/lib/systemd/system/dracut-initqueue.service Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 44 Aug 18 10:11 etc/systemd/system/initrd.target.wants/dracut-mount.service -> /usr/lib/systemd/system/dracut-mount.service Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 48 Aug 18 10:11 etc/systemd/system/initrd.target.wants/dracut-pre-mount.service -> /usr/lib/systemd/system/dracut-pre-mount.service Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 48 Aug 18 10:11 etc/systemd/system/initrd.target.wants/dracut-pre-pivot.service -> /usr/lib/systemd/system/dracut-pre-pivot.service Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 50 Aug 18 10:11 etc/systemd/system/initrd.target.wants/dracut-pre-trigger.service -> /usr/lib/systemd/system/dracut-pre-trigger.service Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 47 Aug 18 10:11 etc/systemd/system/initrd.target.wants/dracut-pre-udev.service -> /usr/lib/systemd/system/dracut-pre-udev.service Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 41 Aug 18 10:11 etc/systemd/system/initrd.target.wants/nm-initrd.service -> /usr/lib/systemd/system/nm-initrd.service Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 53 Aug 18 10:11 etc/systemd/system/initrd.target.wants/nm-wait-online-initrd.service -> /usr/lib/systemd/system/nm-wait-online-initrd.service Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 etc/systemd/system/network-online.target.wants Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 53 Aug 18 10:11 etc/systemd/system/network-online.target.wants/nm-wait-online-initrd.service -> /usr/lib/systemd/system/nm-wait-online-initrd.service Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 etc/systemd/system/rescue.target.wants Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 54 Aug 18 10:11 etc/systemd/system/rescue.target.wants/systemd-vconsole-setup.service -> /usr/lib/systemd/system/systemd-vconsole-setup.service Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 etc/systemd/system/systemd-ask-password-console.service.wants Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 54 Aug 18 10:11 etc/systemd/system/systemd-ask-password-console.service.wants/systemd-vconsole-setup.service -> /usr/lib/systemd/system/systemd-vconsole-setup.service Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 etc/udev Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 etc/udev/rules.d Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 142 Jun 19 2022 etc/udev/rules.d/11-dm.rules Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 680 Aug 18 10:11 etc/udev/rules.d/59-persistent-storage-dm.rules Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 297 Aug 18 10:11 etc/udev/rules.d/59-persistent-storage.rules Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1030 Aug 18 10:11 etc/udev/rules.d/61-persistent-storage.rules Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 305 Oct 31 2022 etc/udev/udev.conf Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 28 Aug 18 10:11 etc/vconsole.conf Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1184 Feb 26 2025 etc/virc Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 23 Aug 18 10:11 init -> usr/lib/systemd/systemd Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 7 Aug 18 10:11 lib -> usr/lib Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 9 Aug 18 10:11 lib64 -> usr/lib64 Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 proc Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 root Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 run Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 8 Aug 18 10:11 sbin -> usr/sbin Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 4631 Jun 19 2022 shutdown Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 sys Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 sysroot Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 tmp Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 8 root root 0 Aug 18 10:11 usr Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/bin Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 27896 Aug 18 10:11 usr/bin/arping Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 4 Aug 18 10:11 usr/bin/awk -> gawk Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 1389072 Feb 15 2024 usr/bin/bash Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 102544 Aug 15 09:14 usr/bin/busctl Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 36496 Dec 9 2024 usr/bin/cat Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 57496 Dec 9 2024 usr/bin/chmod Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 61632 Dec 9 2024 usr/bin/chown Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 152808 Dec 9 2024 usr/bin/cp Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 48936 Dec 9 2024 usr/bin/cut Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 236336 Aug 23 2022 usr/bin/dbus-broker Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 131896 Aug 23 2022 usr/bin/dbus-broker-launch Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 73672 Jan 16 2025 usr/bin/dmesg Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 2250 Jun 19 2022 usr/bin/dracut-cmdline Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 431 Jun 19 2022 usr/bin/dracut-cmdline-ask Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 1638 Aug 18 10:10 usr/bin/dracut-emergency Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 11 Aug 18 10:11 usr/bin/dracut-getarg -> dracut-util Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 11 Aug 18 10:11 usr/bin/dracut-getargs -> dracut-util Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 2678 Jun 19 2022 usr/bin/dracut-initqueue Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 1095 Jun 19 2022 usr/bin/dracut-mount Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 508 Jun 19 2022 usr/bin/dracut-pre-mount Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 903 Jun 19 2022 usr/bin/dracut-pre-pivot Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 474 Jun 19 2022 usr/bin/dracut-pre-trigger Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 1415 Jun 19 2022 usr/bin/dracut-pre-udev Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 15512 Aug 18 10:11 usr/bin/dracut-util Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 36312 Dec 9 2024 usr/bin/echo Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 291760 Jul 4 2024 usr/bin/find Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 66472 Jan 16 2025 usr/bin/findmnt Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 24104 Jan 16 2025 usr/bin/flock Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 714976 Feb 16 2022 usr/bin/gawk Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 158176 Aug 9 2021 usr/bin/grep Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 91792 Apr 21 2022 usr/bin/gzip Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 90208 Aug 15 09:14 usr/bin/journalctl Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 16064 Jan 9 2025 usr/bin/kbd_mode Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 65560 Oct 17 2022 usr/bin/keyctl Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 169544 Aug 18 08:59 usr/bin/kmod Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 202432 Jul 2 09:45 usr/bin/less Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 61592 Dec 9 2024 usr/bin/ln Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 205336 Jan 9 2025 usr/bin/loadkeys Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 4 Aug 18 10:11 usr/bin/loginctl -> true Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 140928 Dec 9 2024 usr/bin/ls Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 69936 Dec 9 2024 usr/bin/mkdir Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 40776 Dec 9 2024 usr/bin/mkfifo Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 44912 Dec 9 2024 usr/bin/mknod Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 48648 Jan 16 2025 usr/bin/mount Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 144536 Dec 9 2024 usr/bin/mv Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 23936 Aug 18 10:11 usr/bin/nm-online Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 1079664 Aug 18 10:11 usr/bin/nmcli Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 32256 Jan 23 2024 usr/bin/pgrep Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 144632 Jan 23 2024 usr/bin/ps Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 40624 Dec 9 2024 usr/bin/readlink Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 61640 Dec 9 2024 usr/bin/rm Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 61400 Feb 15 2024 usr/bin/rpcbind Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 116728 Aug 10 2021 usr/bin/sed Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 53064 Jan 9 2025 usr/bin/setfont Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 15696 Jan 16 2025 usr/bin/setsid Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 4 Aug 18 10:11 usr/bin/sh -> bash Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 36296 Dec 7 2023 usr/bin/sha512hmac Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 36496 Dec 9 2024 usr/bin/sleep Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 115800 Dec 9 2024 usr/bin/sort Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 81968 Dec 9 2024 usr/bin/stat Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 77632 Dec 9 2024 usr/bin/stty Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 305576 Aug 15 09:14 usr/bin/systemctl Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 19920 Aug 15 09:14 usr/bin/systemd-ask-password Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 24024 Aug 15 09:14 usr/bin/systemd-cgls Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 23808 Aug 15 09:14 usr/bin/systemd-escape Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 65544 Aug 15 09:14 usr/bin/systemd-run Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 74088 Aug 15 09:14 usr/bin/systemd-sysusers Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 127520 Aug 15 09:14 usr/bin/systemd-tmpfiles Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 40296 Aug 15 09:14 usr/bin/systemd-tty-ask-password-agent Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 69712 Dec 9 2024 usr/bin/tail Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 170592 Dec 7 2022 usr/bin/teamd Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 41120 Dec 9 2024 usr/bin/timeout Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 49000 Dec 9 2024 usr/bin/tr Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 28112 Dec 9 2024 usr/bin/true Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 597808 Aug 15 09:14 usr/bin/udevadm Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 36280 Jan 16 2025 usr/bin/umount Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 32416 Dec 9 2024 usr/bin/uname Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 691 Feb 26 2025 usr/bin/vi Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 12 root root 0 Aug 18 10:11 usr/lib Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/NetworkManager Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/NetworkManager/conf.d Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 54 Jun 19 2022 usr/lib/NetworkManager/conf.d/initrd-no-auto-default.conf Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/dracut Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 8167 Jun 19 2022 usr/lib/dracut-crypt-lib.sh Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 4069 Jun 19 2022 usr/lib/dracut-dev-lib.sh Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 28857 Jun 19 2022 usr/lib/dracut-lib.sh Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4 Aug 18 10:11 usr/lib/dracut/build-parameter.txt Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 31 Aug 18 10:11 usr/lib/dracut/dracut-057-102.git20250818.el9 Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 15 root root 0 Aug 18 10:11 usr/lib/dracut/hooks Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/dracut/hooks/cleanup Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 867 Jun 19 2022 usr/lib/dracut/hooks/cleanup/99-nfsroot-cleanup.sh Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/dracut/hooks/cmdline Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 8087 Jun 19 2022 usr/lib/dracut/hooks/cmdline/30-parse-crypt.sh Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 1247 Jun 19 2022 usr/lib/dracut/hooks/cmdline/30-parse-lunmask.sh Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 3474 Jun 19 2022 usr/lib/dracut/hooks/cmdline/90-parse-nfsroot.sh Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 918 Jun 19 2022 usr/lib/dracut/hooks/cmdline/91-dhcp-root.sh Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 128 Jun 19 2022 usr/lib/dracut/hooks/cmdline/95-parse-virtfs.sh Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 208 Jun 19 2022 usr/lib/dracut/hooks/cmdline/95-parse-virtiofs.sh Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 1083 Jun 19 2022 usr/lib/dracut/hooks/cmdline/99-nm-config.sh Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/dracut/hooks/emergency Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 6 root root 0 Aug 18 10:11 usr/lib/dracut/hooks/initqueue Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/dracut/hooks/initqueue/finished Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/dracut/hooks/initqueue/online Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/dracut/hooks/initqueue/settled Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 2232 Aug 18 10:10 usr/lib/dracut/hooks/initqueue/settled/99-nm-run.sh Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/dracut/hooks/initqueue/timeout Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 463 Jun 19 2022 usr/lib/dracut/hooks/initqueue/timeout/99-rootfallback.sh Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/dracut/hooks/mount Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 1911 Jun 19 2022 usr/lib/dracut/hooks/mount/99-mount-virtfs.sh Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/dracut/hooks/netroot Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/dracut/hooks/pre-mount Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 637 Jun 19 2022 usr/lib/dracut/hooks/pre-mount/99-mount-virtiofs.sh Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/dracut/hooks/pre-pivot Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 490 Aug 18 10:10 usr/lib/dracut/hooks/pre-pivot/00-fips-boot.sh Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 472 Aug 18 10:10 usr/lib/dracut/hooks/pre-pivot/01-fips-noboot.sh Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 9387 Jun 19 2022 usr/lib/dracut/hooks/pre-pivot/85-write-ifcfg.sh Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/dracut/hooks/pre-shutdown Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/dracut/hooks/pre-trigger Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 239 Jun 19 2022 usr/lib/dracut/hooks/pre-trigger/01-load-modsign-keys.sh Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/dracut/hooks/pre-udev Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr--r-- 1 root root 443 Aug 18 10:10 usr/lib/dracut/hooks/pre-udev/01-fips-load-crypto.sh Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 107 Jun 19 2022 usr/lib/dracut/hooks/pre-udev/30-dm-pre-udev.sh Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 1148 Jun 19 2022 usr/lib/dracut/hooks/pre-udev/50-ifname-genrules.sh Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 982 Jun 19 2022 usr/lib/dracut/hooks/pre-udev/99-nfs-start-rpc.sh Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/dracut/hooks/shutdown Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/dracut/hooks/shutdown-emergency Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 1261 Jun 19 2022 usr/lib/dracut/hooks/shutdown/25-dm-shutdown.sh Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 364 Aug 18 10:11 usr/lib/dracut/modules.txt Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 0 Aug 18 10:11 usr/lib/dracut/need-initqueue Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 6695 Jun 19 2022 usr/lib/fs-lib.sh Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 0 Aug 18 10:11 usr/lib/group Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 504 Aug 18 10:11 usr/lib/initrd-release Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 6 root root 0 Aug 18 10:11 usr/lib/kbd Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/kbd/consolefonts Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3019 Jan 9 2025 usr/lib/kbd/consolefonts/161.cp.gz Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3086 Jan 9 2025 usr/lib/kbd/consolefonts/162.cp.gz Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3069 Jan 9 2025 usr/lib/kbd/consolefonts/163.cp.gz Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3136 Jan 9 2025 usr/lib/kbd/consolefonts/164.cp.gz Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3247 Jan 9 2025 usr/lib/kbd/consolefonts/165.cp.gz Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2948 Jan 9 2025 usr/lib/kbd/consolefonts/737.cp.gz Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2914 Jan 9 2025 usr/lib/kbd/consolefonts/880.cp.gz Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2759 Jan 9 2025 usr/lib/kbd/consolefonts/928.cp.gz Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2159 Jan 9 2025 usr/lib/kbd/consolefonts/972.cp.gz Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3791 Jan 9 2025 usr/lib/kbd/consolefonts/Agafari-12.psfu.gz Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3839 Jan 9 2025 usr/lib/kbd/consolefonts/Agafari-14.psfu.gz Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3904 Jan 9 2025 usr/lib/kbd/consolefonts/Agafari-16.psfu.gz Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1985 Jan 9 2025 usr/lib/kbd/consolefonts/Cyr_a8x14.psfu.gz Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2020 Jan 9 2025 usr/lib/kbd/consolefonts/Cyr_a8x16.psfu.gz Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1751 Jan 9 2025 usr/lib/kbd/consolefonts/Cyr_a8x8.psfu.gz Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 191 Jan 9 2025 usr/lib/kbd/consolefonts/ERRORS Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3702 Jan 9 2025 usr/lib/kbd/consolefonts/Goha-12.psfu.gz Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3715 Jan 9 2025 usr/lib/kbd/consolefonts/Goha-14.psfu.gz Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3779 Jan 9 2025 usr/lib/kbd/consolefonts/Goha-16.psfu.gz Sep 30 23:08:09 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3698 Jan 9 2025 usr/lib/kbd/consolefonts/GohaClassic-12.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3724 Jan 9 2025 usr/lib/kbd/consolefonts/GohaClassic-14.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3789 Jan 9 2025 usr/lib/kbd/consolefonts/GohaClassic-16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2022 Jan 9 2025 usr/lib/kbd/consolefonts/Lat2-Terminus16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3584 Jan 9 2025 usr/lib/kbd/consolefonts/LatArCyrHeb-08.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4089 Jan 9 2025 usr/lib/kbd/consolefonts/LatArCyrHeb-14.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4184 Jan 9 2025 usr/lib/kbd/consolefonts/LatArCyrHeb-16+.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4096 Jan 9 2025 usr/lib/kbd/consolefonts/LatArCyrHeb-16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4260 Jan 9 2025 usr/lib/kbd/consolefonts/LatArCyrHeb-19.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6004 Jan 9 2025 usr/lib/kbd/consolefonts/LatGrkCyr-12x22.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3813 Jan 9 2025 usr/lib/kbd/consolefonts/LatGrkCyr-8x16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4113 Jan 9 2025 usr/lib/kbd/consolefonts/LatKaCyrHeb-14.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1387 Jan 9 2025 usr/lib/kbd/consolefonts/Mik_8x16.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2709 Jan 9 2025 usr/lib/kbd/consolefonts/UniCyrExt_8x16.psf.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1929 Jan 9 2025 usr/lib/kbd/consolefonts/UniCyr_8x14.psf.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1996 Jan 9 2025 usr/lib/kbd/consolefonts/UniCyr_8x16.psf.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1728 Jan 9 2025 usr/lib/kbd/consolefonts/UniCyr_8x8.psf.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1290 Jan 9 2025 usr/lib/kbd/consolefonts/alt-8x14.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1488 Jan 9 2025 usr/lib/kbd/consolefonts/alt-8x16.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1084 Jan 9 2025 usr/lib/kbd/consolefonts/alt-8x8.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1415 Jan 9 2025 usr/lib/kbd/consolefonts/altc-8x16.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1114 Jan 9 2025 usr/lib/kbd/consolefonts/aply16.psf.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1593 Jan 9 2025 usr/lib/kbd/consolefonts/arm8.fnt.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1877 Jan 9 2025 usr/lib/kbd/consolefonts/cp1250.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1963 Jan 9 2025 usr/lib/kbd/consolefonts/cp850-8x14.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2025 Jan 9 2025 usr/lib/kbd/consolefonts/cp850-8x16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1760 Jan 9 2025 usr/lib/kbd/consolefonts/cp850-8x8.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1106 Jan 9 2025 usr/lib/kbd/consolefonts/cp857.08.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1282 Jan 9 2025 usr/lib/kbd/consolefonts/cp857.14.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1342 Jan 9 2025 usr/lib/kbd/consolefonts/cp857.16.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1989 Jan 9 2025 usr/lib/kbd/consolefonts/cp865-8x14.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2050 Jan 9 2025 usr/lib/kbd/consolefonts/cp865-8x16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1768 Jan 9 2025 usr/lib/kbd/consolefonts/cp865-8x8.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1329 Jan 9 2025 usr/lib/kbd/consolefonts/cp866-8x14.psf.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1351 Jan 9 2025 usr/lib/kbd/consolefonts/cp866-8x16.psf.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1112 Jan 9 2025 usr/lib/kbd/consolefonts/cp866-8x8.psf.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1212 Jan 9 2025 usr/lib/kbd/consolefonts/cybercafe.fnt.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2070 Jan 9 2025 usr/lib/kbd/consolefonts/cyr-sun16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2076 Jan 9 2025 usr/lib/kbd/consolefonts/default8x16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1879 Jan 9 2025 usr/lib/kbd/consolefonts/default8x9.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3412 Jan 9 2025 usr/lib/kbd/consolefonts/drdos8x14.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3486 Jan 9 2025 usr/lib/kbd/consolefonts/drdos8x16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2558 Jan 9 2025 usr/lib/kbd/consolefonts/drdos8x6.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3065 Jan 9 2025 usr/lib/kbd/consolefonts/drdos8x8.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4126 Jan 9 2025 usr/lib/kbd/consolefonts/eurlatgr.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1707 Jan 9 2025 usr/lib/kbd/consolefonts/gr737a-8x8.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1915 Jan 9 2025 usr/lib/kbd/consolefonts/gr737a-9x14.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1975 Jan 9 2025 usr/lib/kbd/consolefonts/gr737a-9x16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1819 Jan 9 2025 usr/lib/kbd/consolefonts/gr737b-8x11.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2137 Jan 9 2025 usr/lib/kbd/consolefonts/gr737b-9x16-medieval.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1932 Jan 9 2025 usr/lib/kbd/consolefonts/gr737c-8x14.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/consolefonts/gr737c-8x16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1516 Jan 9 2025 usr/lib/kbd/consolefonts/gr737c-8x6.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1563 Jan 9 2025 usr/lib/kbd/consolefonts/gr737c-8x7.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1743 Jan 9 2025 usr/lib/kbd/consolefonts/gr737c-8x8.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 1970 Jan 9 2025 usr/lib/kbd/consolefonts/gr737d-8x16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1737 Jan 9 2025 usr/lib/kbd/consolefonts/gr928-8x16-thin.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1774 Jan 9 2025 usr/lib/kbd/consolefonts/gr928-9x14.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1809 Jan 9 2025 usr/lib/kbd/consolefonts/gr928-9x16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1784 Jan 9 2025 usr/lib/kbd/consolefonts/gr928a-8x14.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1824 Jan 9 2025 usr/lib/kbd/consolefonts/gr928a-8x16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2057 Jan 9 2025 usr/lib/kbd/consolefonts/gr928b-8x14.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2100 Jan 9 2025 usr/lib/kbd/consolefonts/gr928b-8x16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3162 Jan 9 2025 usr/lib/kbd/consolefonts/greek-polytonic.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/consolefonts/iso01-12x22.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85 Jan 9 2025 usr/lib/kbd/consolefonts/iso01.08.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85 Jan 9 2025 usr/lib/kbd/consolefonts/iso01.14.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85 Jan 9 2025 usr/lib/kbd/consolefonts/iso01.16.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 3211 Jan 9 2025 usr/lib/kbd/consolefonts/iso02-12x22.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85 Jan 9 2025 usr/lib/kbd/consolefonts/iso02.08.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85 Jan 9 2025 usr/lib/kbd/consolefonts/iso02.14.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85 Jan 9 2025 usr/lib/kbd/consolefonts/iso02.16.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85 Jan 9 2025 usr/lib/kbd/consolefonts/iso03.08.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85 Jan 9 2025 usr/lib/kbd/consolefonts/iso03.14.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85 Jan 9 2025 usr/lib/kbd/consolefonts/iso03.16.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85 Jan 9 2025 usr/lib/kbd/consolefonts/iso04.08.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85 Jan 9 2025 usr/lib/kbd/consolefonts/iso04.14.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85 Jan 9 2025 usr/lib/kbd/consolefonts/iso04.16.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85 Jan 9 2025 usr/lib/kbd/consolefonts/iso05.08.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85 Jan 9 2025 usr/lib/kbd/consolefonts/iso05.14.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85 Jan 9 2025 usr/lib/kbd/consolefonts/iso05.16.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85 Jan 9 2025 usr/lib/kbd/consolefonts/iso06.08.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85 Jan 9 2025 usr/lib/kbd/consolefonts/iso06.14.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85 Jan 9 2025 usr/lib/kbd/consolefonts/iso06.16.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85 Jan 9 2025 usr/lib/kbd/consolefonts/iso07.14.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85 Jan 9 2025 usr/lib/kbd/consolefonts/iso07.16.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2082 Jan 9 2025 usr/lib/kbd/consolefonts/iso07u-16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85 Jan 9 2025 usr/lib/kbd/consolefonts/iso08.08.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85 Jan 9 2025 usr/lib/kbd/consolefonts/iso08.14.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85 Jan 9 2025 usr/lib/kbd/consolefonts/iso08.16.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85 Jan 9 2025 usr/lib/kbd/consolefonts/iso09.08.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85 Jan 9 2025 usr/lib/kbd/consolefonts/iso09.14.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85 Jan 9 2025 usr/lib/kbd/consolefonts/iso09.16.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 86 Jan 9 2025 usr/lib/kbd/consolefonts/iso10.08.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 86 Jan 9 2025 usr/lib/kbd/consolefonts/iso10.14.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 86 Jan 9 2025 usr/lib/kbd/consolefonts/iso10.16.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1261 Jan 9 2025 usr/lib/kbd/consolefonts/koi8-14.psf.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1412 Jan 9 2025 usr/lib/kbd/consolefonts/koi8c-8x16.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1299 Jan 9 2025 usr/lib/kbd/consolefonts/koi8r-8x14.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1493 Jan 9 2025 usr/lib/kbd/consolefonts/koi8r-8x16.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1090 Jan 9 2025 usr/lib/kbd/consolefonts/koi8r-8x8.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1768 Jan 9 2025 usr/lib/kbd/consolefonts/koi8r.8x8.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2090 Jan 9 2025 usr/lib/kbd/consolefonts/koi8u_8x14.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2111 Jan 9 2025 usr/lib/kbd/consolefonts/koi8u_8x16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1835 Jan 9 2025 usr/lib/kbd/consolefonts/koi8u_8x8.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1790 Jan 9 2025 usr/lib/kbd/consolefonts/lat0-08.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1868 Jan 9 2025 usr/lib/kbd/consolefonts/lat0-10.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1978 Jan 9 2025 usr/lib/kbd/consolefonts/lat0-12.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2011 Jan 9 2025 usr/lib/kbd/consolefonts/lat0-14.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2063 Jan 9 2025 usr/lib/kbd/consolefonts/lat0-16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1989 Jan 9 2025 usr/lib/kbd/consolefonts/lat0-sun16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1779 Jan 9 2025 usr/lib/kbd/consolefonts/lat1-08.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1861 Jan 9 2025 usr/lib/kbd/consolefonts/lat1-10.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1964 Jan 9 2025 usr/lib/kbd/consolefonts/lat1-12.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1998 Jan 9 2025 usr/lib/kbd/consolefonts/lat1-14.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2076 Jan 9 2025 usr/lib/kbd/consolefonts/lat1-16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1748 Jan 9 2025 usr/lib/kbd/consolefonts/lat2-08.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1868 Jan 9 2025 usr/lib/kbd/consolefonts/lat2-10.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1910 Jan 9 2025 usr/lib/kbd/consolefonts/lat2-12.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1982 Jan 9 2025 usr/lib/kbd/consolefonts/lat2-14.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1991 Jan 9 2025 usr/lib/kbd/consolefonts/lat2-16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1984 Jan 9 2025 usr/lib/kbd/consolefonts/lat2-sun16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2018 Jan 9 2025 usr/lib/kbd/consolefonts/lat2a-16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1821 Jan 9 2025 usr/lib/kbd/consolefonts/lat4-08.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1925 Jan 9 2025 usr/lib/kbd/consolefonts/lat4-10.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1995 Jan 9 2025 usr/lib/kbd/consolefonts/lat4-12.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2046 Jan 9 2025 usr/lib/kbd/consolefonts/lat4-14.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2151 Jan 9 2025 usr/lib/kbd/consolefonts/lat4-16+.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2057 Jan 9 2025 usr/lib/kbd/consolefonts/lat4-16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2197 Jan 9 2025 usr/lib/kbd/consolefonts/lat4-19.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1820 Jan 9 2025 usr/lib/kbd/consolefonts/lat4a-08.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1927 Jan 9 2025 usr/lib/kbd/consolefonts/lat4a-10.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1995 Jan 9 2025 usr/lib/kbd/consolefonts/lat4a-12.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2048 Jan 9 2025 usr/lib/kbd/consolefonts/lat4a-14.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2152 Jan 9 2025 usr/lib/kbd/consolefonts/lat4a-16+.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2054 Jan 9 2025 usr/lib/kbd/consolefonts/lat4a-16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2193 Jan 9 2025 usr/lib/kbd/consolefonts/lat4a-19.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1965 Jan 9 2025 usr/lib/kbd/consolefonts/lat5-12.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1995 Jan 9 2025 usr/lib/kbd/consolefonts/lat5-14.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2061 Jan 9 2025 usr/lib/kbd/consolefonts/lat5-16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1838 Jan 9 2025 usr/lib/kbd/consolefonts/lat7-14.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2083 Jan 9 2025 usr/lib/kbd/consolefonts/lat7a-14.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1372 Jan 9 2025 usr/lib/kbd/consolefonts/lat7a-16.psf.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1099 Jan 9 2025 usr/lib/kbd/consolefonts/lat9-08.psf.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1175 Jan 9 2025 usr/lib/kbd/consolefonts/lat9-10.psf.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1290 Jan 9 2025 usr/lib/kbd/consolefonts/lat9-12.psf.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1308 Jan 9 2025 usr/lib/kbd/consolefonts/lat9-14.psf.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1364 Jan 9 2025 usr/lib/kbd/consolefonts/lat9-16.psf.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1783 Jan 9 2025 usr/lib/kbd/consolefonts/lat9u-08.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1865 Jan 9 2025 usr/lib/kbd/consolefonts/lat9u-10.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1976 Jan 9 2025 usr/lib/kbd/consolefonts/lat9u-12.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2009 Jan 9 2025 usr/lib/kbd/consolefonts/lat9u-14.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2061 Jan 9 2025 usr/lib/kbd/consolefonts/lat9u-16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1771 Jan 9 2025 usr/lib/kbd/consolefonts/lat9v-08.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1853 Jan 9 2025 usr/lib/kbd/consolefonts/lat9v-10.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1973 Jan 9 2025 usr/lib/kbd/consolefonts/lat9v-12.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1999 Jan 9 2025 usr/lib/kbd/consolefonts/lat9v-14.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2054 Jan 9 2025 usr/lib/kbd/consolefonts/lat9v-16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1787 Jan 9 2025 usr/lib/kbd/consolefonts/lat9w-08.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1870 Jan 9 2025 usr/lib/kbd/consolefonts/lat9w-10.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1989 Jan 9 2025 usr/lib/kbd/consolefonts/lat9w-12.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2015 Jan 9 2025 usr/lib/kbd/consolefonts/lat9w-14.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2069 Jan 9 2025 usr/lib/kbd/consolefonts/lat9w-16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3803 Jan 9 2025 usr/lib/kbd/consolefonts/latarcyrheb-sun16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5171 Jan 9 2025 usr/lib/kbd/consolefonts/latarcyrheb-sun32.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3412 Jan 9 2025 usr/lib/kbd/consolefonts/pancyrillic.f16.psfu.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/kbd/consolefonts/partialfonts Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 693 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-1.a0-ff.08.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 805 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-1.a0-ff.14.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 812 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-1.a0-ff.16.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 710 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-10.a0-ff.08.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 818 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-10.a0-ff.14.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 825 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-10.a0-ff.16.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 713 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-2.a0-ff.08.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 803 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-2.a0-ff.14.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 800 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-2.a0-ff.16.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 659 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-3.a0-ff.08.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 744 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-3.a0-ff.14.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 752 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-3.a0-ff.16.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 707 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-4.a0-ff.08.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 819 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-4.a0-ff.14.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 822 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-4.a0-ff.16.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 709 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-5.a0-ff.08.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 800 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-5.a0-ff.14.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 825 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-5.a0-ff.16.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 436 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-6.a0-ff.08.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 498 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-6.a0-ff.14.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 499 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-6.a0-ff.16.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 648 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-7.a0-ff.08.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 803 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-7.a0-ff.14.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 818 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-7.a0-ff.16.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 501 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-8.a0-ff.08.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 565 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-8.a0-ff.14.gz Sep 30 23:08:10 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 576 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-8.a0-ff.16.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 699 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-9.a0-ff.08.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 791 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-9.a0-ff.14.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 814 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/8859-9.a0-ff.16.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 650 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/ascii.20-7f.08.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 749 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/ascii.20-7f.14.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 778 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/ascii.20-7f.16.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 330 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/cp437.00-1f.08.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 371 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/cp437.00-1f.14.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 380 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/cp437.00-1f.16.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 36 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/none.00-17.08.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 40 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/none.00-17.14.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 40 Jan 9 2025 usr/lib/kbd/consolefonts/partialfonts/none.00-17.16.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2084 Jan 9 2025 usr/lib/kbd/consolefonts/ruscii_8x16.psfu.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2059 Jan 9 2025 usr/lib/kbd/consolefonts/ruscii_8x8.psfu.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3928 Jan 9 2025 usr/lib/kbd/consolefonts/solar24x32.psfu.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3287 Jan 9 2025 usr/lib/kbd/consolefonts/sun12x22.psfu.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1467 Jan 9 2025 usr/lib/kbd/consolefonts/t.fnt.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1515 Jan 9 2025 usr/lib/kbd/consolefonts/t850b.fnt.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1363 Jan 9 2025 usr/lib/kbd/consolefonts/tcvn8x16.psf.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1891 Jan 9 2025 usr/lib/kbd/consolefonts/viscii10-8x16.psfu.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/kbd/consoletrans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9216 Jan 9 2025 usr/lib/kbd/consoletrans/8859-10_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8994 Jan 9 2025 usr/lib/kbd/consoletrans/8859-13_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9279 Jan 9 2025 usr/lib/kbd/consoletrans/8859-14_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8839 Jan 9 2025 usr/lib/kbd/consoletrans/8859-15_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8806 Jan 9 2025 usr/lib/kbd/consoletrans/8859-1_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9034 Jan 9 2025 usr/lib/kbd/consoletrans/8859-2_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8712 Jan 9 2025 usr/lib/kbd/consoletrans/8859-3_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9006 Jan 9 2025 usr/lib/kbd/consoletrans/8859-4_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8645 Jan 9 2025 usr/lib/kbd/consoletrans/8859-5_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6418 Jan 9 2025 usr/lib/kbd/consoletrans/8859-6_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8471 Jan 9 2025 usr/lib/kbd/consoletrans/8859-7_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6566 Jan 9 2025 usr/lib/kbd/consoletrans/8859-8_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8786 Jan 9 2025 usr/lib/kbd/consoletrans/8859-9_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1698 Jan 9 2025 usr/lib/kbd/consoletrans/baltic.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9307 Jan 9 2025 usr/lib/kbd/consoletrans/cp1250_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9769 Jan 9 2025 usr/lib/kbd/consoletrans/cp1251_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1834 Jan 9 2025 usr/lib/kbd/consoletrans/cp437_to_iso01.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9529 Jan 9 2025 usr/lib/kbd/consoletrans/cp437_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9568 Jan 9 2025 usr/lib/kbd/consoletrans/cp737_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9500 Jan 9 2025 usr/lib/kbd/consoletrans/cp775_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1172 Jan 9 2025 usr/lib/kbd/consoletrans/cp850_to_iso01.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9378 Jan 9 2025 usr/lib/kbd/consoletrans/cp850_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9677 Jan 9 2025 usr/lib/kbd/consoletrans/cp852_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9562 Jan 9 2025 usr/lib/kbd/consoletrans/cp853_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9293 Jan 9 2025 usr/lib/kbd/consoletrans/cp855_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9369 Jan 9 2025 usr/lib/kbd/consoletrans/cp857_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9570 Jan 9 2025 usr/lib/kbd/consoletrans/cp860_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9554 Jan 9 2025 usr/lib/kbd/consoletrans/cp861_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9133 Jan 9 2025 usr/lib/kbd/consoletrans/cp862_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9427 Jan 9 2025 usr/lib/kbd/consoletrans/cp863_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9333 Jan 9 2025 usr/lib/kbd/consoletrans/cp864_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9549 Jan 9 2025 usr/lib/kbd/consoletrans/cp865_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9475 Jan 9 2025 usr/lib/kbd/consoletrans/cp866_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9109 Jan 9 2025 usr/lib/kbd/consoletrans/cp869_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8219 Jan 9 2025 usr/lib/kbd/consoletrans/cp874_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5914 Jan 9 2025 usr/lib/kbd/consoletrans/iso02_to_cp1250.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2455 Jan 9 2025 usr/lib/kbd/consoletrans/koi2alt Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 10105 Jan 9 2025 usr/lib/kbd/consoletrans/koi8-r_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 10067 Jan 9 2025 usr/lib/kbd/consoletrans/koi8-u_to_uni.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1468 Jan 9 2025 usr/lib/kbd/consoletrans/koi8u2ruscii Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 256 Jan 9 2025 usr/lib/kbd/consoletrans/latin2u.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 923 Jan 9 2025 usr/lib/kbd/consoletrans/null Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2122 Jan 9 2025 usr/lib/kbd/consoletrans/space Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1891 Jan 9 2025 usr/lib/kbd/consoletrans/trivial Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1698 Jan 9 2025 usr/lib/kbd/consoletrans/vga2iso Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1418 Jan 9 2025 usr/lib/kbd/consoletrans/viscii1.0_to_tcvn.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1847 Jan 9 2025 usr/lib/kbd/consoletrans/viscii1.0_to_viscii1.1.trans Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1747 Jan 9 2025 usr/lib/kbd/consoletrans/zero Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: drwxr-xr-x 4 root root 0 Aug 18 10:11 usr/lib/kbd/keymaps Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: drwxr-xr-x 9 root root 0 Aug 18 10:11 usr/lib/kbd/keymaps/legacy Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/kbd/keymaps/legacy/amiga Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2970 Jan 9 2025 usr/lib/kbd/keymaps/legacy/amiga/amiga-de.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1889 Jan 9 2025 usr/lib/kbd/keymaps/legacy/amiga/amiga-us.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/kbd/keymaps/legacy/atari Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2741 Jan 9 2025 usr/lib/kbd/keymaps/legacy/atari/atari-de.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2925 Jan 9 2025 usr/lib/kbd/keymaps/legacy/atari/atari-se.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2767 Jan 9 2025 usr/lib/kbd/keymaps/legacy/atari/atari-uk-falcon.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2985 Jan 9 2025 usr/lib/kbd/keymaps/legacy/atari/atari-us.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: drwxr-xr-x 13 root root 0 Aug 18 10:11 usr/lib/kbd/keymaps/legacy/i386 Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/kbd/keymaps/legacy/i386/azerty Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 886 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/azerty/azerty.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 901 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/azerty/be-latin1.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 3 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/azerty/fr-latin0.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 873 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/azerty/fr-latin1.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 3 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/azerty/fr-latin9.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 842 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/azerty/fr-old.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 957 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/azerty/fr-pc.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 3 root root 5683 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/azerty/fr.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 343 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/azerty/wangbe.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1786 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/azerty/wangbe2.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/kbd/keymaps/legacy/i386/bepo Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5617 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/bepo/fr-bepo-latin9.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1913 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/bepo/fr-bepo.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/kbd/keymaps/legacy/i386/carpalx Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 198 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/carpalx/carpalx-full.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 819 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/carpalx/carpalx.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/kbd/keymaps/legacy/i386/colemak Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1449 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/colemak/en-latin9.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/kbd/keymaps/legacy/i386/dvorak Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 145 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/dvorak/ANSI-dvorak.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1314 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/dvorak/dvorak-ca-fr.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1312 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/dvorak/dvorak-es.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1227 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/dvorak/dvorak-fr.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1205 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/dvorak/dvorak-l.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 904 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/dvorak/dvorak-la.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1045 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/dvorak/dvorak-no.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1098 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/dvorak/dvorak-programmer.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1202 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/dvorak/dvorak-r.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2598 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/dvorak/dvorak-ru.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1242 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/dvorak/dvorak-sv-a1.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1023 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/dvorak/dvorak-sv-a5.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 841 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/dvorak/dvorak-uk.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 890 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/dvorak/dvorak-ukp.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 782 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/dvorak/dvorak.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/kbd/keymaps/legacy/i386/fgGIod Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2258 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/fgGIod/tr_f-latin5.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1035 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/fgGIod/trf-fgGIod.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/kbd/keymaps/legacy/i386/include Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 230 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/include/applkey.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 438 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/include/azerty-layout.inc Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 65 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/include/backspace.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 278 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/include/compose.inc Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 126 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/include/ctrl.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 182 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/include/euro.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 253 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/include/euro1.inc Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 193 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/include/euro1.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 194 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/include/euro2.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 453 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/include/keypad.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4353 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/include/linux-keys-bare.inc Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1148 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/include/linux-keys-extd.inc Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 746 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/include/linux-with-alt-and-altgr.inc Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3029 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/include/linux-with-modeshift-altgr.inc Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 146 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/include/linux-with-two-alt-keys.inc Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 456 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/include/qwerty-layout.inc Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 456 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/include/qwertz-layout.inc Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 426 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/include/unicode.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 116 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/include/windowkeys.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/kbd/keymaps/legacy/i386/neo Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4702 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/neo/adnw.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4694 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/neo/bone.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4659 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/neo/koy.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9439 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/neo/neo.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4707 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/neo/neoqwertz.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/kbd/keymaps/legacy/i386/olpc Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 876 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/olpc/es-olpc.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 852 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/olpc/pt-olpc.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/kbd/keymaps/legacy/i386/qwerty Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2499 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/bashkir.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2981 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/bg-cp1251.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2328 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/bg-cp855.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4627 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/bg_bds-cp1251.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4622 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/bg_bds-utf8.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4540 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/bg_pho-cp1251.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4528 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/bg_pho-utf8.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2026 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/br-abnt.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1168 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/br-abnt2.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1106 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/br-latin1-abnt2.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 984 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/br-latin1-us.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2332 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/by-cp1251.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2854 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/by.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2330 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/bywin-cp1251.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1134 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ca.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1174 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/cf.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2568 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/cz-cp1250.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2726 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/cz-lat2-prog.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2655 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/cz-lat2.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8760 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/cz-qwerty.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2408 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/defkeymap.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2181 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/defkeymap_V1.0.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 962 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/dk-latin1.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 941 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/dk.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 987 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/emacs.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 775 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/emacs2.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1511 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/es-cp850.map.gz Sep 30 23:08:11 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1133 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/es.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 153 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/et-nodeadkeys.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1141 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/et.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1821 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/fa.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1463 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/fi.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2377 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/gr-pc.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3660 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/gr.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1313 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/hu101.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 12055 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/hypermap.m4 Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1445 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/il-heb.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1360 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/il-phonetic.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2410 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/il.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1762 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/is-latin1-us.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1216 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/is-latin1.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1054 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/it-ibm.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1230 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/it.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2046 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/it2.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 779 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/jp106.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2495 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/kazakh.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ko.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3387 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ky_alt_sh-UTF-8.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2420 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/kyrgyz.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1058 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/la-latin1.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2313 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/lt.baltic.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6095 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/lt.l4.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6172 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/lt.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 542 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/lv-tilde.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1285 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/lv.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3147 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/mk-cp1251.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3201 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/mk-utf.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3164 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/mk.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1745 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/mk0.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1075 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/nl.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1220 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/nl2.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1714 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/no-latin1.doc Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1533 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/no-latin1.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 835 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/no.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 387 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/pc110.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1306 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/pl.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1234 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/pl1.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2247 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/pl2.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2327 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/pl3.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1165 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/pl4.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 989 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/pt-latin1.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/pt-latin9.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 930 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/pt.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1618 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ro.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1435 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ro_std.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2316 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ru-cp1251.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3055 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ru-ms.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3046 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ru-yawerty.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3779 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ru.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3499 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ru1.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2591 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ru2.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3383 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ru3.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3378 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ru4.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2571 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ru_win.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3487 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ruwin_alt-CP1251.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3350 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ruwin_alt-KOI8-R.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3476 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ruwin_alt-UTF-8.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3456 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ruwin_alt_sh-UTF-8.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3373 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ruwin_cplk-CP1251.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3236 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ruwin_cplk-KOI8-R.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3363 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ruwin_cplk-UTF-8.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3398 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ruwin_ct_sh-CP1251.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3262 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ruwin_ct_sh-KOI8-R.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3389 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ruwin_ct_sh-UTF-8.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3344 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ruwin_ctrl-CP1251.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3207 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ruwin_ctrl-KOI8-R.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3334 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ruwin_ctrl-UTF-8.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 177 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/se-fi-ir209.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 189 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/se-fi-lat6.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2432 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/se-ir209.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2540 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/se-lat6.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/se-latin1.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2614 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/sk-prog-qwerty.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1868 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/sk-qwerty.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/sr-cy.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 3307 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/sr-latin.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 1121 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/sv-latin1.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3490 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/tj_alt-UTF8.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1166 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/tr_q-latin5.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1132 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/tralt.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1578 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/trf.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1126 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/trq.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3374 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ttwin_alt-UTF-8.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3384 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ttwin_cplk-UTF-8.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3367 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ttwin_ct_sh-UTF-8.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3348 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ttwin_ctrl-UTF-8.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4232 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ua-cp1251.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6958 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ua-utf-ws.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6866 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ua-utf.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6932 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ua-ws.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6853 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/ua.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 765 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/uk.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2549 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/us-acentos.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 666 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/us.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 117 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwerty/us1.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/kbd/keymaps/legacy/i386/qwertz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1286 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwertz/croat.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2539 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwertz/cz-us-qwertz.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8706 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwertz/cz.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 270 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwertz/de-latin1-nodeadkeys.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 898 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwertz/de-latin1.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 347 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwertz/de-mobii.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 847 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwertz/de.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 294 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwertz/de_CH-latin1.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2377 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwertz/de_alt_UTF-8.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 973 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwertz/fr_CH-latin1.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 873 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwertz/fr_CH.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1252 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwertz/hu.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 942 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwertz/sg-latin1-lk450.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 992 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwertz/sg-latin1.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 924 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwertz/sg.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3161 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwertz/sg.map.sg-decimal-separator Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2611 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwertz/sk-prog-qwertz.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2690 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwertz/sk-qwertz.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwertz/slovene.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 1191 Jan 9 2025 usr/lib/kbd/keymaps/legacy/i386/qwertz/sr-latin.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/kbd/keymaps/legacy/include Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 517 Jan 9 2025 usr/lib/kbd/keymaps/legacy/include/compose.8859_7 Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 23 Jan 9 2025 usr/lib/kbd/keymaps/legacy/include/compose.8859_8 Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6030 Jan 9 2025 usr/lib/kbd/keymaps/legacy/include/compose.latin Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3889 Jan 9 2025 usr/lib/kbd/keymaps/legacy/include/compose.latin1 Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3465 Jan 9 2025 usr/lib/kbd/keymaps/legacy/include/compose.latin2 Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2037 Jan 9 2025 usr/lib/kbd/keymaps/legacy/include/compose.latin3 Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2897 Jan 9 2025 usr/lib/kbd/keymaps/legacy/include/compose.latin4 Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8402 Jan 9 2025 usr/lib/kbd/keymaps/legacy/include/vim-compose.latin1 Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: drwxr-xr-x 4 root root 0 Aug 18 10:11 usr/lib/kbd/keymaps/legacy/mac Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/kbd/keymaps/legacy/mac/all Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/all/apple-a1048-sv.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/all/apple-a1243-sv-fn-reverse.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/all/apple-a1243-sv.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/all/apple-internal-0x0253-sv-fn-reverse.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/all/apple-internal-0x0253-sv.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/all/mac-be.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/all/mac-de-latin1-nodeadkeys.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/all/mac-de-latin1.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/all/mac-de_CH.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/all/mac-dk-latin1.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/all/mac-dvorak.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/all/mac-es.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/all/mac-fi-latin1.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/all/mac-fr.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/all/mac-fr_CH-latin1.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/all/mac-it.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/all/mac-no-latin1.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/all/mac-pl.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/all/mac-pt-latin1.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/all/mac-se.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/all/mac-template.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/all/mac-uk.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/all/mac-us.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/kbd/keymaps/legacy/mac/include Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/include/apple-a1048-base.inc Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/include/apple-a1243-fn-reverse.inc Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/include/apple-a1243-fn.inc Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/include/mac-azerty-layout.inc Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/include/mac-euro.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/include/mac-euro2.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/include/mac-linux-keys-bare.inc Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/include/mac-qwerty-layout.inc Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/legacy/mac/include/mac-qwertz-layout.inc Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: drwxr-xr-x 4 root root 0 Aug 18 10:11 usr/lib/kbd/keymaps/legacy/ppc Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/kbd/keymaps/legacy/ppc/all Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 1307 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/all/apple-a1048-sv.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 323 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/all/apple-a1243-sv-fn-reverse.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 406 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/all/apple-a1243-sv.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 352 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/all/apple-internal-0x0253-sv-fn-reverse.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 347 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/all/apple-internal-0x0253-sv.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 501 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/all/mac-be.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 288 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/all/mac-de-latin1-nodeadkeys.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 904 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/all/mac-de-latin1.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 767 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/all/mac-de_CH.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 639 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/all/mac-dk-latin1.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 799 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/all/mac-dvorak.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 490 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/all/mac-es.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 893 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/all/mac-fi-latin1.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 1108 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/all/mac-fr.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 786 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/all/mac-fr_CH-latin1.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 658 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/all/mac-it.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 1568 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/all/mac-no-latin1.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 1160 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/all/mac-pl.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 431 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/all/mac-pt-latin1.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 508 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/all/mac-se.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 264 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/all/mac-template.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 760 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/all/mac-uk.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 900 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/all/mac-us.map.gz Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/kbd/keymaps/legacy/ppc/include Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 2627 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/include/apple-a1048-base.inc Sep 30 23:08:12 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 2219 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/include/apple-a1243-fn-reverse.inc Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 2293 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/include/apple-a1243-fn.inc Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 439 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/include/mac-azerty-layout.inc Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 182 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/include/mac-euro.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 196 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/include/mac-euro2.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 4956 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/include/mac-linux-keys-bare.inc Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 438 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/include/mac-qwerty-layout.inc Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 438 Jan 9 2025 usr/lib/kbd/keymaps/legacy/ppc/include/mac-qwertz-layout.inc Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/kbd/keymaps/legacy/sun Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3022 Jan 9 2025 usr/lib/kbd/keymaps/legacy/sun/sun-pl-altgraph.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3186 Jan 9 2025 usr/lib/kbd/keymaps/legacy/sun/sun-pl.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2434 Jan 9 2025 usr/lib/kbd/keymaps/legacy/sun/sundvorak.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2433 Jan 9 2025 usr/lib/kbd/keymaps/legacy/sun/sunkeymap.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2086 Jan 9 2025 usr/lib/kbd/keymaps/legacy/sun/sunt4-es.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2167 Jan 9 2025 usr/lib/kbd/keymaps/legacy/sun/sunt4-fi-latin1.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2091 Jan 9 2025 usr/lib/kbd/keymaps/legacy/sun/sunt4-no-latin1.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4931 Jan 9 2025 usr/lib/kbd/keymaps/legacy/sun/sunt5-cz-us.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2047 Jan 9 2025 usr/lib/kbd/keymaps/legacy/sun/sunt5-de-latin1.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2145 Jan 9 2025 usr/lib/kbd/keymaps/legacy/sun/sunt5-es.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2063 Jan 9 2025 usr/lib/kbd/keymaps/legacy/sun/sunt5-fi-latin1.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2488 Jan 9 2025 usr/lib/kbd/keymaps/legacy/sun/sunt5-fr-latin1.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2518 Jan 9 2025 usr/lib/kbd/keymaps/legacy/sun/sunt5-ru.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2274 Jan 9 2025 usr/lib/kbd/keymaps/legacy/sun/sunt5-uk.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4926 Jan 9 2025 usr/lib/kbd/keymaps/legacy/sun/sunt5-us-cz.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1706 Jan 9 2025 usr/lib/kbd/keymaps/legacy/sun/sunt6-uk.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/kbd/keymaps/xkb Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3841 Jan 9 2025 usr/lib/kbd/keymaps/xkb/al-plisi.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4104 Jan 9 2025 usr/lib/kbd/keymaps/xkb/al.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3964 Jan 9 2025 usr/lib/kbd/keymaps/xkb/at-mac.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3937 Jan 9 2025 usr/lib/kbd/keymaps/xkb/at-nodeadkeys.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3908 Jan 9 2025 usr/lib/kbd/keymaps/xkb/at.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3435 Jan 9 2025 usr/lib/kbd/keymaps/xkb/az.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4061 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ba-alternatequotes.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4024 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ba-unicode.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4024 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ba-unicodeus.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4062 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ba-us.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4063 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ba.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4032 Jan 9 2025 usr/lib/kbd/keymaps/xkb/be-iso-alternate.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4003 Jan 9 2025 usr/lib/kbd/keymaps/xkb/be-nodeadkeys.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4194 Jan 9 2025 usr/lib/kbd/keymaps/xkb/be-oss.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4183 Jan 9 2025 usr/lib/kbd/keymaps/xkb/be-oss_latin9.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4225 Jan 9 2025 usr/lib/kbd/keymaps/xkb/be-wang.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4020 Jan 9 2025 usr/lib/kbd/keymaps/xkb/be.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3932 Jan 9 2025 usr/lib/kbd/keymaps/xkb/br-dvorak.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3914 Jan 9 2025 usr/lib/kbd/keymaps/xkb/br-nativo-epo.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3940 Jan 9 2025 usr/lib/kbd/keymaps/xkb/br-nativo-us.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3930 Jan 9 2025 usr/lib/kbd/keymaps/xkb/br-nativo.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3987 Jan 9 2025 usr/lib/kbd/keymaps/xkb/br-nodeadkeys.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4002 Jan 9 2025 usr/lib/kbd/keymaps/xkb/br-thinkpad.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4006 Jan 9 2025 usr/lib/kbd/keymaps/xkb/br.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4042 Jan 9 2025 usr/lib/kbd/keymaps/xkb/by-latin.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3548 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ca-eng.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3645 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ca-fr-dvorak.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3710 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ca-fr-legacy.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3704 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ca-multi.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 19877 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ca-multix.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3634 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ca.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5760 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ch-de_mac.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4041 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ch-de_nodeadkeys.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4014 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ch-fr.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5819 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ch-fr_mac.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4044 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ch-fr_nodeadkeys.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3996 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ch-legacy.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4011 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ch.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4253 Jan 9 2025 usr/lib/kbd/keymaps/xkb/cm-azerty.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5410 Jan 9 2025 usr/lib/kbd/keymaps/xkb/cm-dvorak.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4071 Jan 9 2025 usr/lib/kbd/keymaps/xkb/cm-french.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3792 Jan 9 2025 usr/lib/kbd/keymaps/xkb/cm-mmuock.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5391 Jan 9 2025 usr/lib/kbd/keymaps/xkb/cm-qwerty.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/xkb/cm.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3686 Jan 9 2025 usr/lib/kbd/keymaps/xkb/cn-altgr-pinyin.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 3566 Jan 9 2025 usr/lib/kbd/keymaps/xkb/cn.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4276 Jan 9 2025 usr/lib/kbd/keymaps/xkb/cz-bksl.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3781 Jan 9 2025 usr/lib/kbd/keymaps/xkb/cz-dvorak-ucw.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4065 Jan 9 2025 usr/lib/kbd/keymaps/xkb/cz-qwerty-mac.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4249 Jan 9 2025 usr/lib/kbd/keymaps/xkb/cz-qwerty.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4239 Jan 9 2025 usr/lib/kbd/keymaps/xkb/cz-qwerty_bksl.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3957 Jan 9 2025 usr/lib/kbd/keymaps/xkb/cz-rus.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4582 Jan 9 2025 usr/lib/kbd/keymaps/xkb/cz.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 20423 Jan 9 2025 usr/lib/kbd/keymaps/xkb/de-T3.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3964 Jan 9 2025 usr/lib/kbd/keymaps/xkb/de-deadacute.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3951 Jan 9 2025 usr/lib/kbd/keymaps/xkb/de-deadgraveacute.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3901 Jan 9 2025 usr/lib/kbd/keymaps/xkb/de-deadtilde.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4047 Jan 9 2025 usr/lib/kbd/keymaps/xkb/de-dsb.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4057 Jan 9 2025 usr/lib/kbd/keymaps/xkb/de-dsb_qwertz.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3867 Jan 9 2025 usr/lib/kbd/keymaps/xkb/de-dvorak.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 20388 Jan 9 2025 usr/lib/kbd/keymaps/xkb/de-e1.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 20549 Jan 9 2025 usr/lib/kbd/keymaps/xkb/de-e2.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3964 Jan 9 2025 usr/lib/kbd/keymaps/xkb/de-mac.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4056 Jan 9 2025 usr/lib/kbd/keymaps/xkb/de-mac_nodeadkeys.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5825 Jan 9 2025 usr/lib/kbd/keymaps/xkb/de-neo.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3937 Jan 9 2025 usr/lib/kbd/keymaps/xkb/de-nodeadkeys.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3919 Jan 9 2025 usr/lib/kbd/keymaps/xkb/de-qwerty.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3899 Jan 9 2025 usr/lib/kbd/keymaps/xkb/de-ro.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3917 Jan 9 2025 usr/lib/kbd/keymaps/xkb/de-ro_nodeadkeys.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3909 Jan 9 2025 usr/lib/kbd/keymaps/xkb/de-tr.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3669 Jan 9 2025 usr/lib/kbd/keymaps/xkb/de-us.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3908 Jan 9 2025 usr/lib/kbd/keymaps/xkb/de.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3850 Jan 9 2025 usr/lib/kbd/keymaps/xkb/dk-dvorak.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3880 Jan 9 2025 usr/lib/kbd/keymaps/xkb/dk-mac.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3920 Jan 9 2025 usr/lib/kbd/keymaps/xkb/dk-mac_nodeadkeys.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3933 Jan 9 2025 usr/lib/kbd/keymaps/xkb/dk-nodeadkeys.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3875 Jan 9 2025 usr/lib/kbd/keymaps/xkb/dk-winkeys.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3879 Jan 9 2025 usr/lib/kbd/keymaps/xkb/dk.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4066 Jan 9 2025 usr/lib/kbd/keymaps/xkb/dz-azerty-deadkeys.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3934 Jan 9 2025 usr/lib/kbd/keymaps/xkb/dz-qwerty-gb-deadkeys.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3882 Jan 9 2025 usr/lib/kbd/keymaps/xkb/dz-qwerty-us-deadkeys.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4167 Jan 9 2025 usr/lib/kbd/keymaps/xkb/dz.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4103 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ee-dvorak.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3929 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ee-nodeadkeys.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4444 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ee-us.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3966 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ee.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 18157 Jan 9 2025 usr/lib/kbd/keymaps/xkb/epo-legacy.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5277 Jan 9 2025 usr/lib/kbd/keymaps/xkb/epo.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4122 Jan 9 2025 usr/lib/kbd/keymaps/xkb/es-ast.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4123 Jan 9 2025 usr/lib/kbd/keymaps/xkb/es-cat.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4098 Jan 9 2025 usr/lib/kbd/keymaps/xkb/es-deadtilde.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3977 Jan 9 2025 usr/lib/kbd/keymaps/xkb/es-dvorak.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4121 Jan 9 2025 usr/lib/kbd/keymaps/xkb/es-mac.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4104 Jan 9 2025 usr/lib/kbd/keymaps/xkb/es-nodeadkeys.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4118 Jan 9 2025 usr/lib/kbd/keymaps/xkb/es-winkeys.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4121 Jan 9 2025 usr/lib/kbd/keymaps/xkb/es.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5079 Jan 9 2025 usr/lib/kbd/keymaps/xkb/fi-classic.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3922 Jan 9 2025 usr/lib/kbd/keymaps/xkb/fi-mac.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5084 Jan 9 2025 usr/lib/kbd/keymaps/xkb/fi-nodeadkeys.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3898 Jan 9 2025 usr/lib/kbd/keymaps/xkb/fi-smi.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5408 Jan 9 2025 usr/lib/kbd/keymaps/xkb/fi-winkeys.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5408 Jan 9 2025 usr/lib/kbd/keymaps/xkb/fi.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3930 Jan 9 2025 usr/lib/kbd/keymaps/xkb/fo-nodeadkeys.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3883 Jan 9 2025 usr/lib/kbd/keymaps/xkb/fo.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4018 Jan 9 2025 usr/lib/kbd/keymaps/xkb/fr-afnor.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3651 Jan 9 2025 usr/lib/kbd/keymaps/xkb/fr-azerty.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4159 Jan 9 2025 usr/lib/kbd/keymaps/xkb/fr-bepo.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4057 Jan 9 2025 usr/lib/kbd/keymaps/xkb/fr-bepo_afnor.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4134 Jan 9 2025 usr/lib/kbd/keymaps/xkb/fr-bepo_latin9.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4065 Jan 9 2025 usr/lib/kbd/keymaps/xkb/fr-bre.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3789 Jan 9 2025 usr/lib/kbd/keymaps/xkb/fr-dvorak.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4018 Jan 9 2025 usr/lib/kbd/keymaps/xkb/fr-latin9.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4016 Jan 9 2025 usr/lib/kbd/keymaps/xkb/fr-latin9_nodeadkeys.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3909 Jan 9 2025 usr/lib/kbd/keymaps/xkb/fr-mac.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4069 Jan 9 2025 usr/lib/kbd/keymaps/xkb/fr-nodeadkeys.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4142 Jan 9 2025 usr/lib/kbd/keymaps/xkb/fr-oci.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4146 Jan 9 2025 usr/lib/kbd/keymaps/xkb/fr-oss.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4144 Jan 9 2025 usr/lib/kbd/keymaps/xkb/fr-oss_latin9.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4132 Jan 9 2025 usr/lib/kbd/keymaps/xkb/fr-oss_nodeadkeys.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4123 Jan 9 2025 usr/lib/kbd/keymaps/xkb/fr-us.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4071 Jan 9 2025 usr/lib/kbd/keymaps/xkb/fr.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4017 Jan 9 2025 usr/lib/kbd/keymaps/xkb/gb-colemak.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4016 Jan 9 2025 usr/lib/kbd/keymaps/xkb/gb-colemak_dh.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4429 Jan 9 2025 usr/lib/kbd/keymaps/xkb/gb-dvorak.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4447 Jan 9 2025 usr/lib/kbd/keymaps/xkb/gb-dvorakukp.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3980 Jan 9 2025 usr/lib/kbd/keymaps/xkb/gb-extd.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3935 Jan 9 2025 usr/lib/kbd/keymaps/xkb/gb-intl.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3986 Jan 9 2025 usr/lib/kbd/keymaps/xkb/gb-mac.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3936 Jan 9 2025 usr/lib/kbd/keymaps/xkb/gb-mac_intl.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4018 Jan 9 2025 usr/lib/kbd/keymaps/xkb/gb-pl.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3999 Jan 9 2025 usr/lib/kbd/keymaps/xkb/gb.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4619 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ge-ergonomic.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3952 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ge-mess.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3565 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ge-ru.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3728 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ge.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3600 Jan 9 2025 usr/lib/kbd/keymaps/xkb/gh-akan.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3584 Jan 9 2025 usr/lib/kbd/keymaps/xkb/gh-avn.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3635 Jan 9 2025 usr/lib/kbd/keymaps/xkb/gh-ewe.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3710 Jan 9 2025 usr/lib/kbd/keymaps/xkb/gh-fula.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3609 Jan 9 2025 usr/lib/kbd/keymaps/xkb/gh-ga.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3647 Jan 9 2025 usr/lib/kbd/keymaps/xkb/gh-generic.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3713 Jan 9 2025 usr/lib/kbd/keymaps/xkb/gh-gillbt.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3710 Jan 9 2025 usr/lib/kbd/keymaps/xkb/gh-hausa.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3579 Jan 9 2025 usr/lib/kbd/keymaps/xkb/gh.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4061 Jan 9 2025 usr/lib/kbd/keymaps/xkb/hr-alternatequotes.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4024 Jan 9 2025 usr/lib/kbd/keymaps/xkb/hr-unicode.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4024 Jan 9 2025 usr/lib/kbd/keymaps/xkb/hr-unicodeus.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3843 Jan 9 2025 usr/lib/kbd/keymaps/xkb/hr-us.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4072 Jan 9 2025 usr/lib/kbd/keymaps/xkb/hr.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4058 Jan 9 2025 usr/lib/kbd/keymaps/xkb/hu-101_qwerty_comma_dead.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4014 Jan 9 2025 usr/lib/kbd/keymaps/xkb/hu-101_qwerty_comma_nodead.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4055 Jan 9 2025 usr/lib/kbd/keymaps/xkb/hu-101_qwerty_dot_dead.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4011 Jan 9 2025 usr/lib/kbd/keymaps/xkb/hu-101_qwerty_dot_nodead.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4058 Jan 9 2025 usr/lib/kbd/keymaps/xkb/hu-101_qwertz_comma_dead.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4016 Jan 9 2025 usr/lib/kbd/keymaps/xkb/hu-101_qwertz_comma_nodead.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4056 Jan 9 2025 usr/lib/kbd/keymaps/xkb/hu-101_qwertz_dot_dead.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4014 Jan 9 2025 usr/lib/kbd/keymaps/xkb/hu-101_qwertz_dot_nodead.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4033 Jan 9 2025 usr/lib/kbd/keymaps/xkb/hu-102_qwerty_comma_dead.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3989 Jan 9 2025 usr/lib/kbd/keymaps/xkb/hu-102_qwerty_comma_nodead.map.gz Sep 30 23:08:13 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4029 Jan 9 2025 usr/lib/kbd/keymaps/xkb/hu-102_qwerty_dot_dead.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3987 Jan 9 2025 usr/lib/kbd/keymaps/xkb/hu-102_qwerty_dot_nodead.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4033 Jan 9 2025 usr/lib/kbd/keymaps/xkb/hu-102_qwertz_comma_dead.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3991 Jan 9 2025 usr/lib/kbd/keymaps/xkb/hu-102_qwertz_comma_nodead.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4030 Jan 9 2025 usr/lib/kbd/keymaps/xkb/hu-102_qwertz_dot_dead.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3988 Jan 9 2025 usr/lib/kbd/keymaps/xkb/hu-102_qwertz_dot_nodead.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3991 Jan 9 2025 usr/lib/kbd/keymaps/xkb/hu-nodeadkeys.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4058 Jan 9 2025 usr/lib/kbd/keymaps/xkb/hu-qwerty.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4033 Jan 9 2025 usr/lib/kbd/keymaps/xkb/hu-standard.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4033 Jan 9 2025 usr/lib/kbd/keymaps/xkb/hu.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3566 Jan 9 2025 usr/lib/kbd/keymaps/xkb/id.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4780 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ie-CloGaelach.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 10718 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ie-UnicodeExpert.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3432 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ie-ogam_is434.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7013 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ie.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4067 Jan 9 2025 usr/lib/kbd/keymaps/xkb/il.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3577 Jan 9 2025 usr/lib/kbd/keymaps/xkb/in-eng.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3450 Jan 9 2025 usr/lib/kbd/keymaps/xkb/in-iipa.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jan 9 2025 usr/lib/kbd/keymaps/xkb/iq-ku.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3943 Jan 9 2025 usr/lib/kbd/keymaps/xkb/iq-ku_alt.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3867 Jan 9 2025 usr/lib/kbd/keymaps/xkb/iq-ku_ara.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3886 Jan 9 2025 usr/lib/kbd/keymaps/xkb/iq-ku_f.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 3910 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ir-ku.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3943 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ir-ku_alt.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3867 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ir-ku_ara.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3886 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ir-ku_f.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4099 Jan 9 2025 usr/lib/kbd/keymaps/xkb/is-dvorak.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3957 Jan 9 2025 usr/lib/kbd/keymaps/xkb/is-mac.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3832 Jan 9 2025 usr/lib/kbd/keymaps/xkb/is-mac_legacy.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3963 Jan 9 2025 usr/lib/kbd/keymaps/xkb/is.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3971 Jan 9 2025 usr/lib/kbd/keymaps/xkb/it-fur.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4069 Jan 9 2025 usr/lib/kbd/keymaps/xkb/it-geo.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3601 Jan 9 2025 usr/lib/kbd/keymaps/xkb/it-ibm.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3976 Jan 9 2025 usr/lib/kbd/keymaps/xkb/it-intl.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3805 Jan 9 2025 usr/lib/kbd/keymaps/xkb/it-mac.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3974 Jan 9 2025 usr/lib/kbd/keymaps/xkb/it-nodeadkeys.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3976 Jan 9 2025 usr/lib/kbd/keymaps/xkb/it-scn.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4112 Jan 9 2025 usr/lib/kbd/keymaps/xkb/it-us.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3962 Jan 9 2025 usr/lib/kbd/keymaps/xkb/it-winkeys.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3965 Jan 9 2025 usr/lib/kbd/keymaps/xkb/it.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3573 Jan 9 2025 usr/lib/kbd/keymaps/xkb/jp-OADG109A.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3572 Jan 9 2025 usr/lib/kbd/keymaps/xkb/jp-dvorak.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3581 Jan 9 2025 usr/lib/kbd/keymaps/xkb/jp-kana86.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3592 Jan 9 2025 usr/lib/kbd/keymaps/xkb/jp.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4017 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ke-kik.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3613 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ke.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3566 Jan 9 2025 usr/lib/kbd/keymaps/xkb/kr-kr104.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3566 Jan 9 2025 usr/lib/kbd/keymaps/xkb/kr.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3155 Jan 9 2025 usr/lib/kbd/keymaps/xkb/kz-latin.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4017 Jan 9 2025 usr/lib/kbd/keymaps/xkb/latam-colemak-gaming.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4017 Jan 9 2025 usr/lib/kbd/keymaps/xkb/latam-colemak.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4066 Jan 9 2025 usr/lib/kbd/keymaps/xkb/latam-deadtilde.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3922 Jan 9 2025 usr/lib/kbd/keymaps/xkb/latam-dvorak.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4075 Jan 9 2025 usr/lib/kbd/keymaps/xkb/latam-nodeadkeys.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4064 Jan 9 2025 usr/lib/kbd/keymaps/xkb/latam.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3657 Jan 9 2025 usr/lib/kbd/keymaps/xkb/lk-us.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4038 Jan 9 2025 usr/lib/kbd/keymaps/xkb/lt-ibm.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3743 Jan 9 2025 usr/lib/kbd/keymaps/xkb/lt-lekp.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3783 Jan 9 2025 usr/lib/kbd/keymaps/xkb/lt-lekpa.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4068 Jan 9 2025 usr/lib/kbd/keymaps/xkb/lt-ratise.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4000 Jan 9 2025 usr/lib/kbd/keymaps/xkb/lt-sgs.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4019 Jan 9 2025 usr/lib/kbd/keymaps/xkb/lt-std.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4001 Jan 9 2025 usr/lib/kbd/keymaps/xkb/lt-us.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4010 Jan 9 2025 usr/lib/kbd/keymaps/xkb/lt.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3891 Jan 9 2025 usr/lib/kbd/keymaps/xkb/lv-adapted.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3884 Jan 9 2025 usr/lib/kbd/keymaps/xkb/lv-apostrophe.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3761 Jan 9 2025 usr/lib/kbd/keymaps/xkb/lv-ergonomic.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3890 Jan 9 2025 usr/lib/kbd/keymaps/xkb/lv-fkey.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3953 Jan 9 2025 usr/lib/kbd/keymaps/xkb/lv-modern.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3888 Jan 9 2025 usr/lib/kbd/keymaps/xkb/lv-tilde.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3875 Jan 9 2025 usr/lib/kbd/keymaps/xkb/lv.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4071 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ma-french.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3666 Jan 9 2025 usr/lib/kbd/keymaps/xkb/md-gag.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3785 Jan 9 2025 usr/lib/kbd/keymaps/xkb/md.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4049 Jan 9 2025 usr/lib/kbd/keymaps/xkb/me-latinalternatequotes.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4030 Jan 9 2025 usr/lib/kbd/keymaps/xkb/me-latinunicode.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4036 Jan 9 2025 usr/lib/kbd/keymaps/xkb/me-latinunicodeyz.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4077 Jan 9 2025 usr/lib/kbd/keymaps/xkb/me-latinyz.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4069 Jan 9 2025 usr/lib/kbd/keymaps/xkb/me.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4162 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ml-fr-oss.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3901 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ml-us-intl.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3932 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ml-us-mac.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4084 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ml.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3773 Jan 9 2025 usr/lib/kbd/keymaps/xkb/mm.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4015 Jan 9 2025 usr/lib/kbd/keymaps/xkb/mt-alt-gb.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4809 Jan 9 2025 usr/lib/kbd/keymaps/xkb/mt-alt-us.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4038 Jan 9 2025 usr/lib/kbd/keymaps/xkb/mt-us.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4021 Jan 9 2025 usr/lib/kbd/keymaps/xkb/mt.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3710 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ng-hausa.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3619 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ng-igbo.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3608 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ng-yoruba.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3580 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ng.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4019 Jan 9 2025 usr/lib/kbd/keymaps/xkb/nl-mac.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3626 Jan 9 2025 usr/lib/kbd/keymaps/xkb/nl-std.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3933 Jan 9 2025 usr/lib/kbd/keymaps/xkb/nl-us.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3935 Jan 9 2025 usr/lib/kbd/keymaps/xkb/nl.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3937 Jan 9 2025 usr/lib/kbd/keymaps/xkb/no-colemak.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3828 Jan 9 2025 usr/lib/kbd/keymaps/xkb/no-dvorak.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3947 Jan 9 2025 usr/lib/kbd/keymaps/xkb/no-mac.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3927 Jan 9 2025 usr/lib/kbd/keymaps/xkb/no-mac_nodeadkeys.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4003 Jan 9 2025 usr/lib/kbd/keymaps/xkb/no-nodeadkeys.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3898 Jan 9 2025 usr/lib/kbd/keymaps/xkb/no-smi.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3882 Jan 9 2025 usr/lib/kbd/keymaps/xkb/no-smi_nodeadkeys.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3937 Jan 9 2025 usr/lib/kbd/keymaps/xkb/no-winkeys.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3940 Jan 9 2025 usr/lib/kbd/keymaps/xkb/no.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3780 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ph-capewell-dvorak.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3790 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ph-capewell-qwerf2k6.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3787 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ph-colemak.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3784 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ph-dvorak.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3783 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ph.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4038 Jan 9 2025 usr/lib/kbd/keymaps/xkb/pl-csb.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3743 Jan 9 2025 usr/lib/kbd/keymaps/xkb/pl-dvorak.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3749 Jan 9 2025 usr/lib/kbd/keymaps/xkb/pl-dvorak_altquotes.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3747 Jan 9 2025 usr/lib/kbd/keymaps/xkb/pl-dvorak_quotes.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3835 Jan 9 2025 usr/lib/kbd/keymaps/xkb/pl-dvp.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4047 Jan 9 2025 usr/lib/kbd/keymaps/xkb/pl-legacy.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4041 Jan 9 2025 usr/lib/kbd/keymaps/xkb/pl-qwertz.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4038 Jan 9 2025 usr/lib/kbd/keymaps/xkb/pl-szl.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3943 Jan 9 2025 usr/lib/kbd/keymaps/xkb/pl.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3940 Jan 9 2025 usr/lib/kbd/keymaps/xkb/pt-mac.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3964 Jan 9 2025 usr/lib/kbd/keymaps/xkb/pt-mac_nodeadkeys.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3889 Jan 9 2025 usr/lib/kbd/keymaps/xkb/pt-nativo-epo.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3872 Jan 9 2025 usr/lib/kbd/keymaps/xkb/pt-nativo-us.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3864 Jan 9 2025 usr/lib/kbd/keymaps/xkb/pt-nativo.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3978 Jan 9 2025 usr/lib/kbd/keymaps/xkb/pt-nodeadkeys.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3920 Jan 9 2025 usr/lib/kbd/keymaps/xkb/pt.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3816 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ro-std.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3784 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ro-winkeys.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3785 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ro.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4063 Jan 9 2025 usr/lib/kbd/keymaps/xkb/rs-latin.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4061 Jan 9 2025 usr/lib/kbd/keymaps/xkb/rs-latinalternatequotes.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4024 Jan 9 2025 usr/lib/kbd/keymaps/xkb/rs-latinunicode.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4024 Jan 9 2025 usr/lib/kbd/keymaps/xkb/rs-latinunicodeyz.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4062 Jan 9 2025 usr/lib/kbd/keymaps/xkb/rs-latinyz.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3760 Jan 9 2025 usr/lib/kbd/keymaps/xkb/ru-cv_latin.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3999 Jan 9 2025 usr/lib/kbd/keymaps/xkb/se-dvorak.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3922 Jan 9 2025 usr/lib/kbd/keymaps/xkb/se-mac.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3868 Jan 9 2025 usr/lib/kbd/keymaps/xkb/se-nodeadkeys.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3898 Jan 9 2025 usr/lib/kbd/keymaps/xkb/se-smi.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4006 Jan 9 2025 usr/lib/kbd/keymaps/xkb/se-svdvorak.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3612 Jan 9 2025 usr/lib/kbd/keymaps/xkb/se-us.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3895 Jan 9 2025 usr/lib/kbd/keymaps/xkb/se-us_dvorak.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3847 Jan 9 2025 usr/lib/kbd/keymaps/xkb/se.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4015 Jan 9 2025 usr/lib/kbd/keymaps/xkb/si-alternatequotes.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4018 Jan 9 2025 usr/lib/kbd/keymaps/xkb/si-us.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4019 Jan 9 2025 usr/lib/kbd/keymaps/xkb/si.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4288 Jan 9 2025 usr/lib/kbd/keymaps/xkb/sk-bksl.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4279 Jan 9 2025 usr/lib/kbd/keymaps/xkb/sk-qwerty.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4286 Jan 9 2025 usr/lib/kbd/keymaps/xkb/sk-qwerty_bksl.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4282 Jan 9 2025 usr/lib/kbd/keymaps/xkb/sk.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3910 Jan 9 2025 usr/lib/kbd/keymaps/xkb/sy-ku.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3943 Jan 9 2025 usr/lib/kbd/keymaps/xkb/sy-ku_alt.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3886 Jan 9 2025 usr/lib/kbd/keymaps/xkb/sy-ku_f.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3635 Jan 9 2025 usr/lib/kbd/keymaps/xkb/tm-alt.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3647 Jan 9 2025 usr/lib/kbd/keymaps/xkb/tm.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3944 Jan 9 2025 usr/lib/kbd/keymaps/xkb/tr-alt.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3949 Jan 9 2025 usr/lib/kbd/keymaps/xkb/tr-crh.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3953 Jan 9 2025 usr/lib/kbd/keymaps/xkb/tr-crh_alt.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3944 Jan 9 2025 usr/lib/kbd/keymaps/xkb/tr-crh_f.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3893 Jan 9 2025 usr/lib/kbd/keymaps/xkb/tr-f.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3849 Jan 9 2025 usr/lib/kbd/keymaps/xkb/tr-intl.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3910 Jan 9 2025 usr/lib/kbd/keymaps/xkb/tr-ku.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3943 Jan 9 2025 usr/lib/kbd/keymaps/xkb/tr-ku_alt.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3886 Jan 9 2025 usr/lib/kbd/keymaps/xkb/tr-ku_f.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3921 Jan 9 2025 usr/lib/kbd/keymaps/xkb/tr.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4242 Jan 9 2025 usr/lib/kbd/keymaps/xkb/tw-indigenous.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4242 Jan 9 2025 usr/lib/kbd/keymaps/xkb/tw-saisiyat.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4239 Jan 9 2025 usr/lib/kbd/keymaps/xkb/tw.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3688 Jan 9 2025 usr/lib/kbd/keymaps/xkb/us-alt-intl.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3889 Jan 9 2025 usr/lib/kbd/keymaps/xkb/us-altgr-intl.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4055 Jan 9 2025 usr/lib/kbd/keymaps/xkb/us-colemak.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4032 Jan 9 2025 usr/lib/kbd/keymaps/xkb/us-colemak_dh.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4010 Jan 9 2025 usr/lib/kbd/keymaps/xkb/us-colemak_dh_iso.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3767 Jan 9 2025 usr/lib/kbd/keymaps/xkb/us-dvorak-alt-intl.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3652 Jan 9 2025 usr/lib/kbd/keymaps/xkb/us-dvorak-classic.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3874 Jan 9 2025 usr/lib/kbd/keymaps/xkb/us-dvorak-intl.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3673 Jan 9 2025 usr/lib/kbd/keymaps/xkb/us-dvorak-l.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3664 Jan 9 2025 usr/lib/kbd/keymaps/xkb/us-dvorak-r.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3660 Jan 9 2025 usr/lib/kbd/keymaps/xkb/us-dvorak.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3781 Jan 9 2025 usr/lib/kbd/keymaps/xkb/us-dvp.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3933 Jan 9 2025 usr/lib/kbd/keymaps/xkb/us-euro.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3614 Jan 9 2025 usr/lib/kbd/keymaps/xkb/us-haw.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3668 Jan 9 2025 usr/lib/kbd/keymaps/xkb/us-hbs.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3873 Jan 9 2025 usr/lib/kbd/keymaps/xkb/us-intl.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3924 Jan 9 2025 usr/lib/kbd/keymaps/xkb/us-mac.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3577 Jan 9 2025 usr/lib/kbd/keymaps/xkb/us-norman.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3771 Jan 9 2025 usr/lib/kbd/keymaps/xkb/us-olpc2.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3845 Jan 9 2025 usr/lib/kbd/keymaps/xkb/us-symbolic.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3899 Jan 9 2025 usr/lib/kbd/keymaps/xkb/us-workman-intl.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3597 Jan 9 2025 usr/lib/kbd/keymaps/xkb/us-workman.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3566 Jan 9 2025 usr/lib/kbd/keymaps/xkb/us.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3558 Jan 9 2025 usr/lib/kbd/keymaps/xkb/uz-latin.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4051 Jan 9 2025 usr/lib/kbd/keymaps/xkb/vn-fr.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4035 Jan 9 2025 usr/lib/kbd/keymaps/xkb/vn-us.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3466 Jan 9 2025 usr/lib/kbd/keymaps/xkb/vn.map.gz Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/kbd/unimaps Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4244 Jan 9 2025 usr/lib/kbd/unimaps/8859-1.a0-ff.uni Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4706 Jan 9 2025 usr/lib/kbd/unimaps/8859-10.a0-ff.uni Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4426 Jan 9 2025 usr/lib/kbd/unimaps/8859-13.a0-ff.uni Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4816 Jan 9 2025 usr/lib/kbd/unimaps/8859-14.a0-ff.uni Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4376 Jan 9 2025 usr/lib/kbd/unimaps/8859-15.a0-ff.uni Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4479 Jan 9 2025 usr/lib/kbd/unimaps/8859-2.a0-ff.uni Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4240 Jan 9 2025 usr/lib/kbd/unimaps/8859-3.a0-ff.uni Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4548 Jan 9 2025 usr/lib/kbd/unimaps/8859-4.a0-ff.uni Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4188 Jan 9 2025 usr/lib/kbd/unimaps/8859-5.a0-ff.uni Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1869 Jan 9 2025 usr/lib/kbd/unimaps/8859-6.a0-ff.uni Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3928 Jan 9 2025 usr/lib/kbd/unimaps/8859-7.a0-ff.uni Sep 30 23:08:14 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2035 Jan 9 2025 usr/lib/kbd/unimaps/8859-8.a0-ff.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4332 Jan 9 2025 usr/lib/kbd/unimaps/8859-9.a0-ff.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1494 Jan 9 2025 usr/lib/kbd/unimaps/ECMA144.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1378 Jan 9 2025 usr/lib/kbd/unimaps/armscii8.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1707 Jan 9 2025 usr/lib/kbd/unimaps/ascii.20-7f.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5478 Jan 9 2025 usr/lib/kbd/unimaps/cp1250.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 446 Jan 9 2025 usr/lib/kbd/unimaps/cp437.00-1f.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4475 Jan 9 2025 usr/lib/kbd/unimaps/cp437.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5674 Jan 9 2025 usr/lib/kbd/unimaps/cp737.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6199 Jan 9 2025 usr/lib/kbd/unimaps/cp737a.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6215 Jan 9 2025 usr/lib/kbd/unimaps/cp737b.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6266 Jan 9 2025 usr/lib/kbd/unimaps/cp737c.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5456 Jan 9 2025 usr/lib/kbd/unimaps/cp850.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5985 Jan 9 2025 usr/lib/kbd/unimaps/cp850a.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4011 Jan 9 2025 usr/lib/kbd/unimaps/cp850b.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3880 Jan 9 2025 usr/lib/kbd/unimaps/cp850z.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5627 Jan 9 2025 usr/lib/kbd/unimaps/cp865.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6155 Jan 9 2025 usr/lib/kbd/unimaps/cp865a.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5553 Jan 9 2025 usr/lib/kbd/unimaps/cp866.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6174 Jan 9 2025 usr/lib/kbd/unimaps/cp866a.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2558 Jan 9 2025 usr/lib/kbd/unimaps/cybercafe.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4152 Jan 9 2025 usr/lib/kbd/unimaps/cyralt.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2206 Jan 9 2025 usr/lib/kbd/unimaps/def.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 22 Jan 9 2025 usr/lib/kbd/unimaps/empty.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5981 Jan 9 2025 usr/lib/kbd/unimaps/ethiopic.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 674 Jan 9 2025 usr/lib/kbd/unimaps/iso01.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1815 Jan 9 2025 usr/lib/kbd/unimaps/iso02.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1829 Jan 9 2025 usr/lib/kbd/unimaps/iso03.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1815 Jan 9 2025 usr/lib/kbd/unimaps/iso04.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1815 Jan 9 2025 usr/lib/kbd/unimaps/iso05.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1275 Jan 9 2025 usr/lib/kbd/unimaps/iso06.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1744 Jan 9 2025 usr/lib/kbd/unimaps/iso07.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2507 Jan 9 2025 usr/lib/kbd/unimaps/iso07u.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1119 Jan 9 2025 usr/lib/kbd/unimaps/iso08.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 805 Jan 9 2025 usr/lib/kbd/unimaps/iso09.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1489 Jan 9 2025 usr/lib/kbd/unimaps/iso10.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 876 Jan 9 2025 usr/lib/kbd/unimaps/iso15.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3998 Jan 9 2025 usr/lib/kbd/unimaps/koi8r.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5224 Jan 9 2025 usr/lib/kbd/unimaps/koi8u.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1030 Jan 9 2025 usr/lib/kbd/unimaps/lat1.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2177 Jan 9 2025 usr/lib/kbd/unimaps/lat1u.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5302 Jan 9 2025 usr/lib/kbd/unimaps/lat2.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3632 Jan 9 2025 usr/lib/kbd/unimaps/lat2u.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3251 Jan 9 2025 usr/lib/kbd/unimaps/lat4.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5046 Jan 9 2025 usr/lib/kbd/unimaps/lat4u.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7282 Jan 9 2025 usr/lib/kbd/unimaps/lat7.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3579 Jan 9 2025 usr/lib/kbd/unimaps/lat9u.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3771 Jan 9 2025 usr/lib/kbd/unimaps/lat9v.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3635 Jan 9 2025 usr/lib/kbd/unimaps/lat9w.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4030 Jan 9 2025 usr/lib/kbd/unimaps/ruscii.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1009 Jan 9 2025 usr/lib/kbd/unimaps/tcvn.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1811 Jan 9 2025 usr/lib/kbd/unimaps/viscii.uni Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modprobe.d Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 884 Aug 18 06:19 usr/lib/modprobe.d/dist-blacklist.conf Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 773 Oct 31 2022 usr/lib/modprobe.d/systemd.conf Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 4 root root 0 Aug 18 10:11 usr/lib/modules Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64 Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 9 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/arch Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/arch/x86 Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/arch/x86/crypto Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3860 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/arch/x86/crypto/blake2s-x86_64.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4860 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/arch/x86/crypto/blowfish-x86_64.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7388 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/arch/x86/crypto/camellia-aesni-avx-x86_64.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7688 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/arch/x86/crypto/camellia-aesni-avx2.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 13416 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/arch/x86/crypto/camellia-x86_64.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8248 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/arch/x86/crypto/cast5-avx-x86_64.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9616 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/arch/x86/crypto/cast6-avx-x86_64.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3696 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/arch/x86/crypto/crc32-pclmul.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6436 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/arch/x86/crypto/crc32c-intel.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3736 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/arch/x86/crypto/crct10dif-pclmul.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 15508 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/arch/x86/crypto/curve25519-x86_64.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8676 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/arch/x86/crypto/des3_ede-x86_64.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4848 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/arch/x86/crypto/ghash-clmulni-intel.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3084 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/arch/x86/crypto/nhpoly1305-avx2.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3004 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/arch/x86/crypto/nhpoly1305-sse2.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 13236 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/arch/x86/crypto/serpent-avx-x86_64.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 13640 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/arch/x86/crypto/serpent-avx2.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 12272 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/arch/x86/crypto/serpent-sse2-x86_64.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5288 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/arch/x86/crypto/twofish-avx-x86_64.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5252 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/arch/x86/crypto/twofish-x86_64-3way.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3024 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/arch/x86/crypto/twofish-x86_64.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 4 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6332 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/adiantum.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5668 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/ansi_cprng.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/asymmetric_keys Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8324 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/asymmetric_keys/asym_tpm.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3584 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/asymmetric_keys/pkcs8_key_parser.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/async_tx Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3412 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/async_tx/async_memcpy.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6624 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/async_tx/async_pq.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7256 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/async_tx/async_raid6_recov.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4076 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/async_tx/async_tx.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5660 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/async_tx/async_xor.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5532 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/async_tx/raid6test.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7248 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/blake2b_generic.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7040 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/blowfish_common.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2692 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/blowfish_generic.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 11996 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/camellia_generic.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9932 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/cast5_generic.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5480 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/cast6_generic.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5876 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/cast_common.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6948 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/chacha20poly1305.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3112 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/chacha_generic.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2672 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/crc32_generic.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2892 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/curve25519-generic.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2816 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/des_generic.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3264 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/echainiv.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7344 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/essiv.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4920 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/fcrypt.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4956 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/lrw.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4252 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/md4.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2956 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/michael_mic.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4956 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/nhpoly1305.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3216 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/pcbc.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5152 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/pcrypt.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3028 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/poly1305_generic.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5816 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/rmd160.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8888 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/serpent_generic.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 29300 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/tcrypt.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9976 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/twofish_common.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3780 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/twofish_generic.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6452 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/vmac.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9352 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/wp512.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3980 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/xcbc.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2672 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/xxhash_generic.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4208 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/crypto/zstd.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 40 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/acpi Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/acpi/nfit Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 37572 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/acpi/nfit/nfit.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 19996 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/acpi/video.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/ata Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 20232 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/ata/ahci.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8004 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/ata/ahci_platform.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7480 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/ata/ata_generic.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 15280 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/ata/ata_piix.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 27732 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/ata/libahci.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 12272 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/ata/libahci_platform.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 159524 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/ata/libata.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/base Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/base/regmap Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4492 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/base/regmap/regmap-i2c.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 4 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/block Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7084 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/block/brd.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 19052 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/block/loop.ko.xz Sep 30 23:08:15 np0005463759.novalocal sshd-session[32807]: Received disconnect from 192.227.153.63 port 40916:11: Bye Bye [preauth] Sep 30 23:08:15 np0005463759.novalocal sshd-session[32807]: Disconnected from authenticating user root 192.227.153.63 port 40916 [preauth] Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 29116 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/block/nbd.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/block/null_blk Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 30484 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/block/null_blk/null_blk.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 26780 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/block/pktcdvd.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 65708 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/block/rbd.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 16580 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/block/virtio_blk.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 25096 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/block/xen-blkfront.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/block/zram Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 17880 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/block/zram/zram.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/cdrom Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 30412 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/cdrom/cdrom.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/char Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 19104 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/char/virtio_console.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 6 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/cavium Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/cavium/nitrox Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 33216 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/cavium/nitrox/n5pf.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/ccp Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 20020 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/ccp/ccp-crypto.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 72276 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/ccp/ccp.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/chelsio Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 42404 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/chelsio/chcr.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 4 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/intel Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/intel/iaa Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 26452 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/intel/iaa/iaa_crypto.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 11 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/intel/qat Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/intel/qat/qat_420xx Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 12580 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/intel/qat/qat_420xx/qat_420xx.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/intel/qat/qat_4xxx Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 12632 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/intel/qat/qat_4xxx/qat_4xxx.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/intel/qat/qat_c3xxx Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 10992 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/intel/qat/qat_c3xxx/qat_c3xxx.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/intel/qat/qat_c3xxxvf Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9820 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/intel/qat/qat_c3xxxvf/qat_c3xxxvf.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/intel/qat/qat_c62x Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 11028 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/intel/qat/qat_c62x/qat_c62x.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/intel/qat/qat_c62xvf Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9796 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/intel/qat/qat_c62xvf/qat_c62xvf.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/intel/qat/qat_common Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 176200 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/intel/qat/qat_common/intel_qat.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/intel/qat/qat_dh895xcc Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 11544 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/intel/qat/qat_dh895xcc/qat_dh895xcc.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/intel/qat/qat_dh895xccvf Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9808 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/intel/qat/qat_dh895xccvf/qat_dh895xccvf.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5764 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/padlock-aes.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5912 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/crypto/padlock-sha.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/dca Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6980 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/dca/dca.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/dma Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/dma/idxd Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 64816 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/dma/idxd/idxd.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6880 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/dma/idxd/idxd_bus.ko.xz Sep 30 23:08:15 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/gnss Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7060 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/gnss/gnss.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/gpu Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/gpu/drm Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 266548 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/gpu/drm/drm.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: drwxr-xr-x 6 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/amd-sfh-hid Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 19848 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/amd-sfh-hid/amd_sfh.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3448 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-a4tech.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8764 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-alps.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 10172 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-apple.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4244 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-appleir.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 13164 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-asus.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2524 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-aureal.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3140 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-axff.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3272 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-belkin.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3804 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-betopff.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3148 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-cherry.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4532 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-chicony.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3848 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-cmedia.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8288 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-corsair.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5392 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-cougar.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3456 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-cypress.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3512 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-dr.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6296 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-elan.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3248 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-elecom.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5072 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-elo.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2280 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-evision.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2968 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-ezkey.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2824 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-gaff.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2860 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-gembird.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3368 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-gfrm.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4980 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-gt683r.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3516 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-gyration.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3168 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-holtek-kbd.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3172 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-holtek-mouse.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2680 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-holtekff.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8608 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-hyperv.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3176 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-icade.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3732 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-ite.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2612 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-jabra.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2760 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-kensington.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2588 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-keytouch.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5428 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-kye.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3088 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-lcpower.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6236 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-led.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 12308 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-lenovo.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4780 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-letsketch.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9180 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-lg-g15.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 15576 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-logitech-dj.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 29216 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-logitech-hidpp.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 10552 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-logitech.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6436 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-microsoft.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3184 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-monterey.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 15344 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-multitouch.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2600 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-nti.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2740 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-ortek.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2716 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-penmount.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3648 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-petalynx.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 23356 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-picolcd.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2692 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-pl.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4408 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-plantronics.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2688 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-primax.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 11664 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-prodikeys.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9144 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-rmi.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5748 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-roccat-arvo.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4092 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-roccat-common.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7644 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-roccat-isku.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8560 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-roccat-kone.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7680 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-roccat-koneplus.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5012 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-roccat-konepure.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7768 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-roccat-kovaplus.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3964 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-roccat-lua.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7428 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-roccat-pyra.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5720 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-roccat-ryos.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4912 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-roccat-savu.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6528 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-roccat.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3896 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-saitek.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8352 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-samsung.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2532 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-semitek.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 10644 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-sensor-custom.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2764 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-sigmamicro.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2768 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-sjoy.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 21160 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-sony.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2396 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-speedlink.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7912 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-steelseries.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3080 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-sunplus.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5812 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-thrustmaster.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3068 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-tivo.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2812 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-tmff.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3700 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-topseed.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3988 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-twinhan.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 18696 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-uclogic.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3280 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-waltop.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 32156 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-wiimote.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2684 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-xiaomi.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2308 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-xinmo.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2624 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-zpff.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4592 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/hid-zydacron.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/i2c-hid Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3144 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/i2c-hid/i2c-hid-acpi.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 15136 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/i2c-hid/i2c-hid.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/intel-ish-hid Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 15496 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/intel-ish-hid/intel-ish-ipc.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 12344 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/intel-ish-hid/intel-ishtp-hid.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 31828 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/intel-ish-hid/intel-ishtp.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/intel-thc-hid Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 14368 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/intel-thc-hid/intel-quicki2c.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 15944 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/intel-thc-hid/intel-quickspi.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 21800 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/intel-thc-hid/intel-thc.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9800 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/uhid.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 54532 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hid/wacom.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hv Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 61204 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/hv/hv_vmbus.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/i2c Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/i2c/algos Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7212 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/i2c/algos/i2c-algo-bit.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: drwxr-xr-x 4 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/infiniband Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/infiniband/core Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 51896 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/infiniband/core/ib_cm.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 196824 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/infiniband/core/ib_core.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 26676 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/infiniband/core/iw_cm.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 60588 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/infiniband/core/rdma_cm.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/infiniband/ulp Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/infiniband/ulp/srp Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 42472 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/infiniband/ulp/srp/ib_srp.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: drwxr-xr-x 4 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/input Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7504 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/input/ff-memless.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/input/rmi4 Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 49108 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/input/rmi4/rmi_core.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/input/serio Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3748 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/input/serio/altera_ps2.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4832 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/input/serio/arc_ps2.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7608 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/input/serio/hyperv-keyboard.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6428 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/input/serio/serio_raw.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4668 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/input/serio/serport.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4040 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/input/sparse-keymap.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8952 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-bio-prison.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 22792 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-bufio.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 15188 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-cache-smq.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 41688 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-cache.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 31092 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-crypt.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7748 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-delay.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 16332 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-era.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9664 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-flakey.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5924 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-historical-service-time.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 44232 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-integrity.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5160 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-io-affinity.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 13256 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-log-userspace.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 11980 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-log-writes.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 10700 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-log.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 15876 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-mirror.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 95408 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-mod.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 22928 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-multipath.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5152 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-queue-length.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 26564 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-raid.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 10280 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-region-hash.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4888 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-round-robin.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5268 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-service-time.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 30320 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-snapshot.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7540 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-switch.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 45992 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-thin-pool.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 24516 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-verity.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 24568 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-writecache.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3584 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/dm-zero.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4996 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/faulty.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5804 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/linear.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/persistent-data Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 47788 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/persistent-data/dm-persistent-data.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 10788 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/raid0.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 29476 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/raid1.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 36340 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/raid10.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 94584 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/md/raid456.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/memstick Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/memstick/core Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9164 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/memstick/core/memstick.ko.xz Sep 30 23:08:16 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 14524 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/memstick/core/mspro_block.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/message Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/message/fusion Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 58272 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/message/fusion/mptbase.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 45848 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/message/fusion/mptsas.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 27308 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/message/fusion/mptscsih.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 19856 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/message/fusion/mptspi.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 5 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/misc Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/misc/cardreader Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 42056 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/misc/cardreader/rtsx_pci.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 10432 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/misc/cardreader/rtsx_usb.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/misc/cb710 Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7004 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/misc/cb710/cb710.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/misc/mei Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 70640 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/misc/mei/mei.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6560 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/misc/tifm_core.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 4 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/mmc Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/mmc/core Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 30712 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/mmc/core/mmc_block.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 91148 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/mmc/core/mmc_core.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/mmc/host Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 12116 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/mmc/host/cb710-mmc.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 17568 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/mmc/host/cqhci.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 18080 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/mmc/host/rtsx_pci_sdmmc.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 16660 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/mmc/host/rtsx_usb_sdmmc.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 14096 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/mmc/host/sdhci-acpi.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 37416 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/mmc/host/sdhci-pci.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9172 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/mmc/host/sdhci-pltfm.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 40312 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/mmc/host/sdhci.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 13676 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/mmc/host/tifm_sd.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9176 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/mmc/host/ushc.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 12896 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/mmc/host/via-sdmmc.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 23760 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/mmc/host/vub300.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/mtd Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 38036 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/mtd/mtd.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9800 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/mtd/mtd_blkdevs.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7448 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/mtd/mtdblock.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 16 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/bonding Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 104836 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/bonding/bonding.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 24 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/amazon Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/amazon/ena Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 71144 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/amazon/ena/ena.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/amd Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/amd/xgbe Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 98640 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/amd/xgbe/amd-xgbe.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/aquantia Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/aquantia/atlantic Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 117204 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/aquantia/atlantic/atlantic.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 6 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/atheros Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/atheros/alx Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 27216 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/atheros/alx/alx.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/atheros/atl1c Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 31888 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/atheros/atl1c/atl1c.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/atheros/atl1e Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 25716 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/atheros/atl1e/atl1e.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/atheros/atlx Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 26268 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/atheros/atlx/atl1.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 20280 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/atheros/atlx/atl2.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 5 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/broadcom Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 55824 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/broadcom/bnx2.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/broadcom/bnx2x Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 404692 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/broadcom/bnx2x/bnx2x.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/broadcom/bnxt Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 212764 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/broadcom/bnxt/bnxt_en.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 65100 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/broadcom/cnic.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/broadcom/genet Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 35620 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/broadcom/genet/genet.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 101780 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/broadcom/tg3.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 6 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/chelsio Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/chelsio/cxgb4 Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 284940 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/chelsio/cxgb4/cxgb4.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/chelsio/cxgb4vf Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 51780 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/chelsio/cxgb4vf/cxgb4vf.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 4 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/chelsio/inline_crypto Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/chelsio/inline_crypto/ch_ipsec Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 16192 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/chelsio/inline_crypto/ch_ipsec/ch_ipsec.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 25704 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/chelsio/inline_crypto/ch_ktls/ch_ktls.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/chelsio/libcxgb Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 12684 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/chelsio/libcxgb/libcxgb.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/cisco Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/cisco/enic Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 59840 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/cisco/enic/enic.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/dlink Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 19380 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/dlink/dl2k.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/emulex Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/emulex/benet Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 89092 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/emulex/benet/be2net.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/google Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/google/gve Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 61764 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/google/gve/gve.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/huawei Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/huawei/hinic Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 110956 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/huawei/hinic/hinic.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 16 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/e1000 Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 76732 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/e1000/e1000.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/e1000e Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 134144 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/e1000e/e1000e.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/fm10k Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 72796 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/fm10k/fm10k.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/i40e Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 277256 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/i40e/i40e.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/iavf Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 97700 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/iavf/iavf.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/ice Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 539200 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/ice/ice.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/idpf Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 71400 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/idpf/idpf.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/igb Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 137560 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/igb/igb.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/igbvf Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 28576 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/igbvf/igbvf.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/igc Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 89280 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/igc/igc.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/ixgbe Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 219236 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/ixgbe/ixgbe.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/ixgbevf Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 47116 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/ixgbevf/ixgbevf.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/libeth Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3700 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/libeth/libeth.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/libie Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2148 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/intel/libie/libie.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 4 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/marvell Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/marvell/octeon_ep Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 45708 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/marvell/octeon_ep/octeon_ep.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/marvell/octeon_ep_vf Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 31284 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/marvell/octeon_ep_vf/octeon_ep_vf.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 6 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/mellanox Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/mellanox/mlx4 Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 203832 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/mellanox/mlx4/mlx4_core.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 85080 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/mellanox/mlx4/mlx4_en.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/mellanox/mlx5 Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/mellanox/mlx5/core Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1084372 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/mellanox/mlx5/core/mlx5_core.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 14872 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/mellanox/mlx5/core/mlx5_dpll.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/mellanox/mlxfw Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 14444 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/mellanox/mlxfw/mlxfw.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/mellanox/mlxsw Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 127908 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/mellanox/mlxsw/mlxsw_core.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 10236 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/mellanox/mlxsw/mlxsw_i2c.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 11812 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/mellanox/mlxsw/mlxsw_minimal.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 39252 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/mellanox/mlxsw/mlxsw_pci.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 407200 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/mellanox/mlxsw/mlxsw_spectrum.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/microsoft Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/microsoft/mana Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 62556 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/microsoft/mana/mana.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/myricom Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/myricom/myri10ge Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 34872 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/myricom/myri10ge/myri10ge.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/netronome Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/netronome/nfp Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 280920 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/netronome/nfp/nfp.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/pensando Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/pensando/ionic Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 97720 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/pensando/ionic/ionic.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 5 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/qlogic Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/qlogic/netxen Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 65732 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/qlogic/netxen/netxen_nic.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/qlogic/qed Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 395388 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/qlogic/qed/qed.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/qlogic/qede Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 93004 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/qlogic/qede/qede.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 30116 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/qlogic/qla3xxx.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/realtek Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 19232 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/realtek/8139cp.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 21952 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/realtek/8139too.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 53252 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/realtek/r8169.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/sfc Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 253656 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/sfc/sfc.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/sfc/siena Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 144644 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/sfc/siena/sfc-siena.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/stmicro Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/stmicro/stmmac Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 18044 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/stmicro/stmmac/dwmac-intel.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 134276 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ethernet/stmicro/stmmac/stmmac.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/fjes Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 36836 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/fjes/fjes.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 20528 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/geneve.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/hyperv Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 57692 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/hyperv/hv_netvsc.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ipvlan Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 19632 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ipvlan/ipvlan.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 28684 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/macsec.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 15248 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/macvlan.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/mdio Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5176 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/mdio.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5152 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/mdio/mdio-bcm-unimac.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4056 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/mdio/mdio-bitbang.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3004 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/mdio/mdio-cavium.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4004 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/mdio/mdio-mscc-miim.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3476 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/mdio/mdio-thunder.ko.xz Sep 30 23:08:17 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6308 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/mii.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8784 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/net_failover.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7288 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/ntb_netdev.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/pcs Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 10084 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/pcs/pcs_xpcs.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 5 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8944 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/air_en8811h.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2752 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/amd.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/aquantia Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 13552 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/aquantia/aquantia.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3000 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/ax88796b.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 11232 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/bcm-phy-lib.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7956 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/bcm-phy-ptp.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8008 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/bcm7xxx.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3028 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/bcm87xx.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9140 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/broadcom.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2756 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/cicada.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2884 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/cortina.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3080 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/davicom.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 14152 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/dp83640.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6380 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/dp83822.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3048 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/dp83848.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7220 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/dp83867.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4072 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/dp83tc811.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3748 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/dp83tg720.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2608 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/et1011c.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6120 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/icplus.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4108 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/intel-xway.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3908 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/lxt.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6608 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/marvell-88q2xxx.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 18176 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/marvell.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 10264 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/marvell10g.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 26108 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/micrel.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5672 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/microchip.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 10304 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/microchip_t1.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/mscc Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 32772 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/mscc/mscc.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8116 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/mxl-gpy.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3224 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/national.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 27528 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/phylink.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/qcom Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6152 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/qcom/qca808x.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4460 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/qcom/qca83xx.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7160 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/qcom/qcom-phy-lib.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2800 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/qsemi.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 11204 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/realtek.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3304 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/rockchip.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7088 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/smsc.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5360 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/spi_ks8995.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2868 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/ste10Xp.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2672 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/teranetics.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2692 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/uPD60620.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5204 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/vitesse.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2844 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/phy/xilinx_gmii2rgmii.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/team Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 25672 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/team/team.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4072 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/team/team_mode_activebackup.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3500 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/team/team_mode_broadcast.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7960 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/team/team_mode_loadbalance.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3460 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/team/team_mode_random.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3436 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/team/team_mode_roundrobin.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/thunderbolt Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 19848 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/thunderbolt/thunderbolt_net.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 32836 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/tun.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/usb Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 24392 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/usb/asix.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 14904 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/usb/ax88179_178a.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 12020 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/usb/catc.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8828 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/usb/cdc_ether.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8664 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/usb/cdc_mbim.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 19264 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/usb/cdc_ncm.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8860 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/usb/dm9601.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4920 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/usb/int51x1.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7460 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/usb/ipheth.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 12300 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/usb/kaweth.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 35476 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/usb/lan78xx.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8008 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/usb/mcs7830.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 16828 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/usb/pegasus.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 14800 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/usb/qmi_wwan.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 59276 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/usb/r8152.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9448 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/usb/rndis_host.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 10636 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/usb/rtl8150.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 10572 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/usb/sierra_net.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 20988 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/usb/smsc75xx.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 19268 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/usb/smsc95xx.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 24488 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/usb/usbnet.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 18092 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/veth.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 41848 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/virtio_net.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/vmxnet3 Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 45644 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/vmxnet3/vmxnet3.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 15984 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/vrf.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/vxlan Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 65580 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/vxlan/vxlan.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/wan Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5836 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/wan/hdlc.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 10920 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/wan/hdlc_fr.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 23152 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/net/xen-netfront.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/ntb Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9776 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/ntb/ntb.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 23988 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/ntb/ntb_transport.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/nvdimm Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 90600 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/nvdimm/libnvdimm.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 16320 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/nvdimm/nd_btt.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3640 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/nvdimm/nd_e820.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 11012 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/nvdimm/nd_pmem.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 5 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/nvme Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/nvme/common Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9836 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/nvme/common/nvme-auth.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5596 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/nvme/common/nvme-keyring.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/nvme/host Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 101460 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/nvme/host/nvme-core.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 20132 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/nvme/host/nvme-fabrics.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 37556 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/nvme/host/nvme-fc.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 35400 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/nvme/host/nvme.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/nvme/target Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 28608 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/nvme/target/nvmet-fc.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 93960 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/nvme/target/nvmet.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/pci Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/pci/controller Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2696 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/pci/controller/pci-hyperv-intf.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 25356 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/pci/controller/pci-hyperv.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 4 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/pinctrl Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/pinctrl/cirrus Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8268 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/pinctrl/cirrus/pinctrl-cs42l43.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/pinctrl/intel Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5704 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/pinctrl/intel/pinctrl-alderlake.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6980 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/pinctrl/intel/pinctrl-broxton.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6380 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/pinctrl/intel/pinctrl-cannonlake.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4088 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/pinctrl/intel/pinctrl-cedarfork.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3836 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/pinctrl/intel/pinctrl-denverton.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4788 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/pinctrl/intel/pinctrl-elkhartlake.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4268 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/pinctrl/intel/pinctrl-emmitsburg.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4908 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/pinctrl/intel/pinctrl-geminilake.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5864 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/pinctrl/intel/pinctrl-icelake.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3820 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/pinctrl/intel/pinctrl-intel-platform.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4168 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/pinctrl/intel/pinctrl-jasperlake.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4252 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/pinctrl/intel/pinctrl-lakefield.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4012 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/pinctrl/intel/pinctrl-lewisburg.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5360 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/pinctrl/intel/pinctrl-meteorlake.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4712 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/pinctrl/intel/pinctrl-meteorpoint.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5132 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/pinctrl/intel/pinctrl-sunrisepoint.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5636 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/pinctrl/intel/pinctrl-tigerlake.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/platform Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/platform/x86 Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 22292 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/platform/x86/asus-wmi.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 15324 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/platform/x86/wmi.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 16 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/aacraid Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 80200 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/aacraid/aacraid.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/bnx2fc Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 74420 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/bnx2fc/bnx2fc.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/csiostor Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 97296 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/csiostor/csiostor.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/fcoe Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 47072 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/fcoe/libfcoe.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/fnic Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 141944 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/fnic/fnic.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 67264 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/hpsa.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 19808 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/hv_storvsc.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6288 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/iscsi_boot_sysfs.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/libfc Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 84684 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/libfc/libfc.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 38992 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/libiscsi.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/lpfc Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 576632 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/lpfc/lpfc.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/megaraid Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 106016 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/megaraid/megaraid_sas.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/mpi3mr Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 123796 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/mpi3mr/mpi3mr.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/mpt3sas Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 191756 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/mpt3sas/mpt3sas.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/qedf Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 83256 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/qedf/qedf.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/qla2xxx Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 466844 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/qla2xxx/qla2xxx.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/qla4xxx Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 165444 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/qla4xxx/qla4xxx.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5480 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/raid_class.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 68172 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/scsi_debug.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 35376 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/scsi_transport_fc.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 54884 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/scsi_transport_iscsi.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 19068 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/scsi_transport_sas.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 18000 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/scsi_transport_spi.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 10488 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/scsi_transport_srp.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 39216 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/sd_mod.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 24084 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/sg.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/smartpqi Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 71472 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/smartpqi/smartpqi.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 14304 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/sr_mod.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 11544 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/virtio_scsi.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 16024 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/scsi/vmw_pvscsi.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/target Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/target/loopback Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 17764 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/target/loopback/tcm_loop.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 179252 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/target/target_core_mod.ko.xz Sep 30 23:08:18 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/tty Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 4 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/tty/serial Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/tty/serial/8250 Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5088 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/tty/serial/8250/8250_lpss.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2920 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/tty/serial/arc_uart.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/tty/serial/jsm Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 22560 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/tty/serial/jsm/jsm.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/uio Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 11224 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/uio/uio.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 7 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/class Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 14476 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/class/cdc-wdm.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/host Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6812 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/host/xhci-plat-hcd.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/image Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6536 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/image/microtek.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/storage Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 14752 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/storage/uas.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 10144 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/storage/ums-alauda.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4464 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/storage/ums-cypress.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6712 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/storage/ums-datafab.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 14820 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/storage/ums-eneub6250.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4696 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/storage/ums-freecom.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7748 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/storage/ums-isd200.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6404 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/storage/ums-jumpshot.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4348 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/storage/ums-karma.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5920 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/storage/ums-onetouch.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9192 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/storage/ums-realtek.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 11152 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/storage/ums-sddr09.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8132 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/storage/ums-sddr55.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9716 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/storage/ums-usbat.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 36064 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/storage/usb-storage.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 6 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/typec Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/typec/altmodes Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8840 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/typec/altmodes/typec_displayport.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5264 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/typec/altmodes/typec_thunderbolt.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/typec/mux Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5132 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/typec/mux/fsa4480.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4000 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/typec/mux/pi3usb30532.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8420 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/typec/rt1719.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/typec/tcpm Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 16140 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/typec/tcpm/fusb302.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9924 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/typec/tcpm/tcpci.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 46428 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/typec/tcpm/tcpm.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/typec/tipd Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 23300 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/typec/tipd/tps6598x.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5108 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/usb/typec/wusb3801.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/vdpa Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 14084 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/vdpa/vdpa.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/video Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/video/backlight Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5744 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/video/backlight/lcd.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/virtio Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 20736 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/virtio/virtio_mem.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7864 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/virtio/virtio_vdpa.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/watchdog Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7088 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/watchdog/hpwdt.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4564 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/watchdog/i6300esb.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3228 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/watchdog/iTCO_vendor_support.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6816 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/watchdog/iTCO_wdt.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5104 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/watchdog/ib700wdt.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4964 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/watchdog/ibmasr.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6872 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/watchdog/mei_wdt.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5148 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/watchdog/mlx_wdt.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4524 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/watchdog/softdog.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6656 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/watchdog/sp5100_tco.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7276 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/drivers/watchdog/wdat_wdt.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 25 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8756 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/binfmt_misc.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/cachefiles Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 52684 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/cachefiles/cachefiles.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/ceph Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 248500 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/ceph/ceph.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/dlm Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 127248 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/dlm/dlm.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/erofs Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 34200 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/erofs/erofs.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/exfat Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 47304 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/exfat/exfat.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/ext4 Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 396264 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/ext4/ext4.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/fat Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 45612 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/fat/fat.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8360 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/fat/msdos.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 11724 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/fat/vfat.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/fscache Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 39844 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/fscache/fscache.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/fuse Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 90520 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/fuse/fuse.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 18504 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/fuse/virtiofs.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/gfs2 Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 211056 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/gfs2/gfs2.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/isofs Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 26260 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/isofs/isofs.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/jbd2 Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 68160 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/jbd2/jbd2.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/lockd Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 63920 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/lockd/lockd.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6584 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/mbcache.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/netfs Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 22488 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/netfs/netfs.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 5 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nfs Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nfs/blocklayout Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 28964 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nfs/blocklayout/blocklayoutdriver.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nfs/filelayout Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 21140 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nfs/filelayout/nfs_layout_nfsv41_files.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nfs/flexfilelayout Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 36656 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nfs/flexfilelayout/nfs_layout_flexfiles.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 192212 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nfs/nfs.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 30372 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nfs/nfsv3.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 321736 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nfs/nfsv4.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nfs_common Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3812 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nfs_common/grace.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4972 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nfs_common/nfs_acl.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3092 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/mac-celtic.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3104 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/mac-centeuro.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3088 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/mac-croatian.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3016 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/mac-cyrillic.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3104 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/mac-gaelic.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3064 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/mac-greek.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3072 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/mac-iceland.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3064 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/mac-inuit.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3100 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/mac-roman.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3096 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/mac-romanian.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3088 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/mac-turkish.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3176 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_cp1250.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3020 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_cp1251.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3036 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_cp1255.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3156 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_cp737.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3220 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_cp775.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3116 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_cp850.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3224 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_cp852.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3176 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_cp855.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3124 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_cp857.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3180 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_cp860.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3200 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_cp861.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3176 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_cp862.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3200 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_cp863.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3180 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_cp864.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3200 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_cp865.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3068 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_cp866.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3152 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_cp869.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2900 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_cp874.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 33052 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_cp932.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 70064 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_cp936.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 58056 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_cp949.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 54572 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_cp950.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5236 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_euc-jp.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2852 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_iso8859-1.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3136 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_iso8859-13.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3000 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_iso8859-14.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2920 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_iso8859-15.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3140 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_iso8859-2.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3060 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_iso8859-3.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3128 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_iso8859-4.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2952 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_iso8859-5.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2840 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_iso8859-6.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2968 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_iso8859-7.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2896 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_iso8859-9.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3072 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_koi8-r.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2480 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_koi8-ru.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3152 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_koi8-u.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2396 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/nls/nls_utf8.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/overlayfs Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 89556 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/overlayfs/overlay.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/pstore Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 15844 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/pstore/ramoops.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 4 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/smb Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/smb/client Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 576992 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/smb/client/cifs.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/smb/common Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2336 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/smb/common/cifs_arc4.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4152 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/smb/common/cifs_md4.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/squashfs Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 33852 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/squashfs/squashfs.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/udf Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 69608 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/udf/udf.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/xfs Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 852420 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/fs/xfs/xfs.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 6 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/lib Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2428 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/lib/crc-itu-t.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2280 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/lib/crc8.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/lib/crypto Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 12704 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/lib/crypto/libcurve25519-generic.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7980 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/lib/crypto/libdes.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2592 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/lib/libcrc32c.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 17132 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/lib/objagg.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4048 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/lib/parman.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2028 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/lib/polynomial.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/lib/raid6 Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 75012 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/lib/raid6/raid6_pq.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/lib/reed_solomon Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7284 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/lib/reed_solomon/reed_solomon.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/lib/zstd Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 128788 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/lib/zstd/zstd_compress.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 16 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/802 Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8176 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/802/garp.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9592 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/802/mrp.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3100 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/802/stp.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/8021q Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 21468 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/8021q/8021q.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/bridge Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 151152 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/bridge/bridge.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/ceph Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 214840 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/ceph/libceph.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/core Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5256 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/core/failover.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/dns_resolver Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7500 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/dns_resolver/dns_resolver.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/ipv4 Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 12920 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/ipv4/udp_tunnel.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/ipv6 Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 22604 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/ipv6/ip6_tunnel.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4596 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/ipv6/ip6_udp_tunnel.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4720 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/ipv6/tunnel6.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/llc Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5744 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/llc/llc.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/netfilter Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4648 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/netfilter/nf_dup_netdev.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 139712 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/netfilter/nf_tables.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9024 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/netfilter/nfnetlink.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6200 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/netfilter/nft_fwd_netdev.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/psample Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 7292 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/psample/psample.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/rfkill Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 16108 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/rfkill/rfkill.ko.xz Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 4 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/sunrpc Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/sunrpc/auth_gss Sep 30 23:08:19 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 64732 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/sunrpc/auth_gss/auth_rpcgss.ko.xz Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 18484 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/sunrpc/auth_gss/rpcsec_gss_krb5.ko.xz Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 252312 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/sunrpc/sunrpc.ko.xz Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/sunrpc/xprtrdma Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 116624 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/sunrpc/xprtrdma/rpcrdma.ko.xz Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/tls Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 55212 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/net/tls/tls.ko.xz Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/sound Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/sound/core Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 23996 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/sound/core/snd-rawmidi.ko.xz Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6104 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/sound/core/snd-seq-device.ko.xz Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 56684 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/sound/core/snd.ko.xz Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 6216 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/kernel/sound/soundcore.ko.xz Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 270259 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/modules.alias Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 248674 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/modules.alias.bin Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 9631 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/modules.builtin Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 0 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/modules.builtin.alias.bin Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 11910 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/modules.builtin.bin Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 79819 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/modules.builtin.modinfo Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 49217 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/modules.dep Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 77530 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/modules.dep.bin Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 186 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/modules.devname Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 97887 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/modules.order Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 504 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/modules.softdep Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 216538 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/modules.symbols Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 259645 Aug 18 10:11 usr/lib/modules/5.14.0-620.el9.x86_64/modules.symbols.bin Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/modules/keys Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 26688 Jun 19 2022 usr/lib/net-lib.sh Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 4707 Jun 19 2022 usr/lib/nfs-lib.sh Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1216 Jun 19 2022 usr/lib/nm-lib.sh Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 14 Aug 18 10:11 usr/lib/os-release -> initrd-release Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 0 Aug 18 10:11 usr/lib/passwd Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/sysctl.d Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1810 May 1 23:37 usr/lib/sysctl.d/10-default-yama-scope.conf Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1816 Aug 15 09:14 usr/lib/sysctl.d/50-coredump.conf Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1919 Oct 31 2022 usr/lib/sysctl.d/50-default.conf Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 246 Dec 7 2023 usr/lib/sysctl.d/50-libkcapi-optmem_max.conf Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 635 Oct 31 2022 usr/lib/sysctl.d/50-pid-max.conf Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 203 Jul 10 14:06 usr/lib/sysctl.d/50-redhat.conf Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: drwxr-xr-x 7 root root 0 Aug 18 10:11 usr/lib/systemd Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/systemd/catalog Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 4246 Mar 17 2021 usr/lib/systemd/catalog/dbus-broker-launch.catalog Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2355 Mar 17 2021 usr/lib/systemd/catalog/dbus-broker.catalog Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/systemd/network Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 763 Aug 15 09:11 usr/lib/systemd/network/99-default.link Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: drwxr-xr-x 7 root root 0 Aug 18 10:11 usr/lib/systemd/system Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/systemd/system-generators Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 3726 Jun 19 2022 usr/lib/systemd/system-generators/dracut-rootfs-generator Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 40728 Aug 15 09:14 usr/lib/systemd/system-generators/systemd-cryptsetup-generator Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 24128 Aug 15 09:14 usr/lib/systemd/system-generators/systemd-debug-generator Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 57496 Aug 15 09:14 usr/lib/systemd/system-generators/systemd-fstab-generator Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 36304 Aug 15 09:14 usr/lib/systemd/system-generators/systemd-gpt-auto-generator Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 15904 Aug 15 09:14 usr/lib/systemd/system-generators/systemd-hibernate-resume-generator Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 964 Aug 15 09:11 usr/lib/systemd/system/basic.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 473 Oct 31 2022 usr/lib/systemd/system/cryptsetup-pre.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 420 Oct 31 2022 usr/lib/systemd/system/cryptsetup.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 13 Aug 18 10:11 usr/lib/systemd/system/ctrl-alt-del.target -> reboot.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 529 Aug 23 2022 usr/lib/systemd/system/dbus-broker.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 242 Aug 18 10:11 usr/lib/systemd/system/dbus.socket Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/systemd/system/dbus.target.wants Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1063 Aug 15 09:14 usr/lib/systemd/system/debug-shell.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 13 Aug 18 10:11 usr/lib/systemd/system/default.target -> initrd.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 843 Jun 19 2022 usr/lib/systemd/system/dracut-cmdline-ask.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 867 Jun 19 2022 usr/lib/systemd/system/dracut-cmdline.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 679 Jun 19 2022 usr/lib/systemd/system/dracut-emergency.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 784 Jun 19 2022 usr/lib/systemd/system/dracut-initqueue.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 756 Jun 19 2022 usr/lib/systemd/system/dracut-mount.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 785 Jun 19 2022 usr/lib/systemd/system/dracut-pre-mount.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1107 Jun 19 2022 usr/lib/systemd/system/dracut-pre-pivot.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 877 Jun 19 2022 usr/lib/systemd/system/dracut-pre-trigger.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 956 Jun 19 2022 usr/lib/systemd/system/dracut-pre-udev.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Jun 19 2022 usr/lib/systemd/system/emergency.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 479 Oct 31 2022 usr/lib/systemd/system/emergency.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 500 Oct 31 2022 usr/lib/systemd/system/final.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 542 Oct 31 2022 usr/lib/systemd/system/halt.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 670 Oct 31 2022 usr/lib/systemd/system/initrd-cleanup.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 598 Oct 31 2022 usr/lib/systemd/system/initrd-fs.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1255 Aug 15 09:14 usr/lib/systemd/system/initrd-parse-etc.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 566 Oct 31 2022 usr/lib/systemd/system/initrd-root-device.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/systemd/system/initrd-root-device.target.wants Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 27 Aug 18 10:11 usr/lib/systemd/system/initrd-root-device.target.wants/remote-cryptsetup.target -> ../remote-cryptsetup.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 571 Oct 31 2022 usr/lib/systemd/system/initrd-root-fs.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 623 Oct 31 2022 usr/lib/systemd/system/initrd-switch-root.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 779 Oct 31 2022 usr/lib/systemd/system/initrd-switch-root.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 823 Oct 31 2022 usr/lib/systemd/system/initrd-udevadm-cleanup-db.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 571 Oct 31 2022 usr/lib/systemd/system/initrd-usr-fs.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 810 Oct 31 2022 usr/lib/systemd/system/initrd.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 549 Oct 31 2022 usr/lib/systemd/system/kexec.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 705 Aug 15 09:14 usr/lib/systemd/system/kmod-static-nodes.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 453 Oct 31 2022 usr/lib/systemd/system/local-fs-pre.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 555 Oct 31 2022 usr/lib/systemd/system/local-fs.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 573 Oct 31 2022 usr/lib/systemd/system/modprobe@.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 540 Oct 31 2022 usr/lib/systemd/system/multi-user.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 483 Oct 31 2022 usr/lib/systemd/system/network-online.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 490 Oct 31 2022 usr/lib/systemd/system/network-pre.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 499 Oct 31 2022 usr/lib/systemd/system/network.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1080 Aug 18 10:10 usr/lib/systemd/system/nm-initrd.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 349 Jun 19 2022 usr/lib/systemd/system/nm-wait-online-initrd.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 562 Oct 31 2022 usr/lib/systemd/system/nss-lookup.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 521 Oct 31 2022 usr/lib/systemd/system/nss-user-lookup.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 407 Oct 31 2022 usr/lib/systemd/system/paths.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 607 Oct 31 2022 usr/lib/systemd/system/poweroff.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 598 Oct 31 2022 usr/lib/systemd/system/reboot.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 557 Oct 31 2022 usr/lib/systemd/system/remote-cryptsetup.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 454 Oct 31 2022 usr/lib/systemd/system/remote-fs-pre.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 530 Oct 31 2022 usr/lib/systemd/system/remote-fs.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 690 Jun 19 2022 usr/lib/systemd/system/rescue.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 500 Oct 31 2022 usr/lib/systemd/system/rescue.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 548 Oct 31 2022 usr/lib/systemd/system/rpcbind.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 457 Oct 31 2022 usr/lib/systemd/system/shutdown.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 410 Oct 31 2022 usr/lib/systemd/system/sigpwr.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 462 Oct 31 2022 usr/lib/systemd/system/slices.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 409 Oct 31 2022 usr/lib/systemd/system/sockets.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/systemd/system/sockets.target.wants Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 34 Aug 18 10:11 usr/lib/systemd/system/sockets.target.wants/systemd-journald-dev-log.socket -> ../systemd-journald-dev-log.socket Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 26 Aug 18 10:11 usr/lib/systemd/system/sockets.target.wants/systemd-journald.socket -> ../systemd-journald.socket Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 31 Aug 18 10:11 usr/lib/systemd/system/sockets.target.wants/systemd-udevd-control.socket -> ../systemd-udevd-control.socket Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 30 Aug 18 10:11 usr/lib/systemd/system/sockets.target.wants/systemd-udevd-kernel.socket -> ../systemd-udevd-kernel.socket Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 402 Oct 31 2022 usr/lib/systemd/system/swap.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1111 Oct 31 2022 usr/lib/systemd/system/sys-kernel-config.mount Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 574 Oct 31 2022 usr/lib/systemd/system/sysinit.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/systemd/system/sysinit.target.wants Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 20 Aug 18 10:11 usr/lib/systemd/system/sysinit.target.wants/cryptsetup.target -> ../cryptsetup.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 28 Aug 18 10:11 usr/lib/systemd/system/sysinit.target.wants/kmod-static-nodes.service -> ../kmod-static-nodes.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 36 Aug 18 10:11 usr/lib/systemd/system/sysinit.target.wants/systemd-ask-password-console.path -> ../systemd-ask-password-console.path Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 27 Aug 18 10:11 usr/lib/systemd/system/sysinit.target.wants/systemd-journald.service -> ../systemd-journald.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 31 Aug 18 10:11 usr/lib/systemd/system/sysinit.target.wants/systemd-modules-load.service -> ../systemd-modules-load.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 25 Aug 18 10:11 usr/lib/systemd/system/sysinit.target.wants/systemd-sysctl.service -> ../systemd-sysctl.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 27 Aug 18 10:11 usr/lib/systemd/system/sysinit.target.wants/systemd-sysusers.service -> ../systemd-sysusers.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 37 Aug 18 10:11 usr/lib/systemd/system/sysinit.target.wants/systemd-tmpfiles-setup-dev.service -> ../systemd-tmpfiles-setup-dev.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 33 Aug 18 10:11 usr/lib/systemd/system/sysinit.target.wants/systemd-tmpfiles-setup.service -> ../systemd-tmpfiles-setup.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 31 Aug 18 10:11 usr/lib/systemd/system/sysinit.target.wants/systemd-udev-trigger.service -> ../systemd-udev-trigger.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 24 Aug 18 10:11 usr/lib/systemd/system/sysinit.target.wants/systemd-udevd.service -> ../systemd-udevd.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1415 Oct 31 2022 usr/lib/systemd/system/syslog.socket Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 771 Oct 31 2022 usr/lib/systemd/system/systemd-ask-password-console.path Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 834 Oct 31 2022 usr/lib/systemd/system/systemd-ask-password-console.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 712 Aug 15 09:14 usr/lib/systemd/system/systemd-fsck@.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 594 Oct 31 2022 usr/lib/systemd/system/systemd-halt.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 680 Aug 15 09:14 usr/lib/systemd/system/systemd-hibernate-resume@.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 655 Oct 31 2022 usr/lib/systemd/system/systemd-journald-audit.socket Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1182 Oct 31 2022 usr/lib/systemd/system/systemd-journald-dev-log.socket Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2001 Aug 15 09:14 usr/lib/systemd/system/systemd-journald.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 934 Oct 31 2022 usr/lib/systemd/system/systemd-journald.socket Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 601 Oct 31 2022 usr/lib/systemd/system/systemd-kexec.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1019 Aug 15 09:14 usr/lib/systemd/system/systemd-modules-load.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 575 Oct 31 2022 usr/lib/systemd/system/systemd-poweroff.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1180 Aug 15 09:14 usr/lib/systemd/system/systemd-random-seed.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 568 Oct 31 2022 usr/lib/systemd/system/systemd-reboot.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 733 Aug 15 09:14 usr/lib/systemd/system/systemd-sysctl.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1217 Oct 31 2022 usr/lib/systemd/system/systemd-sysusers.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/systemd/system/systemd-sysusers.service.d Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 29 Jun 19 2022 usr/lib/systemd/system/systemd-sysusers.service.d/sysusers-dracut.conf Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 837 Oct 31 2022 usr/lib/systemd/system/systemd-tmpfiles-setup-dev.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 991 Aug 18 10:11 usr/lib/systemd/system/systemd-tmpfiles-setup.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 863 Oct 31 2022 usr/lib/systemd/system/systemd-udev-settle.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 758 Oct 31 2022 usr/lib/systemd/system/systemd-udev-trigger.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 650 Oct 31 2022 usr/lib/systemd/system/systemd-udevd-control.socket Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 624 Oct 31 2022 usr/lib/systemd/system/systemd-udevd-kernel.socket Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1302 Aug 15 09:14 usr/lib/systemd/system/systemd-udevd.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 650 Aug 15 09:14 usr/lib/systemd/system/systemd-vconsole-setup.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 743 Aug 15 09:14 usr/lib/systemd/system/systemd-volatile-root.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 458 Oct 31 2022 usr/lib/systemd/system/timers.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 465 Oct 31 2022 usr/lib/systemd/system/umount.target Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 98024 Aug 15 09:14 usr/lib/systemd/systemd Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 15592 Aug 15 09:14 usr/lib/systemd/systemd-cgroups-agent Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 69344 Aug 15 09:14 usr/lib/systemd/systemd-coredump Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 94568 Aug 15 09:14 usr/lib/systemd/systemd-cryptsetup Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 32056 Aug 15 09:14 usr/lib/systemd/systemd-fsck Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 15408 Aug 15 09:14 usr/lib/systemd/systemd-hibernate-resume Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 185496 Aug 15 09:14 usr/lib/systemd/systemd-journald Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 24096 Aug 15 09:14 usr/lib/systemd/systemd-modules-load Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 15632 Aug 15 09:14 usr/lib/systemd/systemd-reply-password Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 52736 Aug 15 09:14 usr/lib/systemd/systemd-shutdown Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 28200 Aug 15 09:14 usr/lib/systemd/systemd-sysctl Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 41 Aug 18 10:11 usr/lib/systemd/systemd-sysroot-fstab-check -> system-generators/systemd-fstab-generator Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 17 Aug 18 10:11 usr/lib/systemd/systemd-udevd -> ../../bin/udevadm Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 19760 Aug 15 09:14 usr/lib/systemd/systemd-vconsole-setup Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 23840 Aug 15 09:14 usr/lib/systemd/systemd-volatile-root Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/systemd/user Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 431 Aug 23 2022 usr/lib/systemd/user/dbus-broker.service Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 213 Jun 12 2023 usr/lib/systemd/user/dbus.socket Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/sysusers.d Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1250 Aug 15 09:14 usr/lib/sysusers.d/basic.conf Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 118 Jun 12 2023 usr/lib/sysusers.d/dbus.conf Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/tmpfiles.d Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 35 Aug 18 10:11 usr/lib/tmpfiles.d/cryptsetup.conf Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 135 Jun 19 2022 usr/lib/tmpfiles.d/dracut-tmpfiles.conf Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 87 Feb 15 2024 usr/lib/tmpfiles.d/rpcbind.conf Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2001 Aug 15 09:14 usr/lib/tmpfiles.d/systemd.conf Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib/udev Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 19720 Aug 15 09:14 usr/lib/udev/ata_id Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 32168 Aug 15 09:14 usr/lib/udev/cdrom_id Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 574 Jun 19 2022 usr/lib/udev/fc_transport_scan_lun.sh Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib/udev/rules.d Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -r--r--r-- 1 root root 7492 Jun 3 07:39 usr/lib/udev/rules.d/10-dm.rules Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -r--r--r-- 1 root root 2306 Jun 3 07:39 usr/lib/udev/rules.d/13-dm-disk.rules Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2014 Aug 15 09:11 usr/lib/udev/rules.d/40-redhat.rules Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5403 Aug 15 09:14 usr/lib/udev/rules.d/50-udev-default.rules Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 703 Oct 31 2022 usr/lib/udev/rules.d/60-block.rules Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1071 Oct 31 2022 usr/lib/udev/rules.d/60-cdrom_id.rules Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 10901 Aug 15 09:11 usr/lib/udev/rules.d/60-persistent-storage.rules Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 616 Aug 15 09:14 usr/lib/udev/rules.d/64-btrfs.rules Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3752 Aug 15 09:14 usr/lib/udev/rules.d/70-uaccess.rules Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3818 Aug 15 09:14 usr/lib/udev/rules.d/71-seat.rules Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 643 Aug 15 09:14 usr/lib/udev/rules.d/73-seat-late.rules Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 512 Aug 15 09:11 usr/lib/udev/rules.d/75-net-description.rules Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 600 Oct 31 2022 usr/lib/udev/rules.d/80-drivers.rules Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 295 Oct 31 2022 usr/lib/udev/rules.d/80-net-setup-link.rules Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 2013 Aug 18 10:11 usr/lib/udev/rules.d/85-nm-unmanaged.rules Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 489 Aug 15 09:14 usr/lib/udev/rules.d/90-vconsole.rules Sep 30 23:08:20 np0005463759.novalocal dracut[27280]: -r--r--r-- 1 root root 483 Jun 3 07:39 usr/lib/udev/rules.d/95-dm-notify.rules Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5039 Aug 15 09:14 usr/lib/udev/rules.d/99-systemd.rules Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 578 Jun 19 2022 usr/lib/udev/sas_transport_scan_lun.sh Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 36808 Aug 15 09:14 usr/lib/udev/scsi_id Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: drwxr-xr-x 8 root root 0 Aug 18 10:11 usr/lib64 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 0 Aug 3 2023 usr/lib64/.libgmp.so.10.4.0.hmac Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 34 Aug 18 10:11 usr/lib64/.libgmp.so.10.hmac -> ../../lib64/.libgmp.so.10.4.0.hmac Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 405 Aug 6 22:23 usr/lib64/.libgnutls.so.30.37.1.hmac Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 38 Aug 18 10:11 usr/lib64/.libgnutls.so.30.hmac -> ../../lib64/.libgnutls.so.30.37.1.hmac Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 65 Feb 14 2025 usr/lib64/.libhogweed.so.6.10.hmac Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 36 Aug 18 10:11 usr/lib64/.libhogweed.so.6.hmac -> ../../lib64/.libhogweed.so.6.10.hmac Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 65 Feb 14 2025 usr/lib64/.libnettle.so.8.10.hmac Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 35 Aug 18 10:11 usr/lib64/.libnettle.so.8.hmac -> ../../lib64/.libnettle.so.8.10.hmac Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/lib64/NetworkManager Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib64/NetworkManager/1.54.1-1.el9 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 57024 Aug 18 10:11 usr/lib64/NetworkManager/1.54.1-1.el9/libnm-device-plugin-team.so Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 317600 Aug 18 10:11 usr/lib64/NetworkManager/1.54.1-1.el9/libnm-settings-plugin-ifcfg-rh.so Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib64/fipscheck Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 65 Aug 9 2021 usr/lib64/fipscheck/libcrypt.so.2.0.0.hmac Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 47 Aug 18 10:11 usr/lib64/fipscheck/libcrypt.so.2.hmac -> ../../../lib64/fipscheck/libcrypt.so.2.0.0.hmac Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rw-r--r-- 2 root root 65 Aug 3 2023 usr/lib64/fipscheck/libgmp.so.10.4.0.hmac Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 46 Aug 18 10:11 usr/lib64/fipscheck/libgmp.so.10.hmac -> ../../../lib64/fipscheck/libgmp.so.10.4.0.hmac Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 65 Dec 7 2023 usr/lib64/fipscheck/libkcapi.so.1.4.0.hmac Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 47 Aug 18 10:11 usr/lib64/fipscheck/libkcapi.so.1.hmac -> ../../../lib64/fipscheck/libkcapi.so.1.4.0.hmac Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib64/hmaccalc Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 129 Dec 7 2023 usr/lib64/hmaccalc/sha512hmac.hmac Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 932656 Aug 18 10:11 usr/lib64/ld-linux-x86-64.so.2 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 30 Aug 18 10:11 usr/lib64/libacl.so.1 -> ../../lib64/libacl.so.1.1.2301 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 40496 Oct 6 2023 usr/lib64/libacl.so.1.1.2301 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 31 Aug 18 10:11 usr/lib64/libattr.so.1 -> ../../lib64/libattr.so.1.1.2501 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 28552 Aug 9 2021 usr/lib64/libattr.so.1.1.2501 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 29 Aug 18 10:11 usr/lib64/libaudit.so.1 -> ../../lib64/libaudit.so.1.0.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 161792 Apr 11 10:37 usr/lib64/libaudit.so.1.0.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 29 Aug 18 10:11 usr/lib64/libblkid.so.1 -> ../../lib64/libblkid.so.1.1.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 229432 Jan 16 2025 usr/lib64/libblkid.so.1.1.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 27 Aug 18 10:11 usr/lib64/libbpf.so.1 -> ../../lib64/libbpf.so.1.5.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 436224 Jul 14 01:19 usr/lib64/libbpf.so.1.5.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 36 Aug 18 10:11 usr/lib64/libbrotlicommon.so.1 -> ../../lib64/libbrotlicommon.so.1.0.9 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 138200 Sep 11 2024 usr/lib64/libbrotlicommon.so.1.0.9 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 33 Aug 18 10:11 usr/lib64/libbrotlidec.so.1 -> ../../lib64/libbrotlidec.so.1.0.9 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 52528 Sep 11 2024 usr/lib64/libbrotlidec.so.1.0.9 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 253 Aug 18 10:11 usr/lib64/libc.so Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 2549256 Aug 18 10:11 usr/lib64/libc.so.6 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 30 Aug 18 10:11 usr/lib64/libcap-ng.so.0 -> ../../lib64/libcap-ng.so.0.0.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 32528 Feb 15 2022 usr/lib64/libcap-ng.so.0.0.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 26 Aug 18 10:11 usr/lib64/libcap.so.2 -> ../../lib64/libcap.so.2.48 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 36296 Jul 3 10:07 usr/lib64/libcap.so.2.48 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 29 Aug 18 10:11 usr/lib64/libcom_err.so.2 -> ../../lib64/libcom_err.so.2.1 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 23760 Jul 7 04:53 usr/lib64/libcom_err.so.2.1 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 29 Aug 18 10:11 usr/lib64/libcrypt.so -> ../../lib64/libcrypt.so.2.0.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 29 Aug 18 10:11 usr/lib64/libcrypt.so.2 -> ../../lib64/libcrypt.so.2.0.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 201808 Aug 9 2021 usr/lib64/libcrypt.so.2.0.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 30 Aug 18 10:11 usr/lib64/libcrypto.so -> ../../lib64/libcrypto.so.3.5.1 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 30 Aug 18 10:11 usr/lib64/libcrypto.so.3 -> ../../lib64/libcrypto.so.3.5.1 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 6147488 Aug 18 10:11 usr/lib64/libcrypto.so.3.5.1 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 36 Aug 18 10:11 usr/lib64/libcryptsetup.so.12 -> ../../lib64/libcryptsetup.so.12.11.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 603944 Aug 18 10:11 usr/lib64/libcryptsetup.so.12.11.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 28 Aug 18 10:11 usr/lib64/libcurl.so.4 -> ../../lib64/libcurl.so.4.7.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 666384 Jun 24 05:06 usr/lib64/libcurl.so.4.7.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 30 Aug 18 10:11 usr/lib64/libdaemon.so.0 -> ../../lib64/libdaemon.so.0.5.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 36176 Aug 9 2021 usr/lib64/libdaemon.so.0.5.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 32 Aug 18 10:11 usr/lib64/libdbus-1.so.3 -> ../../lib64/libdbus-1.so.3.19.13 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 343752 Jun 12 2023 usr/lib64/libdbus-1.so.3.19.13 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -r-xr-xr-x 1 root root 387504 Jun 3 07:40 usr/lib64/libdevmapper.so.1.02 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 25 Aug 18 10:11 usr/lib64/libe2p.so.2 -> ../../lib64/libe2p.so.2.3 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 46248 Jul 7 04:53 usr/lib64/libe2p.so.2.3 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 29 Aug 18 10:11 usr/lib64/libeconf.so.0 -> ../../lib64/libeconf.so.0.4.1 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 40520 Apr 15 2024 usr/lib64/libeconf.so.0.4.1 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 29 Aug 18 10:11 usr/lib64/libedit.so.0 -> ../../lib64/libedit.so.0.0.64 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 236272 Jul 19 2023 usr/lib64/libedit.so.0.0.64 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 111608 May 1 23:37 usr/lib64/libelf-0.193.so Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 27 Aug 18 10:11 usr/lib64/libelf.so.1 -> ../../lib64/libelf-0.193.so Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 33 Aug 18 10:11 usr/lib64/libevent-2.1.so.7 -> ../../lib64/libevent-2.1.so.7.0.1 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 365352 Aug 20 2024 usr/lib64/libevent-2.1.so.7.0.1 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 38 Aug 18 10:11 usr/lib64/libevent_core-2.1.so.7 -> ../../lib64/libevent_core-2.1.so.7.0.1 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 231856 Aug 20 2024 usr/lib64/libevent_core-2.1.so.7.0.1 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 30 Aug 18 10:11 usr/lib64/libexpat.so.1 -> ../../lib64/libexpat.so.1.8.10 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 197944 Apr 1 2025 usr/lib64/libexpat.so.1.8.10 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 28 Aug 18 10:11 usr/lib64/libext2fs.so.2 -> ../../lib64/libext2fs.so.2.4 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 456280 Jul 7 04:53 usr/lib64/libext2fs.so.2.4 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 27 Aug 18 10:11 usr/lib64/libffi.so -> ../../lib64/libffi.so.8.1.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 27 Aug 18 10:11 usr/lib64/libffi.so.8 -> ../../lib64/libffi.so.8.1.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 44784 Apr 17 2023 usr/lib64/libffi.so.8.1.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 116408 Jul 31 07:09 usr/lib64/libgcc_s-11-20240719.so.1 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 37 Aug 18 10:11 usr/lib64/libgcc_s.so.1 -> ../../lib64/libgcc_s-11-20240719.so.1 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 31 Aug 18 10:11 usr/lib64/libgcrypt.so.20 -> ../../lib64/libgcrypt.so.20.4.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 1304864 Aug 1 2024 usr/lib64/libgcrypt.so.20.4.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 34 Aug 18 10:11 usr/lib64/libgio-2.0.so.0 -> ../../lib64/libgio-2.0.so.0.6800.4 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 1949320 Sep 27 2024 usr/lib64/libgio-2.0.so.0.6800.4 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 35 Aug 18 10:11 usr/lib64/libglib-2.0.so.0 -> ../../lib64/libglib-2.0.so.0.6800.4 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 1303152 Sep 27 2024 usr/lib64/libglib-2.0.so.0.6800.4 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 38 Aug 18 10:11 usr/lib64/libgmodule-2.0.so.0 -> ../../lib64/libgmodule-2.0.so.0.6800.4 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 19592 Sep 27 2024 usr/lib64/libgmodule-2.0.so.0.6800.4 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 28 Aug 18 10:11 usr/lib64/libgmp.so.10 -> ../../lib64/libgmp.so.10.4.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 677824 Aug 3 2023 usr/lib64/libgmp.so.10.4.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 32 Aug 18 10:11 usr/lib64/libgnutls.so.30 -> ../../lib64/libgnutls.so.30.37.1 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 2345648 Aug 6 22:23 usr/lib64/libgnutls.so.30.37.1 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 38 Aug 18 10:11 usr/lib64/libgobject-2.0.so.0 -> ../../lib64/libgobject-2.0.so.0.6800.4 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 375272 Sep 27 2024 usr/lib64/libgobject-2.0.so.0.6800.4 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 34 Aug 18 10:11 usr/lib64/libgpg-error.so -> ../../lib64/libgpg-error.so.0.32.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 34 Aug 18 10:11 usr/lib64/libgpg-error.so.0 -> ../../lib64/libgpg-error.so.0.32.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 153600 Dec 7 2021 usr/lib64/libgpg-error.so.0.32.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 33 Aug 18 10:11 usr/lib64/libgssapi_krb5.so.2 -> ../../lib64/libgssapi_krb5.so.2.2 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 358448 May 5 12:29 usr/lib64/libgssapi_krb5.so.2.2 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 30 Aug 18 10:11 usr/lib64/libhogweed.so.6 -> ../../lib64/libhogweed.so.6.10 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 630288 Feb 14 2025 usr/lib64/libhogweed.so.6.10 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 28 Aug 18 10:11 usr/lib64/libidn2.so.0 -> ../../lib64/libidn2.so.0.3.7 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 130952 Aug 9 2021 usr/lib64/libidn2.so.0.3.7 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 32 Aug 18 10:11 usr/lib64/libjansson.so.4 -> ../../lib64/libjansson.so.4.14.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 62456 Nov 17 2021 usr/lib64/libjansson.so.4.14.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 30 Aug 18 10:11 usr/lib64/libjson-c.so.5 -> ../../lib64/libjson-c.so.5.0.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 75928 Sep 14 2021 usr/lib64/libjson-c.so.5.0.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 30 Aug 18 10:11 usr/lib64/libk5crypto.so.3 -> ../../lib64/libk5crypto.so.3.1 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 99024 May 5 12:29 usr/lib64/libk5crypto.so.3.1 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 29 Aug 18 10:11 usr/lib64/libkcapi.so.1 -> ../../lib64/libkcapi.so.1.4.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 70248 Dec 7 2023 usr/lib64/libkcapi.so.1.4.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 31 Aug 18 10:11 usr/lib64/libkeyutils.so.1 -> ../../lib64/libkeyutils.so.1.10 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 23992 Oct 17 2022 usr/lib64/libkeyutils.so.1.10 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 28 Aug 18 10:11 usr/lib64/libkmod.so.2 -> ../../lib64/libkmod.so.2.3.6 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 107424 Aug 18 08:59 usr/lib64/libkmod.so.2.3.6 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 26 Aug 18 10:11 usr/lib64/libkrb5.so.3 -> ../../lib64/libkrb5.so.3.3 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 906328 May 5 12:29 usr/lib64/libkrb5.so.3.3 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 33 Aug 18 10:11 usr/lib64/libkrb5support.so.0 -> ../../lib64/libkrb5support.so.0.1 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 66192 May 5 12:29 usr/lib64/libkrb5support.so.0.1 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 24 Aug 18 10:11 usr/lib64/liblber.so -> ../../lib64/liblber.so.2 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 30 Aug 18 10:11 usr/lib64/liblber.so.2 -> ../../lib64/liblber.so.2.0.200 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 70392 Feb 12 2025 usr/lib64/liblber.so.2.0.200 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 24 Aug 18 10:11 usr/lib64/libldap.so -> ../../lib64/libldap.so.2 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 32 Aug 18 10:11 usr/lib64/libldap.so.2 -> ../../lib64/libldap_r.so.2.0.200 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 417728 Feb 12 2025 usr/lib64/libldap_r.so.2.0.200 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 27 Aug 18 10:11 usr/lib64/liblz4.so.1 -> ../../lib64/liblz4.so.1.9.3 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 144120 Aug 9 2021 usr/lib64/liblz4.so.1.9.3 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 28 Aug 18 10:11 usr/lib64/liblzma.so -> ../../lib64/liblzma.so.5.2.5 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 28 Aug 18 10:11 usr/lib64/liblzma.so.5 -> ../../lib64/liblzma.so.5.2.5 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 178728 May 31 2022 usr/lib64/liblzma.so.5.2.5 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 110 Aug 18 10:11 usr/lib64/libm.so Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 904728 Aug 18 10:11 usr/lib64/libm.so.6 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 27 Aug 18 10:11 usr/lib64/libmnl.so.0 -> ../../lib64/libmnl.so.0.2.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 28272 May 9 2024 usr/lib64/libmnl.so.0.2.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 29 Aug 18 10:11 usr/lib64/libmount.so.1 -> ../../lib64/libmount.so.1.1.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 291496 Jan 16 2025 usr/lib64/libmount.so.1.1.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 28 Aug 18 10:11 usr/lib64/libmpfr.so.6 -> ../../lib64/libmpfr.so.6.1.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 726864 Aug 9 2021 usr/lib64/libmpfr.so.6.1.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 27 Aug 18 10:11 usr/lib64/libndp.so.0 -> ../../lib64/libndp.so.0.3.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 32424 Jul 22 2024 usr/lib64/libndp.so.0.3.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 29 Aug 18 10:11 usr/lib64/libnettle.so.8 -> ../../lib64/libnettle.so.8.10 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 361456 Feb 14 2025 usr/lib64/libnettle.so.8.10 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib64/libnfsidmap Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 32 Aug 18 10:11 usr/lib64/libnfsidmap.so.1 -> ../../lib64/libnfsidmap.so.1.0.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 40224 Aug 18 10:11 usr/lib64/libnfsidmap.so.1.0.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 36192 Aug 18 10:11 usr/lib64/libnfsidmap/nsswitch.so Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 19544 Aug 18 10:11 usr/lib64/libnfsidmap/regex.so Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 40648 Aug 18 08:42 usr/lib64/libnfsidmap/sss.so Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 27872 Aug 18 10:11 usr/lib64/libnfsidmap/static.so Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 48560 Aug 18 10:11 usr/lib64/libnfsidmap/umich_ldap.so Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 33 Aug 18 10:11 usr/lib64/libnghttp2.so.14 -> ../../lib64/libnghttp2.so.14.20.1 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 168672 Apr 10 2024 usr/lib64/libnghttp2.so.14.20.1 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 31 Aug 18 10:11 usr/lib64/libnl-3.so.200 -> ../../lib64/libnl-3.so.200.26.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 154760 Nov 13 2024 usr/lib64/libnl-3.so.200.26.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 35 Aug 18 10:11 usr/lib64/libnl-cli-3.so.200 -> ../../lib64/libnl-cli-3.so.200.26.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 53472 Nov 13 2024 usr/lib64/libnl-cli-3.so.200.26.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 36 Aug 18 10:11 usr/lib64/libnl-genl-3.so.200 -> ../../lib64/libnl-genl-3.so.200.26.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 37528 Nov 13 2024 usr/lib64/libnl-genl-3.so.200.26.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 34 Aug 18 10:11 usr/lib64/libnl-nf-3.so.200 -> ../../lib64/libnl-nf-3.so.200.26.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 120488 Nov 13 2024 usr/lib64/libnl-nf-3.so.200.26.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 37 Aug 18 10:11 usr/lib64/libnl-route-3.so.200 -> ../../lib64/libnl-route-3.so.200.26.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 638856 Nov 13 2024 usr/lib64/libnl-route-3.so.200.26.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 26 Aug 18 10:11 usr/lib64/libnm.so.0 -> ../../lib64/libnm.so.0.1.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 1609344 Aug 18 10:11 usr/lib64/libnm.so.0.1.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 45544 Aug 18 10:11 usr/lib64/libnss_compat.so.2 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 15336 Aug 18 10:11 usr/lib64/libnss_dns.so.2 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 15336 Aug 18 10:11 usr/lib64/libnss_files.so.2 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 157096 Aug 15 09:14 usr/lib64/libnss_myhostname.so.2 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 153224 Aug 15 09:14 usr/lib64/libnss_resolve.so.2 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 53384 Aug 18 08:42 usr/lib64/libnss_sss.so.2 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 357416 Aug 15 09:14 usr/lib64/libnss_systemd.so.2 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 31 Aug 18 10:11 usr/lib64/libp11-kit.so.0 -> ../../lib64/libp11-kit.so.0.4.5 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 1767968 Aug 18 10:11 usr/lib64/libp11-kit.so.0.4.5 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 28 Aug 18 10:11 usr/lib64/libpam.so.0 -> ../../lib64/libpam.so.0.85.1 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 69480 Jun 24 05:59 usr/lib64/libpam.so.0.85.1 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 29 Aug 18 10:11 usr/lib64/libpcre.so.1 -> ../../lib64/libpcre.so.1.2.12 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 488664 Apr 17 2024 usr/lib64/libpcre.so.1.2.12 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 32 Aug 18 10:11 usr/lib64/libpcre2-8.so.0 -> ../../lib64/libpcre2-8.so.0.11.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 636848 Jul 31 2024 usr/lib64/libpcre2-8.so.0.11.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 30 Aug 18 10:11 usr/lib64/libprocps.so.8 -> ../../lib64/libprocps.so.8.0.3 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 86144 Jan 23 2024 usr/lib64/libprocps.so.8.0.3 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 27 Aug 18 10:11 usr/lib64/libpsl.so.5 -> ../../lib64/libpsl.so.5.3.3 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 77488 Aug 9 2021 usr/lib64/libpsl.so.5.3.3 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 28 Aug 18 10:11 usr/lib64/libreadline.so -> ../../lib64/libreadline.so.8 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 30 Aug 18 10:11 usr/lib64/libreadline.so.8 -> ../../lib64/libreadline.so.8.1 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 358128 Aug 10 2021 usr/lib64/libreadline.so.8.1 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 26 Aug 18 10:11 usr/lib64/libresolv.so -> ../../lib64/libresolv.so.2 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 70520 Aug 18 10:11 usr/lib64/libresolv.so.2 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 29 Aug 18 10:11 usr/lib64/libsasl2.so -> ../../lib64/libsasl2.so.3.0.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 29 Aug 18 10:11 usr/lib64/libsasl2.so.3 -> ../../lib64/libsasl2.so.3.0.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 128416 Sep 12 2022 usr/lib64/libsasl2.so.3.0.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 31 Aug 18 10:11 usr/lib64/libseccomp.so.2 -> ../../lib64/libseccomp.so.2.5.2 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 127680 Nov 9 2021 usr/lib64/libseccomp.so.2.5.2 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 175744 Jan 28 2025 usr/lib64/libselinux.so.1 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 31 Aug 18 10:11 usr/lib64/libsigsegv.so.2 -> ../../lib64/libsigsegv.so.2.0.6 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 20192 Aug 9 2021 usr/lib64/libsigsegv.so.2.0.6 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 33 Aug 18 10:11 usr/lib64/libsmartcols.so.1 -> ../../lib64/libsmartcols.so.1.1.0 Sep 30 23:08:21 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 107944 Jan 16 2025 usr/lib64/libsmartcols.so.1.1.0 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 27 Aug 18 10:11 usr/lib64/libssh.so.4 -> ../../lib64/libssh.so.4.9.4 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 483832 Feb 19 2024 usr/lib64/libssh.so.4.9.4 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 27 Aug 18 10:11 usr/lib64/libssl.so -> ../../lib64/libssl.so.3.5.1 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 27 Aug 18 10:11 usr/lib64/libssl.so.3 -> ../../lib64/libssl.so.3.5.1 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 1039912 Aug 18 10:11 usr/lib64/libssl.so.3.5.1 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 27 Aug 18 10:11 usr/lib64/libsystemd.so -> ../../lib64/libsystemd.so.0 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 32 Aug 18 10:11 usr/lib64/libsystemd.so.0 -> ../../lib64/libsystemd.so.0.35.0 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 919912 Aug 15 09:14 usr/lib64/libsystemd.so.0.35.0 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 29 Aug 18 10:11 usr/lib64/libtasn1.so.6 -> ../../lib64/libtasn1.so.6.6.0 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 94128 Feb 17 2025 usr/lib64/libtasn1.so.6.6.0 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 28 Aug 18 10:11 usr/lib64/libteam.so.5 -> ../../lib64/libteam.so.5.6.1 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 60992 Dec 7 2022 usr/lib64/libteam.so.5.6.1 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 32 Aug 18 10:11 usr/lib64/libteamdctl.so.0 -> ../../lib64/libteamdctl.so.0.1.5 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 31792 Dec 7 2022 usr/lib64/libteamdctl.so.0.1.5 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 25 Aug 18 10:11 usr/lib64/libtinfo.so -> ../../lib64/libtinfo.so.6 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 27 Aug 18 10:11 usr/lib64/libtinfo.so.6 -> ../../lib64/libtinfo.so.6.2 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 195088 Jul 1 05:21 usr/lib64/libtinfo.so.6.2 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 29 Aug 18 10:11 usr/lib64/libtirpc.so.3 -> ../../lib64/libtirpc.so.3.0.0 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 196224 Jul 30 2024 usr/lib64/libtirpc.so.3.0.0 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 24 Aug 18 10:11 usr/lib64/libudev.so -> ../../lib64/libudev.so.1 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 28 Aug 18 10:11 usr/lib64/libudev.so.1 -> ../../lib64/libudev.so.1.7.5 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 200152 Aug 15 09:14 usr/lib64/libudev.so.1.7.5 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 33 Aug 18 10:11 usr/lib64/libunistring.so.2 -> ../../lib64/libunistring.so.2.1.0 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 1591920 Aug 9 2021 usr/lib64/libunistring.so.2.1.0 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 35 Aug 18 10:11 usr/lib64/liburcu-common.so.6 -> ../../lib64/liburcu-common.so.6.1.0 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 24248 Aug 10 2021 usr/lib64/liburcu-common.so.6.1.0 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 28 Aug 18 10:11 usr/lib64/liburcu.so.6 -> ../../lib64/liburcu.so.6.1.0 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 41312 Aug 10 2021 usr/lib64/liburcu.so.6.1.0 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 28 Aug 18 10:11 usr/lib64/libuuid.so.1 -> ../../lib64/libuuid.so.1.3.0 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 36440 Jan 16 2025 usr/lib64/libuuid.so.1.3.0 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 26 Aug 18 10:11 usr/lib64/libz.so -> ../../lib64/libz.so.1.2.11 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 26 Aug 18 10:11 usr/lib64/libz.so.1 -> ../../lib64/libz.so.1.2.11 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 102672 Oct 30 2023 usr/lib64/libz.so.1.2.11 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 28 Aug 18 10:11 usr/lib64/libzstd.so.1 -> ../../lib64/libzstd.so.1.5.5 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 754200 Nov 18 2024 usr/lib64/libzstd.so.1.5.5 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib64/ossl-modules Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 2591432 Aug 18 10:11 usr/lib64/ossl-modules/fips.so Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/lib64/systemd Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 2161960 Aug 15 09:14 usr/lib64/systemd/libsystemd-core-252.so Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 3827392 Aug 15 09:14 usr/lib64/systemd/libsystemd-shared-252.so Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/libexec Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 15656 Aug 18 10:11 usr/libexec/nm-daemon-helper Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 19696 Aug 18 10:11 usr/libexec/nm-dhcp-helper Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 798720 Aug 18 10:11 usr/libexec/nm-initrd-generator Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 1452176 Feb 26 2025 usr/libexec/vi Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/sbin Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 3869144 Aug 18 10:11 usr/sbin/NetworkManager Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 13 Aug 18 10:11 usr/sbin/arping -> ../bin/arping Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 53032 Jan 16 2025 usr/sbin/blkid Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 40680 Dec 9 2024 usr/sbin/chroot Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 804 Jun 19 2022 usr/sbin/crypt-run-generator Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 11 Aug 18 10:11 usr/sbin/depmod -> ../bin/kmod Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 1999552 Apr 12 2023 usr/sbin/dhclient Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -r-xr-xr-x 1 root root 160528 Jun 3 07:40 usr/sbin/dmsetup Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 4 root root 0 Jul 7 04:53 usr/sbin/e2fsck Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 8816 Aug 18 10:10 usr/sbin/fips.sh Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 44784 Jan 16 2025 usr/sbin/fsck Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 32312 Jan 16 2025 usr/sbin/fsck.cramfs Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 4 root root 0 Jul 7 04:53 usr/sbin/fsck.ext2 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 4 root root 0 Jul 7 04:53 usr/sbin/fsck.ext3 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 4 root root 364632 Jul 7 04:53 usr/sbin/fsck.ext4 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 57216 Jan 16 2025 usr/sbin/fsck.minix Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 2598 May 16 07:26 usr/sbin/fsck.xfs Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 16 Aug 18 10:11 usr/sbin/halt -> ../bin/systemctl Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 22 Aug 18 10:11 usr/sbin/init -> ../lib/systemd/systemd Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 1345 Jun 19 2022 usr/sbin/initqueue Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 11 Aug 18 10:11 usr/sbin/insmod -> ../bin/kmod Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 199 Jun 19 2022 usr/sbin/insmodpost.sh Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 788672 Jul 22 03:08 usr/sbin/ip Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 197224 Aug 6 20:07 usr/sbin/kexec Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 532 Jun 19 2022 usr/sbin/loginit Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 73992 Jan 16 2025 usr/sbin/losetup Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 11 Aug 18 10:11 usr/sbin/lsmod -> ../bin/kmod Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 11 Aug 18 10:11 usr/sbin/modinfo -> ../bin/kmod Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 11 Aug 18 10:11 usr/sbin/modprobe -> ../bin/kmod Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 102928 Aug 18 10:11 usr/sbin/mount.nfs Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 9 Aug 18 10:11 usr/sbin/mount.nfs4 -> mount.nfs Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 2840 Jun 19 2022 usr/sbin/netroot Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 773 Jun 19 2022 usr/sbin/nfsroot Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 15704 Jan 16 2025 usr/sbin/nologin Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 16 Aug 18 10:11 usr/sbin/poweroff -> ../bin/systemctl Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 1454 Jun 19 2022 usr/sbin/rdsosreport Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 16 Aug 18 10:11 usr/sbin/reboot -> ../bin/systemctl Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 11 Aug 18 10:11 usr/sbin/rmmod -> ../bin/kmod Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 48880 Aug 18 10:11 usr/sbin/rpc.idmapd Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 82720 Aug 18 10:11 usr/sbin/rpc.statd Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 14 Aug 18 10:11 usr/sbin/rpcbind -> ../bin/rpcbind Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 24000 Jan 16 2025 usr/sbin/swapoff Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 14 Aug 18 10:11 usr/sbin/udevadm -> ../bin/udevadm Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 725080 May 16 07:26 usr/sbin/xfs_db Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 786 May 16 07:26 usr/sbin/xfs_metadump Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rwxr-xr-x 1 root root 702720 May 16 07:26 usr/sbin/xfs_repair Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: drwxr-xr-x 5 root root 0 Aug 18 10:11 usr/share Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 25 Aug 18 10:11 usr/share/consolefonts -> /usr/lib/kbd/consolefonts Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 25 Aug 18 10:11 usr/share/consoletrans -> /usr/lib/kbd/consoletrans Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: drwxr-xr-x 3 root root 0 Aug 18 10:11 usr/share/crypto-policies Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/share/crypto-policies/DEFAULT Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 738 Aug 18 10:11 usr/share/crypto-policies/DEFAULT/opensslcnf.txt Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: drwxr-xr-x 7 root root 0 Aug 18 10:11 usr/share/dbus-1 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/share/dbus-1/interfaces Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/share/dbus-1/services Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 3561 Jun 12 2023 usr/share/dbus-1/session.conf Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/share/dbus-1/session.d Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/share/dbus-1/system-services Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 412 Oct 31 2022 usr/share/dbus-1/system-services/org.freedesktop.systemd1.service Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 5694 Jun 12 2023 usr/share/dbus-1/system.conf Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/share/dbus-1/system.d Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 8150 Aug 18 10:11 usr/share/dbus-1/system.d/org.freedesktop.NetworkManager.conf Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 20208 Oct 31 2022 usr/share/dbus-1/system.d/org.freedesktop.systemd1.conf Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 20 Aug 18 10:11 usr/share/keymaps -> /usr/lib/kbd/keymaps Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: drwxr-xr-x 4 root root 0 Aug 18 10:11 usr/share/terminfo Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/share/terminfo/l Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1728 Jul 1 05:22 usr/share/terminfo/l/linux Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 usr/share/terminfo/v Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1190 Jul 1 05:22 usr/share/terminfo/v/vt100 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1184 Jul 1 05:22 usr/share/terminfo/v/vt102 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: -rw-r--r-- 1 root root 1391 Jul 1 05:22 usr/share/terminfo/v/vt220 Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 20 Aug 18 10:11 usr/share/unimaps -> /usr/lib/kbd/unimaps Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: drwxr-xr-x 4 root root 0 Aug 18 10:11 var Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: drwxr-xr-x 4 root root 0 Aug 18 10:11 var/lib Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: drwxr-xr-x 4 root root 0 Aug 18 10:11 var/lib/nfs Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 var/lib/nfs/rpc_pipefs Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: drwx------ 3 rpcuser rpcuser 0 Aug 18 10:11 var/lib/nfs/statd Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 rpcuser rpcuser 0 Aug 18 10:11 var/lib/nfs/statd/sm Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: drwxrwx--- 2 root root 0 Aug 18 10:11 var/lib/rpcbind Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 11 Aug 18 10:11 var/lock -> ../run/lock Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: lrwxrwxrwx 1 root root 6 Aug 18 10:11 var/run -> ../run Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: drwxr-xr-x 2 root root 0 Aug 18 10:11 var/tmp Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: ======================================================================== Sep 30 23:08:22 np0005463759.novalocal dracut[27280]: *** Creating initramfs image file '/boot/initramfs-5.14.0-620.el9.x86_64.img' done *** Sep 30 23:08:23 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:08:23 np0005463759.novalocal systemd[1]: Starting man-db-cache-update.service... Sep 30 23:08:23 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:08:23 np0005463759.novalocal systemd-rc-local-generator[35975]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:08:24 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:08:24 np0005463759.novalocal systemd[1]: Stopped target NFS client services. Sep 30 23:08:24 np0005463759.novalocal systemd[1]: Stopping NFS client services... Sep 30 23:08:24 np0005463759.novalocal systemd[1]: Kernel Module supporting RPCSEC_GSS was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Sep 30 23:08:24 np0005463759.novalocal systemd[1]: RPC security service for NFS client and server was skipped because of an unmet condition check (ConditionPathExists=/etc/krb5.keytab). Sep 30 23:08:24 np0005463759.novalocal systemd[1]: Reached target NFS client services. Sep 30 23:08:24 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:08:24 np0005463759.novalocal sudo[10840]: pam_unix(sudo:session): session closed for user root Sep 30 23:08:25 np0005463759.novalocal sudo[36753]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-aykbexmgjaysxelaihrtmupqwcpoaljj ; /usr/bin/python3' Sep 30 23:08:25 np0005463759.novalocal sudo[36753]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:08:25 np0005463759.novalocal python3[36789]: ansible-dnf Invoked with name=['gettext', 'diffstat', 'doxygen', 'patch', 'patchutils', 'subversion', 'systemtap', 'git', 'wget', 'python3-libselinux', 'python3-setuptools', 'rubygem-rexml'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Sep 30 23:08:28 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Sep 30 23:08:28 np0005463759.novalocal systemd[1]: Finished man-db-cache-update.service. Sep 30 23:08:28 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Consumed 6.118s CPU time. Sep 30 23:08:28 np0005463759.novalocal systemd[1]: run-r2d7f6accba6f4b82901f0abd56172612.service: Deactivated successfully. Sep 30 23:08:28 np0005463759.novalocal systemd[1]: run-r12ddbe4f19b74b528391fcc53d4d56ed.service: Deactivated successfully. Sep 30 23:08:46 np0005463759.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Sep 30 23:08:46 np0005463759.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Sep 30 23:09:21 np0005463759.novalocal sshd-session[49530]: Invalid user django from 192.227.153.63 port 39560 Sep 30 23:09:21 np0005463759.novalocal sshd-session[49530]: Received disconnect from 192.227.153.63 port 39560:11: Bye Bye [preauth] Sep 30 23:09:21 np0005463759.novalocal sshd-session[49530]: Disconnected from invalid user django 192.227.153.63 port 39560 [preauth] Sep 30 23:09:37 np0005463759.novalocal groupadd[56024]: group added to /etc/group: name=rtkit, GID=172 Sep 30 23:09:37 np0005463759.novalocal groupadd[56024]: group added to /etc/gshadow: name=rtkit Sep 30 23:09:37 np0005463759.novalocal groupadd[56024]: new group: name=rtkit, GID=172 Sep 30 23:09:37 np0005463759.novalocal useradd[56032]: new user: name=rtkit, UID=172, GID=172, home=/, shell=/sbin/nologin, from=none Sep 30 23:09:37 np0005463759.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Sep 30 23:09:37 np0005463759.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Sep 30 23:09:37 np0005463759.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Sep 30 23:09:38 np0005463759.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Sep 30 23:09:38 np0005463759.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Sep 30 23:09:49 np0005463759.novalocal kernel: SELinux: Converting 456 SID table entries... Sep 30 23:09:49 np0005463759.novalocal kernel: SELinux: policy capability network_peer_controls=1 Sep 30 23:09:49 np0005463759.novalocal kernel: SELinux: policy capability open_perms=1 Sep 30 23:09:49 np0005463759.novalocal kernel: SELinux: policy capability extended_socket_class=1 Sep 30 23:09:49 np0005463759.novalocal kernel: SELinux: policy capability always_check_network=0 Sep 30 23:09:49 np0005463759.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Sep 30 23:09:49 np0005463759.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 30 23:09:49 np0005463759.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Sep 30 23:09:56 np0005463759.novalocal groupadd[56097]: group added to /etc/group: name=pipewire, GID=993 Sep 30 23:09:56 np0005463759.novalocal groupadd[56097]: group added to /etc/gshadow: name=pipewire Sep 30 23:09:56 np0005463759.novalocal groupadd[56097]: new group: name=pipewire, GID=993 Sep 30 23:09:56 np0005463759.novalocal useradd[56104]: new user: name=pipewire, UID=993, GID=993, home=/run/pipewire, shell=/usr/sbin/nologin, from=none Sep 30 23:09:56 np0005463759.novalocal groupadd[56119]: group added to /etc/group: name=geoclue, GID=992 Sep 30 23:09:56 np0005463759.novalocal groupadd[56119]: group added to /etc/gshadow: name=geoclue Sep 30 23:09:56 np0005463759.novalocal groupadd[56119]: new group: name=geoclue, GID=992 Sep 30 23:09:57 np0005463759.novalocal useradd[56126]: new user: name=geoclue, UID=992, GID=992, home=/var/lib/geoclue, shell=/sbin/nologin, from=none Sep 30 23:09:57 np0005463759.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Sep 30 23:09:57 np0005463759.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=2 res=1 Sep 30 23:09:57 np0005463759.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Sep 30 23:09:57 np0005463759.novalocal polkitd[2930]: Reloading rules Sep 30 23:09:57 np0005463759.novalocal polkitd[2930]: Collecting garbage unconditionally... Sep 30 23:09:57 np0005463759.novalocal polkitd[2930]: Loading rules from directory /etc/polkit-1/rules.d Sep 30 23:09:57 np0005463759.novalocal polkitd[2930]: Loading rules from directory /usr/share/polkit-1/rules.d Sep 30 23:09:57 np0005463759.novalocal polkitd[2930]: Finished loading, compiling and executing 4 rules Sep 30 23:09:57 np0005463759.novalocal polkitd[2930]: Reloading rules Sep 30 23:09:57 np0005463759.novalocal polkitd[2930]: Collecting garbage unconditionally... Sep 30 23:09:57 np0005463759.novalocal polkitd[2930]: Loading rules from directory /etc/polkit-1/rules.d Sep 30 23:09:57 np0005463759.novalocal polkitd[2930]: Loading rules from directory /usr/share/polkit-1/rules.d Sep 30 23:09:57 np0005463759.novalocal polkitd[2930]: Finished loading, compiling and executing 4 rules Sep 30 23:09:57 np0005463759.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Sep 30 23:09:57 np0005463759.novalocal groupadd[56138]: group added to /etc/group: name=flatpak, GID=991 Sep 30 23:09:57 np0005463759.novalocal groupadd[56138]: group added to /etc/gshadow: name=flatpak Sep 30 23:09:57 np0005463759.novalocal groupadd[56138]: new group: name=flatpak, GID=991 Sep 30 23:09:57 np0005463759.novalocal useradd[56145]: new user: name=flatpak, UID=991, GID=991, home=/, shell=/usr/sbin/nologin, from=none Sep 30 23:09:57 np0005463759.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Sep 30 23:09:57 np0005463759.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Sep 30 23:09:57 np0005463759.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Sep 30 23:09:57 np0005463759.novalocal polkitd[2930]: Reloading rules Sep 30 23:09:57 np0005463759.novalocal polkitd[2930]: Collecting garbage unconditionally... Sep 30 23:09:57 np0005463759.novalocal polkitd[2930]: Loading rules from directory /etc/polkit-1/rules.d Sep 30 23:09:57 np0005463759.novalocal polkitd[2930]: Loading rules from directory /usr/share/polkit-1/rules.d Sep 30 23:09:57 np0005463759.novalocal polkitd[2930]: Finished loading, compiling and executing 5 rules Sep 30 23:09:57 np0005463759.novalocal polkitd[2930]: Reloading rules Sep 30 23:09:57 np0005463759.novalocal polkitd[2930]: Collecting garbage unconditionally... Sep 30 23:09:57 np0005463759.novalocal polkitd[2930]: Loading rules from directory /etc/polkit-1/rules.d Sep 30 23:09:57 np0005463759.novalocal polkitd[2930]: Loading rules from directory /usr/share/polkit-1/rules.d Sep 30 23:09:57 np0005463759.novalocal polkitd[2930]: Finished loading, compiling and executing 5 rules Sep 30 23:09:59 np0005463759.novalocal systemd[1]: Stopping OpenSSH server daemon... Sep 30 23:09:59 np0005463759.novalocal sshd[1005]: Received signal 15; terminating. Sep 30 23:09:59 np0005463759.novalocal systemd[1]: sshd.service: Deactivated successfully. Sep 30 23:09:59 np0005463759.novalocal systemd[1]: Stopped OpenSSH server daemon. Sep 30 23:09:59 np0005463759.novalocal systemd[1]: Stopped target sshd-keygen.target. Sep 30 23:09:59 np0005463759.novalocal systemd[1]: Stopping sshd-keygen.target... Sep 30 23:09:59 np0005463759.novalocal systemd[1]: OpenSSH ecdsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Sep 30 23:09:59 np0005463759.novalocal systemd[1]: OpenSSH ed25519 Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Sep 30 23:09:59 np0005463759.novalocal systemd[1]: OpenSSH rsa Server Key Generation was skipped because of an unmet condition check (ConditionPathExists=!/run/systemd/generator.early/multi-user.target.wants/cloud-init.target). Sep 30 23:09:59 np0005463759.novalocal systemd[1]: Reached target sshd-keygen.target. Sep 30 23:09:59 np0005463759.novalocal systemd[1]: Starting OpenSSH server daemon... Sep 30 23:09:59 np0005463759.novalocal sshd[56186]: Server listening on 0.0.0.0 port 22. Sep 30 23:09:59 np0005463759.novalocal sshd[56186]: Server listening on :: port 22. Sep 30 23:09:59 np0005463759.novalocal systemd[1]: Started OpenSSH server daemon. Sep 30 23:10:00 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:10:00 np0005463759.novalocal systemd[1]: Starting man-db-cache-update.service... Sep 30 23:10:00 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:10:00 np0005463759.novalocal systemd-rc-local-generator[56276]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:10:00 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:10:03 np0005463759.novalocal sudo[36753]: pam_unix(sudo:session): session closed for user root Sep 30 23:10:03 np0005463759.novalocal sudo[59063]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vznxhobkunhgryxtopmnkkvzhxuomtfn ; /usr/bin/python3' Sep 30 23:10:03 np0005463759.novalocal sudo[59063]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:10:04 np0005463759.novalocal python3[59097]: ansible-dnf Invoked with name=['net-tools', 'lsof', 'sysstat', 'psmisc', 'dnf-utils'] state=present allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Sep 30 23:10:09 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:10:09 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:10:09 np0005463759.novalocal systemd-rc-local-generator[63496]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:10:09 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:10:10 np0005463759.novalocal sudo[59063]: pam_unix(sudo:session): session closed for user root Sep 30 23:10:10 np0005463759.novalocal sudo[64118]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dayvyxqgfkqpsgzrjtwgylzgukubxzvq ; /usr/bin/python3' Sep 30 23:10:10 np0005463759.novalocal sudo[64118]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:10:10 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Sep 30 23:10:10 np0005463759.novalocal systemd[1]: Finished man-db-cache-update.service. Sep 30 23:10:10 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Consumed 12.555s CPU time. Sep 30 23:10:10 np0005463759.novalocal systemd[1]: run-r98785f4da70f4a3e9270435d60b1d2d4.service: Deactivated successfully. Sep 30 23:10:10 np0005463759.novalocal systemd[1]: run-r16abb2daacb1458ca8fda864bae38aaf.service: Deactivated successfully. Sep 30 23:10:10 np0005463759.novalocal python3[64136]: ansible-replace Invoked with dest=/usr/lib/systemd/system/sysstat-collect.timer regexp=10 replace=1 path=/usr/lib/systemd/system/sysstat-collect.timer backup=False encoding=utf-8 follow=False unsafe_writes=False after=None before=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Sep 30 23:10:10 np0005463759.novalocal sudo[64118]: pam_unix(sudo:session): session closed for user root Sep 30 23:10:10 np0005463759.novalocal sudo[64148]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zrmghxkmojoytkzbxtkwydntmeimilrn ; /usr/bin/python3' Sep 30 23:10:10 np0005463759.novalocal sudo[64148]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:10:10 np0005463759.novalocal systemd[1057]: Created slice User Background Tasks Slice. Sep 30 23:10:10 np0005463759.novalocal systemd[1057]: Starting Cleanup of User's Temporary Files and Directories... Sep 30 23:10:10 np0005463759.novalocal systemd[1057]: Finished Cleanup of User's Temporary Files and Directories. Sep 30 23:10:10 np0005463759.novalocal python3[64150]: ansible-systemd Invoked with name=sysstat enabled=True daemon_reload=True state=started daemon_reexec=False no_block=False force=None masked=None user=None scope=None Sep 30 23:10:10 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:10:10 np0005463759.novalocal systemd-rc-local-generator[64168]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:10:11 np0005463759.novalocal systemd[1]: Started Run system activity accounting tool every 1 minutes. Sep 30 23:10:11 np0005463759.novalocal systemd[1]: Started Generate summary of yesterday's process accounting. Sep 30 23:10:11 np0005463759.novalocal systemd[1]: Starting Resets System Activity Logs... Sep 30 23:10:11 np0005463759.novalocal systemd[1]: Finished Resets System Activity Logs. Sep 30 23:10:11 np0005463759.novalocal sudo[64148]: pam_unix(sudo:session): session closed for user root Sep 30 23:10:11 np0005463759.novalocal sudo[64198]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-manhzrfhfgdfxcpzwhfutfbupdpggvid ; /usr/bin/python3' Sep 30 23:10:11 np0005463759.novalocal sudo[64198]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:10:11 np0005463759.novalocal python3[64200]: ansible-lineinfile Invoked with dest=/etc/hosts line=127.0.0.1 np0005463759 np0005463759.novalocal state=present path=/etc/hosts backrefs=False create=False backup=False firstmatch=False follow=False unsafe_writes=False regexp=None insertafter=None insertbefore=None validate=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None src=None force=None content=NOT_LOGGING_PARAMETER remote_src=None delimiter=None directory_mode=None Sep 30 23:10:11 np0005463759.novalocal sudo[64198]: pam_unix(sudo:session): session closed for user root Sep 30 23:10:11 np0005463759.novalocal sudo[64207]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-taqwivprbsdueishlztuxufdeiohintt ; /usr/bin/python3' Sep 30 23:10:11 np0005463759.novalocal sudo[64207]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:10:12 np0005463759.novalocal python3[64209]: ansible-dnf Invoked with name=['libxml2-devel', 'libxslt-devel', 'ruby-devel', 'rubygems', 'qemu-img'] state=latest allow_downgrade=False autoremove=False bugfix=False disable_gpg_check=False disable_plugin=[] disablerepo=[] download_only=False enable_plugin=[] enablerepo=[] exclude=[] installroot=/ install_repoquery=True install_weak_deps=True security=False skip_broken=False update_cache=False update_only=False validate_certs=True lock_timeout=30 conf_file=None disable_excludes=None download_dir=None list=None releasever=None Sep 30 23:10:13 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:10:13 np0005463759.novalocal systemd[1]: Starting man-db-cache-update.service... Sep 30 23:10:14 np0005463759.novalocal sudo[64207]: pam_unix(sudo:session): session closed for user root Sep 30 23:10:14 np0005463759.novalocal sudo[64568]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ekeepehshypzatdnawftmtcxqsnyvcuk ; /usr/bin/python3' Sep 30 23:10:14 np0005463759.novalocal sudo[64568]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:10:14 np0005463759.novalocal python3[64570]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Sep 30 23:10:14 np0005463759.novalocal python3[64570]: ansible-sysctl Invoked with name=net.ipv6.conf.all.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Sep 30 23:10:14 np0005463759.novalocal sudo[64568]: pam_unix(sudo:session): session closed for user root Sep 30 23:10:14 np0005463759.novalocal sudo[64580]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vtzmwvfgbaievpuvelewoljazjmyltri ; /usr/bin/python3' Sep 30 23:10:14 np0005463759.novalocal sudo[64580]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:10:14 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Sep 30 23:10:14 np0005463759.novalocal systemd[1]: Finished man-db-cache-update.service. Sep 30 23:10:14 np0005463759.novalocal systemd[1]: run-r5b7244186fc845b488915deafd07e3c3.service: Deactivated successfully. Sep 30 23:10:14 np0005463759.novalocal python3[64582]: ansible-sysctl [WARNING] The value 0 (type int) in a string field was converted to '0' (type string). If this does not look like what you expect, quote the entire value to ensure it does not change. Sep 30 23:10:14 np0005463759.novalocal python3[64582]: ansible-sysctl Invoked with name=net.ipv6.conf.default.disable_ipv6 value=0 state=present reload=True sysctl_set=False ignoreerrors=False sysctl_file=/etc/sysctl.conf Sep 30 23:10:14 np0005463759.novalocal sudo[64580]: pam_unix(sudo:session): session closed for user root Sep 30 23:10:15 np0005463759.novalocal sudo[64592]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-fpwtjpfkszqwdclelgpjymwizhmlbrpc ; /usr/bin/python3' Sep 30 23:10:15 np0005463759.novalocal sudo[64592]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:10:15 np0005463759.novalocal python3[64594]: ansible-git Invoked with repo=https://review.opendev.org/openstack/puppet-openstack-integration dest=/tmp/puppet-openstack version=stable/2024.2 force=True remote=origin clone=True update=True verify_commit=False gpg_whitelist=[] accept_hostkey=False bare=False recursive=True track_submodules=False refspec=None reference=None depth=None key_file=None ssh_opts=None executable=None umask=None archive=None separate_git_dir=None Sep 30 23:10:16 np0005463759.novalocal sudo[64592]: pam_unix(sudo:session): session closed for user root Sep 30 23:10:16 np0005463759.novalocal sudo[64626]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-uwcqzttegpurijvwkbgbjixomkmwnrzh ; /usr/bin/python3' Sep 30 23:10:16 np0005463759.novalocal sudo[64626]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:10:16 np0005463759.novalocal python3[64628]: ansible-file Invoked with path=/tmp/puppet-openstack/.bundled_gems state=directory recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Sep 30 23:10:16 np0005463759.novalocal sudo[64626]: pam_unix(sudo:session): session closed for user root Sep 30 23:10:16 np0005463759.novalocal sudo[64650]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-udpufykgtwdzridasbadkfpwzgxcoqvw ; /usr/bin/python3' Sep 30 23:10:16 np0005463759.novalocal sudo[64650]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:10:17 np0005463759.novalocal python3[64652]: ansible-file Invoked with path=/usr/zuul-env/bin/zuul-cloner state=absent recurse=False force=False follow=True modification_time_format=%Y%m%d%H%M.%S access_time_format=%Y%m%d%H%M.%S unsafe_writes=False _original_basename=None _diff_peek=None src=None modification_time=None access_time=None mode=None owner=None group=None seuser=None serole=None selevel=None setype=None attributes=None content=NOT_LOGGING_PARAMETER backup=None remote_src=None regexp=None delimiter=None directory_mode=None Sep 30 23:10:17 np0005463759.novalocal sudo[64650]: pam_unix(sudo:session): session closed for user root Sep 30 23:10:17 np0005463759.novalocal sudo[64659]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zxpvyzmsnlybbdenaecrvmdfdkpvcepp ; MANAGE_REPOS=false SCENARIO=scenario005 GEM_HOME=/tmp/puppet-openstack/.bundled_gems TEMPEST_VERSION=\'\' WORKSPACE=/var/log/weirdo-project TEMPEST_FROM_SOURCE=false PUPPETFILE_DIR=/etc/puppet/modules PUPPET_PKG=puppet PUPPET_ARGS=--modulepath=/usr/share/openstack-puppet/modules:/etc/puppet/modules SWAP_SIZE_GB=8 /usr/bin/python3' Sep 30 23:10:17 np0005463759.novalocal sudo[64659]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:10:17 np0005463759.novalocal python3[64661]: ansible-command Invoked with chdir=/tmp/puppet-openstack _raw_params=./run_tests.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None creates=None removes=None stdin=None Sep 30 23:10:26 np0005463759.novalocal sshd-session[64694]: Received disconnect from 192.227.153.63 port 38660:11: Bye Bye [preauth] Sep 30 23:10:26 np0005463759.novalocal sshd-session[64694]: Disconnected from authenticating user root 192.227.153.63 port 38660 [preauth] Sep 30 23:11:10 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:11:10 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:11:10 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:11:32 np0005463759.novalocal sshd-session[64703]: Received disconnect from 192.227.153.63 port 38080:11: Bye Bye [preauth] Sep 30 23:11:32 np0005463759.novalocal sshd-session[64703]: Disconnected from authenticating user root 192.227.153.63 port 38080 [preauth] Sep 30 23:12:10 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:12:10 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:12:10 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:12:15 np0005463759.novalocal kernel: Adding 8388604k swap on /swapfile. Priority:-2 extents:8 across:11661496k Sep 30 23:12:20 np0005463759.novalocal groupadd[64735]: group added to /etc/group: name=puppet, GID=52 Sep 30 23:12:20 np0005463759.novalocal groupadd[64735]: group added to /etc/gshadow: name=puppet Sep 30 23:12:20 np0005463759.novalocal groupadd[64735]: new group: name=puppet, GID=52 Sep 30 23:12:20 np0005463759.novalocal useradd[64742]: new user: name=puppet, UID=52, GID=52, home=/var/lib/puppet, shell=/sbin/nologin, from=none Sep 30 23:12:22 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:12:22 np0005463759.novalocal systemd[1]: Starting man-db-cache-update.service... Sep 30 23:12:22 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:12:22 np0005463759.novalocal systemd-rc-local-generator[64777]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:12:22 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:12:23 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Sep 30 23:12:23 np0005463759.novalocal systemd[1]: Finished man-db-cache-update.service. Sep 30 23:12:23 np0005463759.novalocal systemd[1]: run-rf3ebc5e0825f46fd8a487fc2393ef9e0.service: Deactivated successfully. Sep 30 23:12:28 np0005463759.novalocal sshd-session[64998]: Invalid user foundry from 192.227.153.63 port 36726 Sep 30 23:12:28 np0005463759.novalocal sshd-session[64998]: Received disconnect from 192.227.153.63 port 36726:11: Bye Bye [preauth] Sep 30 23:12:28 np0005463759.novalocal sshd-session[64998]: Disconnected from invalid user foundry 192.227.153.63 port 36726 [preauth] Sep 30 23:12:47 np0005463759.novalocal kernel: SELinux: Converting 484 SID table entries... Sep 30 23:12:47 np0005463759.novalocal kernel: SELinux: policy capability network_peer_controls=1 Sep 30 23:12:47 np0005463759.novalocal kernel: SELinux: policy capability open_perms=1 Sep 30 23:12:47 np0005463759.novalocal kernel: SELinux: policy capability extended_socket_class=1 Sep 30 23:12:47 np0005463759.novalocal kernel: SELinux: policy capability always_check_network=0 Sep 30 23:12:47 np0005463759.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Sep 30 23:12:47 np0005463759.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 30 23:12:47 np0005463759.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Sep 30 23:12:48 np0005463759.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=3 res=1 Sep 30 23:12:48 np0005463759.novalocal systemd[1]: Starting PCP Reboot Initialization Helper Service... Sep 30 23:12:49 np0005463759.novalocal systemd[1]: Finished PCP Reboot Initialization Helper Service. Sep 30 23:12:49 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:12:49 np0005463759.novalocal systemd-rc-local-generator[65591]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:12:56 np0005463759.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Sep 30 23:12:56 np0005463759.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Sep 30 23:12:59 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:12:59 np0005463759.novalocal systemd[1]: Starting man-db-cache-update.service... Sep 30 23:12:59 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:12:59 np0005463759.novalocal systemd-rc-local-generator[65849]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:12:59 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:13:01 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:13:01 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:13:01 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:13:05 np0005463759.novalocal dbus-broker-launch[774]: avc: op=setenforce lsm=selinux enforcing=0 res=1 Sep 30 23:13:05 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Sep 30 23:13:05 np0005463759.novalocal systemd[1]: Finished man-db-cache-update.service. Sep 30 23:13:05 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Consumed 6.848s CPU time. Sep 30 23:13:05 np0005463759.novalocal systemd[1]: run-r31cf17bdccf546f5a804a1f2d811b75e.service: Deactivated successfully. Sep 30 23:13:06 np0005463759.novalocal sshd-session[70129]: Invalid user admin from 80.94.95.115 port 36930 Sep 30 23:13:07 np0005463759.novalocal sshd-session[70129]: Connection closed by invalid user admin 80.94.95.115 port 36930 [preauth] Sep 30 23:13:37 np0005463759.novalocal sshd-session[71206]: Invalid user andrea from 192.227.153.63 port 36494 Sep 30 23:13:37 np0005463759.novalocal sshd-session[71206]: Received disconnect from 192.227.153.63 port 36494:11: Bye Bye [preauth] Sep 30 23:13:37 np0005463759.novalocal sshd-session[71206]: Disconnected from invalid user andrea 192.227.153.63 port 36494 [preauth] Sep 30 23:14:05 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:14:05 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:14:05 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:14:10 np0005463759.novalocal setsebool[71961]: The virt_use_nfs policy boolean was changed to 1 by root Sep 30 23:14:10 np0005463759.novalocal setsebool[71961]: The virt_sandbox_use_all_caps policy boolean was changed to 1 by root Sep 30 23:14:20 np0005463759.novalocal kernel: SELinux: Converting 520 SID table entries... Sep 30 23:14:20 np0005463759.novalocal kernel: SELinux: policy capability network_peer_controls=1 Sep 30 23:14:20 np0005463759.novalocal kernel: SELinux: policy capability open_perms=1 Sep 30 23:14:20 np0005463759.novalocal kernel: SELinux: policy capability extended_socket_class=1 Sep 30 23:14:20 np0005463759.novalocal kernel: SELinux: policy capability always_check_network=0 Sep 30 23:14:20 np0005463759.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Sep 30 23:14:20 np0005463759.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 30 23:14:20 np0005463759.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Sep 30 23:14:36 np0005463759.novalocal sshd-session[72024]: Invalid user kibana from 192.227.153.63 port 35252 Sep 30 23:14:36 np0005463759.novalocal sshd-session[72024]: Received disconnect from 192.227.153.63 port 35252:11: Bye Bye [preauth] Sep 30 23:14:36 np0005463759.novalocal sshd-session[72024]: Disconnected from invalid user kibana 192.227.153.63 port 35252 [preauth] Sep 30 23:15:10 np0005463759.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=5 res=1 Sep 30 23:15:10 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:15:10 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:15:10 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:15:24 np0005463759.novalocal kernel: SELinux: Converting 2736 SID table entries... Sep 30 23:15:24 np0005463759.novalocal kernel: SELinux: policy capability network_peer_controls=1 Sep 30 23:15:24 np0005463759.novalocal kernel: SELinux: policy capability open_perms=1 Sep 30 23:15:24 np0005463759.novalocal kernel: SELinux: policy capability extended_socket_class=1 Sep 30 23:15:24 np0005463759.novalocal kernel: SELinux: policy capability always_check_network=0 Sep 30 23:15:24 np0005463759.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Sep 30 23:15:24 np0005463759.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 30 23:15:24 np0005463759.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Sep 30 23:15:37 np0005463759.novalocal sshd-session[72911]: Invalid user admin from 192.227.153.63 port 34346 Sep 30 23:15:37 np0005463759.novalocal sshd-session[72911]: Received disconnect from 192.227.153.63 port 34346:11: Bye Bye [preauth] Sep 30 23:15:37 np0005463759.novalocal sshd-session[72911]: Disconnected from invalid user admin 192.227.153.63 port 34346 [preauth] Sep 30 23:16:02 np0005463759.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=7 res=1 Sep 30 23:16:02 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:16:02 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:16:02 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:16:02 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:16:02 np0005463759.novalocal systemd[1]: Starting man-db-cache-update.service... Sep 30 23:16:02 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Sep 30 23:16:02 np0005463759.novalocal systemd[1]: Finished man-db-cache-update.service. Sep 30 23:16:02 np0005463759.novalocal systemd[1]: run-r0ab04dfa36b24efca9c28fc298330688.service: Deactivated successfully. Sep 30 23:16:14 np0005463759.novalocal kernel: SELinux: Converting 2736 SID table entries... Sep 30 23:16:14 np0005463759.novalocal kernel: SELinux: policy capability network_peer_controls=1 Sep 30 23:16:14 np0005463759.novalocal kernel: SELinux: policy capability open_perms=1 Sep 30 23:16:14 np0005463759.novalocal kernel: SELinux: policy capability extended_socket_class=1 Sep 30 23:16:14 np0005463759.novalocal kernel: SELinux: policy capability always_check_network=0 Sep 30 23:16:14 np0005463759.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Sep 30 23:16:14 np0005463759.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 30 23:16:14 np0005463759.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Sep 30 23:16:14 np0005463759.novalocal groupadd[73018]: group added to /etc/group: name=memcached, GID=989 Sep 30 23:16:14 np0005463759.novalocal groupadd[73018]: group added to /etc/gshadow: name=memcached Sep 30 23:16:14 np0005463759.novalocal groupadd[73018]: new group: name=memcached, GID=989 Sep 30 23:16:14 np0005463759.novalocal useradd[73025]: new user: name=memcached, UID=989, GID=989, home=/, shell=/sbin/nologin, from=none Sep 30 23:16:16 np0005463759.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=8 res=1 Sep 30 23:16:16 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:16:16 np0005463759.novalocal systemd[1]: Starting man-db-cache-update.service... Sep 30 23:16:16 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:16:16 np0005463759.novalocal systemd-rc-local-generator[73459]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:16:16 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:16:16 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Sep 30 23:16:16 np0005463759.novalocal systemd[1]: Finished man-db-cache-update.service. Sep 30 23:16:16 np0005463759.novalocal systemd[1]: run-rcf4c366c144a436aa381cc67f329e3a3.service: Deactivated successfully. Sep 30 23:16:17 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:16:17 np0005463759.novalocal systemd-rc-local-generator[73629]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:16:17 np0005463759.novalocal systemd[1]: Started memcached daemon. Sep 30 23:16:17 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:16:17 np0005463759.novalocal systemd-rc-local-generator[73676]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:16:17 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:16:17 np0005463759.novalocal systemd-rc-local-generator[73705]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:16:21 np0005463759.novalocal groupadd[73723]: group added to /etc/group: name=epmd, GID=988 Sep 30 23:16:21 np0005463759.novalocal groupadd[73723]: group added to /etc/gshadow: name=epmd Sep 30 23:16:21 np0005463759.novalocal groupadd[73723]: new group: name=epmd, GID=988 Sep 30 23:16:21 np0005463759.novalocal useradd[73730]: new user: name=epmd, UID=988, GID=988, home=/dev/null, shell=/sbin/nologin, from=none Sep 30 23:16:21 np0005463759.novalocal groupadd[73739]: group added to /etc/group: name=rabbitmq, GID=987 Sep 30 23:16:21 np0005463759.novalocal groupadd[73739]: group added to /etc/gshadow: name=rabbitmq Sep 30 23:16:21 np0005463759.novalocal groupadd[73739]: new group: name=rabbitmq, GID=987 Sep 30 23:16:21 np0005463759.novalocal useradd[73746]: new user: name=rabbitmq, UID=987, GID=987, home=/var/lib/rabbitmq, shell=/sbin/nologin, from=none Sep 30 23:16:22 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:16:23 np0005463759.novalocal systemd-rc-local-generator[73777]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:16:23 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:16:23 np0005463759.novalocal systemd[1]: Starting man-db-cache-update.service... Sep 30 23:16:23 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:16:23 np0005463759.novalocal systemd-rc-local-generator[73812]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:16:24 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:16:24 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Sep 30 23:16:24 np0005463759.novalocal systemd[1]: Finished man-db-cache-update.service. Sep 30 23:16:24 np0005463759.novalocal systemd[1]: run-r0b5effee2c864eac9fed646dc5c83741.service: Deactivated successfully. Sep 30 23:16:27 np0005463759.novalocal runuser[74572]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:16:28 np0005463759.novalocal runuser[74572]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:16:37 np0005463759.novalocal sshd-session[75076]: Invalid user leonard from 192.227.153.63 port 33372 Sep 30 23:16:37 np0005463759.novalocal sshd-session[75076]: Received disconnect from 192.227.153.63 port 33372:11: Bye Bye [preauth] Sep 30 23:16:37 np0005463759.novalocal sshd-session[75076]: Disconnected from invalid user leonard 192.227.153.63 port 33372 [preauth] Sep 30 23:16:43 np0005463759.novalocal kernel: SELinux: Converting 2742 SID table entries... Sep 30 23:16:43 np0005463759.novalocal kernel: SELinux: policy capability network_peer_controls=1 Sep 30 23:16:43 np0005463759.novalocal kernel: SELinux: policy capability open_perms=1 Sep 30 23:16:43 np0005463759.novalocal kernel: SELinux: policy capability extended_socket_class=1 Sep 30 23:16:43 np0005463759.novalocal kernel: SELinux: policy capability always_check_network=0 Sep 30 23:16:43 np0005463759.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Sep 30 23:16:43 np0005463759.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 30 23:16:43 np0005463759.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Sep 30 23:16:43 np0005463759.novalocal groupadd[75085]: group added to /etc/group: name=mysql, GID=27 Sep 30 23:16:43 np0005463759.novalocal groupadd[75085]: group added to /etc/gshadow: name=mysql Sep 30 23:16:43 np0005463759.novalocal groupadd[75085]: new group: name=mysql, GID=27 Sep 30 23:16:43 np0005463759.novalocal useradd[75091]: new user: name=mysql, UID=27, GID=27, home=/var/lib/mysql, shell=/sbin/nologin, from=none Sep 30 23:16:45 np0005463759.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=9 res=1 Sep 30 23:16:45 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:16:45 np0005463759.novalocal systemd[1]: Starting man-db-cache-update.service... Sep 30 23:16:46 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:16:46 np0005463759.novalocal systemd-rc-local-generator[75570]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:16:46 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:16:49 np0005463759.novalocal groupadd[77666]: group added to /etc/group: name=redis, GID=986 Sep 30 23:16:49 np0005463759.novalocal groupadd[77666]: group added to /etc/gshadow: name=redis Sep 30 23:16:49 np0005463759.novalocal groupadd[77666]: new group: name=redis, GID=986 Sep 30 23:16:49 np0005463759.novalocal useradd[77713]: new user: name=redis, UID=986, GID=986, home=/var/lib/redis, shell=/sbin/nologin, from=none Sep 30 23:16:50 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:16:50 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:16:50 np0005463759.novalocal systemd-rc-local-generator[78115]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:16:50 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:16:52 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Sep 30 23:16:52 np0005463759.novalocal systemd[1]: Finished man-db-cache-update.service. Sep 30 23:16:52 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Consumed 7.248s CPU time. Sep 30 23:16:52 np0005463759.novalocal systemd[1]: run-rc2929bb3f2ca44539eea0f7abc2cb1da.service: Deactivated successfully. Sep 30 23:16:52 np0005463759.novalocal systemd[1]: run-r04cee9a6b7a344ea93dee1d91fa4e9b5.service: Deactivated successfully. Sep 30 23:17:02 np0005463759.novalocal kernel: SELinux: Converting 2745 SID table entries... Sep 30 23:17:02 np0005463759.novalocal kernel: SELinux: policy capability network_peer_controls=1 Sep 30 23:17:02 np0005463759.novalocal kernel: SELinux: policy capability open_perms=1 Sep 30 23:17:02 np0005463759.novalocal kernel: SELinux: policy capability extended_socket_class=1 Sep 30 23:17:02 np0005463759.novalocal kernel: SELinux: policy capability always_check_network=0 Sep 30 23:17:02 np0005463759.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Sep 30 23:17:02 np0005463759.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 30 23:17:02 np0005463759.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Sep 30 23:17:02 np0005463759.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=10 res=1 Sep 30 23:17:02 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:17:02 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:17:02 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:17:02 np0005463759.novalocal groupadd[78982]: group added to /etc/group: name=unbound, GID=985 Sep 30 23:17:02 np0005463759.novalocal groupadd[78982]: group added to /etc/gshadow: name=unbound Sep 30 23:17:02 np0005463759.novalocal groupadd[78982]: new group: name=unbound, GID=985 Sep 30 23:17:02 np0005463759.novalocal useradd[78989]: new user: name=unbound, UID=985, GID=985, home=/var/lib/unbound, shell=/sbin/nologin, from=none Sep 30 23:17:03 np0005463759.novalocal systemd[1]: Started daily update of the root trust anchor for DNSSEC. Sep 30 23:17:03 np0005463759.novalocal groupadd[79002]: group added to /etc/group: name=openvswitch, GID=984 Sep 30 23:17:03 np0005463759.novalocal groupadd[79002]: group added to /etc/gshadow: name=openvswitch Sep 30 23:17:03 np0005463759.novalocal groupadd[79002]: new group: name=openvswitch, GID=984 Sep 30 23:17:03 np0005463759.novalocal useradd[79009]: new user: name=openvswitch, UID=984, GID=984, home=/, shell=/sbin/nologin, from=none Sep 30 23:17:03 np0005463759.novalocal groupadd[79017]: group added to /etc/group: name=hugetlbfs, GID=983 Sep 30 23:17:03 np0005463759.novalocal groupadd[79017]: group added to /etc/gshadow: name=hugetlbfs Sep 30 23:17:03 np0005463759.novalocal groupadd[79017]: new group: name=hugetlbfs, GID=983 Sep 30 23:17:03 np0005463759.novalocal usermod[79025]: add 'openvswitch' to group 'hugetlbfs' Sep 30 23:17:03 np0005463759.novalocal usermod[79025]: add 'openvswitch' to shadow group 'hugetlbfs' Sep 30 23:17:05 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:17:05 np0005463759.novalocal systemd[1]: Starting man-db-cache-update.service... Sep 30 23:17:05 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:17:05 np0005463759.novalocal systemd-sysv-generator[79506]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:17:05 np0005463759.novalocal systemd-rc-local-generator[79502]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:17:05 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:17:06 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Sep 30 23:17:06 np0005463759.novalocal systemd[1]: Finished man-db-cache-update.service. Sep 30 23:17:06 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Consumed 1.217s CPU time. Sep 30 23:17:06 np0005463759.novalocal systemd[1]: run-r587ed562f2fb47039b5597d9c9c5cfde.service: Deactivated successfully. Sep 30 23:17:06 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:17:06 np0005463759.novalocal systemd-sysv-generator[80047]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:17:06 np0005463759.novalocal systemd-rc-local-generator[80042]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:17:06 np0005463759.novalocal systemd[1]: Starting Open vSwitch Database Unit... Sep 30 23:17:06 np0005463759.novalocal chown[80055]: /usr/bin/chown: cannot access '/run/openvswitch': No such file or directory Sep 30 23:17:07 np0005463759.novalocal ovs-ctl[80060]: /etc/openvswitch/conf.db does not exist ... (warning). Sep 30 23:17:07 np0005463759.novalocal ovs-ctl[80060]: Creating empty database /etc/openvswitch/conf.db [ OK ] Sep 30 23:17:07 np0005463759.novalocal ovs-ctl[80060]: Starting ovsdb-server [ OK ] Sep 30 23:17:07 np0005463759.novalocal ovs-vsctl[80109]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait -- init -- set Open_vSwitch . db-version=8.5.1 Sep 30 23:17:07 np0005463759.novalocal ovs-vsctl[80129]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait set Open_vSwitch . ovs-version=3.3.5-115.el9s "external-ids:system-id=\"8e79117e-411d-4bea-a24b-bbbbc59dc9ac\"" "external-ids:rundir=\"/var/run/openvswitch\"" "system-type=\"centos\"" "system-version=\"9\"" Sep 30 23:17:07 np0005463759.novalocal ovs-ctl[80060]: Configuring Open vSwitch system IDs [ OK ] Sep 30 23:17:07 np0005463759.novalocal ovs-vsctl[80134]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005463759 Sep 30 23:17:07 np0005463759.novalocal ovs-ctl[80060]: Enabling remote OVSDB managers [ OK ] Sep 30 23:17:07 np0005463759.novalocal systemd[1]: Started Open vSwitch Database Unit. Sep 30 23:17:07 np0005463759.novalocal systemd[1]: Starting Open vSwitch Delete Transient Ports... Sep 30 23:17:07 np0005463759.novalocal systemd[1]: Finished Open vSwitch Delete Transient Ports. Sep 30 23:17:07 np0005463759.novalocal systemd[1]: Starting Open vSwitch Forwarding Unit... Sep 30 23:17:07 np0005463759.novalocal kernel: openvswitch: Open vSwitch switching datapath Sep 30 23:17:07 np0005463759.novalocal ovs-ctl[80179]: Inserting openvswitch module [ OK ] Sep 30 23:17:07 np0005463759.novalocal ovs-ctl[80148]: Starting ovs-vswitchd [ OK ] Sep 30 23:17:07 np0005463759.novalocal ovs-vsctl[80195]: ovs|00001|vsctl|INFO|Called as ovs-vsctl --no-wait add Open_vSwitch . external-ids hostname=np0005463759 Sep 30 23:17:07 np0005463759.novalocal ovs-ctl[80148]: Enabling remote OVSDB managers [ OK ] Sep 30 23:17:07 np0005463759.novalocal systemd[1]: Started Open vSwitch Forwarding Unit. Sep 30 23:17:07 np0005463759.novalocal systemd[1]: Starting Open vSwitch... Sep 30 23:17:07 np0005463759.novalocal systemd[1]: Finished Open vSwitch. Sep 30 23:17:07 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:17:07 np0005463759.novalocal systemd-rc-local-generator[80218]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:17:07 np0005463759.novalocal systemd-sysv-generator[80223]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:17:08 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:17:08 np0005463759.novalocal systemd-sysv-generator[80255]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:17:08 np0005463759.novalocal systemd-rc-local-generator[80252]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:17:10 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:17:10 np0005463759.novalocal systemd[1]: Starting man-db-cache-update.service... Sep 30 23:17:10 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:17:10 np0005463759.novalocal systemd-rc-local-generator[80305]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:17:10 np0005463759.novalocal systemd-sysv-generator[80310]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:17:10 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:17:11 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Sep 30 23:17:11 np0005463759.novalocal systemd[1]: Finished man-db-cache-update.service. Sep 30 23:17:11 np0005463759.novalocal systemd[1]: run-rec2d74b404c648609e4584afecd581a0.service: Deactivated successfully. Sep 30 23:17:13 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:17:13 np0005463759.novalocal systemd[1]: Starting man-db-cache-update.service... Sep 30 23:17:13 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:17:13 np0005463759.novalocal systemd-rc-local-generator[80738]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:17:13 np0005463759.novalocal systemd-sysv-generator[80742]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:17:14 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:17:14 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Sep 30 23:17:14 np0005463759.novalocal systemd[1]: Finished man-db-cache-update.service. Sep 30 23:17:14 np0005463759.novalocal systemd[1]: run-r828b51a967b24cb88642fd0beefaf634.service: Deactivated successfully. Sep 30 23:17:15 np0005463759.novalocal ovs-vsctl[80816]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote=ssl:[::1]:6642 Sep 30 23:17:15 np0005463759.novalocal ovs-vsctl[80818]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-type=geneve Sep 30 23:17:15 np0005463759.novalocal ovs-vsctl[80820]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-encap-ip=::1 Sep 30 23:17:15 np0005463759.novalocal ovs-vsctl[80823]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:hostname=np0005463759.novalocal Sep 30 23:17:15 np0005463759.novalocal ovs-vsctl[80825]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge=br-int Sep 30 23:17:15 np0005463759.novalocal ovs-vsctl[80827]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-remote-probe-interval=60000 Sep 30 23:17:15 np0005463759.novalocal ovs-vsctl[80829]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-openflow-probe-interval=60 Sep 30 23:17:15 np0005463759.novalocal ovs-vsctl[80831]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-monitor-all=false Sep 30 23:17:15 np0005463759.novalocal ovs-vsctl[80833]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-ofctrl-wait-before-clear=8000 Sep 30 23:17:16 np0005463759.novalocal ovs-vsctl[80835]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-cms-options=enable-chassis-as-gw Sep 30 23:17:16 np0005463759.novalocal ovs-vsctl[80839]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-bridge-mappings=external:br-ex Sep 30 23:17:16 np0005463759.novalocal ovs-vsctl[80843]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl set Open_vSwitch . external_ids:ovn-match-northd-version=false Sep 30 23:17:25 np0005463759.novalocal groupadd[80863]: group added to /etc/group: name=keystone, GID=163 Sep 30 23:17:25 np0005463759.novalocal groupadd[80863]: group added to /etc/gshadow: name=keystone Sep 30 23:17:25 np0005463759.novalocal groupadd[80863]: new group: name=keystone, GID=163 Sep 30 23:17:25 np0005463759.novalocal useradd[80870]: new user: name=keystone, UID=163, GID=163, home=/var/lib/keystone, shell=/sbin/nologin, from=none Sep 30 23:17:26 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:17:26 np0005463759.novalocal systemd[1]: Starting man-db-cache-update.service... Sep 30 23:17:27 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Sep 30 23:17:27 np0005463759.novalocal systemd[1]: Finished man-db-cache-update.service. Sep 30 23:17:27 np0005463759.novalocal systemd[1]: run-r14257874db064054bc4941eb9f51faf8.service: Deactivated successfully. Sep 30 23:17:32 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:17:32 np0005463759.novalocal systemd[1]: Starting man-db-cache-update.service... Sep 30 23:17:33 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Sep 30 23:17:33 np0005463759.novalocal systemd[1]: Finished man-db-cache-update.service. Sep 30 23:17:33 np0005463759.novalocal systemd[1]: run-r8468f645af764ab985e3aecc06786340.service: Deactivated successfully. Sep 30 23:17:36 np0005463759.novalocal sshd-session[81806]: Received disconnect from 192.227.153.63 port 60608:11: Bye Bye [preauth] Sep 30 23:17:36 np0005463759.novalocal sshd-session[81806]: Disconnected from authenticating user root 192.227.153.63 port 60608 [preauth] Sep 30 23:17:40 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:17:40 np0005463759.novalocal systemd-rc-local-generator[81834]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:17:40 np0005463759.novalocal systemd-sysv-generator[81838]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:17:40 np0005463759.novalocal systemd[1]: Listening on Device-mapper event daemon FIFOs. Sep 30 23:17:41 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:17:41 np0005463759.novalocal systemd-sysv-generator[81869]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:17:41 np0005463759.novalocal systemd-rc-local-generator[81865]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:17:41 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:17:41 np0005463759.novalocal systemd-rc-local-generator[81895]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:17:41 np0005463759.novalocal systemd-sysv-generator[81898]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:17:41 np0005463759.novalocal systemd-logind[804]: Watching system buttons on /dev/input/event0 (Power Button) Sep 30 23:17:41 np0005463759.novalocal systemd-logind[804]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Sep 30 23:17:43 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:17:43 np0005463759.novalocal systemd-sysv-generator[81995]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:17:43 np0005463759.novalocal systemd-rc-local-generator[81992]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:17:44 np0005463759.novalocal systemd[1]: Starting dnf makecache... Sep 30 23:17:44 np0005463759.novalocal systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling... Sep 30 23:17:44 np0005463759.novalocal systemd[1]: Finished Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling. Sep 30 23:17:44 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:17:44 np0005463759.novalocal systemd-rc-local-generator[82027]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:17:44 np0005463759.novalocal systemd-sysv-generator[82030]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: Updating Subscription Management repositories. Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: Unable to read consumer identity Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: This system is not registered with an entitlement server. You can use subscription-manager to register. Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: Failed determining last makecache time. Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: delorean-ansible-role-thales-hsm-0661a3a0a0e79e 212 kB/s | 3.0 kB 00:00 Sep 30 23:17:44 np0005463759.novalocal systemd[1]: Listening on LVM2 poll daemon socket. Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: delorean-openstack-ironic-32899540767d561da8880 241 kB/s | 3.0 kB 00:00 Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: delorean-openstack-cinder-e96dcc4e9744833ccea26 259 kB/s | 3.0 kB 00:00 Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: delorean-python-openstackclient-f42ade4305d9745 249 kB/s | 3.0 kB 00:00 Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: delorean-openstack-ceilometer-c99c0c9f6d491b0bf 233 kB/s | 3.0 kB 00:00 Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: delorean-openstack-selinux-f19cf2529160f9bf6e83 313 kB/s | 3.0 kB 00:00 Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: delorean-openstack-nova-40cfbd646bf6d1e1a6789d9 209 kB/s | 3.0 kB 00:00 Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: delorean-openstack-designate-5bfc35864c28a97ded 215 kB/s | 3.0 kB 00:00 Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: delorean-openstack-glance-097f38158189efc5c7d52 263 kB/s | 3.0 kB 00:00 Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: delorean-python-keystoneauth1-a6cf0cfa6ddf023fe 207 kB/s | 3.0 kB 00:00 Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: delorean-openstack-manila-8bb65b9fc8edccb696aa4 250 kB/s | 3.0 kB 00:00 Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: delorean-openstack-neutron-2ce5e3b27734931cc60c 272 kB/s | 3.0 kB 00:00 Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: delorean-openstack-octavia-ccafae01828bef0d6f66 267 kB/s | 3.0 kB 00:00 Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: delorean-openstack-watcher-456f42e1b9d9abf0f620 152 kB/s | 3.0 kB 00:00 Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: delorean-edpm-image-builder-55ba53cf215b14ed95b 225 kB/s | 3.0 kB 00:00 Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: delorean-puppet-ceph-b0c245ccde541a63fde0564366 148 kB/s | 3.0 kB 00:00 Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: delorean-openstack-swift-9439a6257b1acce192d9a6 100 kB/s | 3.0 kB 00:00 Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: delorean-python-tempestconf-8515371b7cceebd4282 155 kB/s | 3.0 kB 00:00 Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: delorean-python-django-horizon-f83e6f86cbdd0bd1 168 kB/s | 3.0 kB 00:00 Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: CentOS Stream 9 - BaseOS 1.3 MB/s | 3.9 kB 00:00 Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: CentOS Stream 9 - AppStream 1.1 MB/s | 4.4 kB 00:00 Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: CentOS Stream 9 - CRB 1.3 MB/s | 4.3 kB 00:00 Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: CentOS Stream 9 - Extras packages 911 kB/s | 3.0 kB 00:00 Sep 30 23:17:44 np0005463759.novalocal dnf[82002]: dlrn-dalmatian-testing 207 kB/s | 3.0 kB 00:00 Sep 30 23:17:45 np0005463759.novalocal dnf[82002]: dlrn-dalmatian-build-deps 218 kB/s | 3.0 kB 00:00 Sep 30 23:17:45 np0005463759.novalocal dnf[82002]: centos9-rabbitmq 950 kB/s | 3.0 kB 00:00 Sep 30 23:17:45 np0005463759.novalocal dnf[82002]: centos9-storage 1.0 MB/s | 3.0 kB 00:00 Sep 30 23:17:45 np0005463759.novalocal dnf[82002]: centos9-opstools 891 kB/s | 3.0 kB 00:00 Sep 30 23:17:45 np0005463759.novalocal dnf[82002]: NFV SIG OpenvSwitch 236 kB/s | 3.0 kB 00:00 Sep 30 23:17:45 np0005463759.novalocal dnf[82002]: Extra Packages for Enterprise Linux 9 - x86_64 233 kB/s | 27 kB 00:00 Sep 30 23:17:46 np0005463759.novalocal dnf[82002]: Extra Packages for Enterprise Linux 9 - x86_64 16 MB/s | 20 MB 00:01 Sep 30 23:17:46 np0005463759.novalocal groupadd[82076]: group added to /etc/group: name=cinder, GID=165 Sep 30 23:17:46 np0005463759.novalocal groupadd[82076]: group added to /etc/gshadow: name=cinder Sep 30 23:17:46 np0005463759.novalocal groupadd[82076]: new group: name=cinder, GID=165 Sep 30 23:17:46 np0005463759.novalocal useradd[82083]: new user: name=cinder, UID=165, GID=165, home=/var/lib/cinder, shell=/sbin/nologin, from=none Sep 30 23:17:46 np0005463759.novalocal useradd[82083]: add 'cinder' to group 'nobody' Sep 30 23:17:46 np0005463759.novalocal useradd[82083]: add 'cinder' to group 'cinder' Sep 30 23:17:46 np0005463759.novalocal useradd[82083]: add 'cinder' to shadow group 'nobody' Sep 30 23:17:46 np0005463759.novalocal useradd[82083]: add 'cinder' to shadow group 'cinder' Sep 30 23:17:47 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:17:47 np0005463759.novalocal systemd[1]: Starting man-db-cache-update.service... Sep 30 23:17:47 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:17:47 np0005463759.novalocal systemd-rc-local-generator[82131]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:17:47 np0005463759.novalocal systemd-sysv-generator[82134]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:17:47 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:17:49 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:17:49 np0005463759.novalocal systemd-rc-local-generator[83753]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:17:49 np0005463759.novalocal systemd-sysv-generator[83756]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:17:50 np0005463759.novalocal systemd[1]: One time configuration for iscsi.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/iscsi/initiatorname.iscsi). Sep 30 23:17:50 np0005463759.novalocal systemd[1]: Starting Open-iSCSI... Sep 30 23:17:50 np0005463759.novalocal kernel: Loading iSCSI transport class v2.0-870. Sep 30 23:17:50 np0005463759.novalocal systemd[1]: Started Open-iSCSI. Sep 30 23:17:50 np0005463759.novalocal systemd[1]: Starting Logout off all iSCSI sessions on shutdown... Sep 30 23:17:50 np0005463759.novalocal systemd[1]: Finished Logout off all iSCSI sessions on shutdown. Sep 30 23:17:50 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:17:50 np0005463759.novalocal systemd-rc-local-generator[84021]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:17:50 np0005463759.novalocal systemd-sysv-generator[84026]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:17:50 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:17:50 np0005463759.novalocal systemd-sysv-generator[84238]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:17:50 np0005463759.novalocal systemd-rc-local-generator[84232]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:17:50 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Sep 30 23:17:50 np0005463759.novalocal systemd[1]: Finished man-db-cache-update.service. Sep 30 23:17:50 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Consumed 3.597s CPU time. Sep 30 23:17:50 np0005463759.novalocal systemd[1]: run-r7ead58c1692b451a8572c57206c96865.service: Deactivated successfully. Sep 30 23:17:54 np0005463759.novalocal dnf[82002]: Metadata cache created. Sep 30 23:17:54 np0005463759.novalocal systemd[1]: dnf-makecache.service: Deactivated successfully. Sep 30 23:17:54 np0005463759.novalocal systemd[1]: Finished dnf makecache. Sep 30 23:17:54 np0005463759.novalocal systemd[1]: dnf-makecache.service: Consumed 9.205s CPU time. Sep 30 23:17:56 np0005463759.novalocal groupadd[84415]: group added to /etc/group: name=glance, GID=161 Sep 30 23:17:56 np0005463759.novalocal groupadd[84415]: group added to /etc/gshadow: name=glance Sep 30 23:17:56 np0005463759.novalocal groupadd[84415]: new group: name=glance, GID=161 Sep 30 23:17:56 np0005463759.novalocal useradd[84422]: new user: name=glance, UID=161, GID=161, home=/var/lib/glance, shell=/sbin/nologin, from=none Sep 30 23:17:57 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:17:57 np0005463759.novalocal systemd-sysv-generator[84459]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:17:57 np0005463759.novalocal systemd-rc-local-generator[84454]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:17:57 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:18:00 np0005463759.novalocal kernel: SELinux: Converting 2767 SID table entries... Sep 30 23:18:00 np0005463759.novalocal kernel: SELinux: policy capability network_peer_controls=1 Sep 30 23:18:00 np0005463759.novalocal kernel: SELinux: policy capability open_perms=1 Sep 30 23:18:00 np0005463759.novalocal kernel: SELinux: policy capability extended_socket_class=1 Sep 30 23:18:00 np0005463759.novalocal kernel: SELinux: policy capability always_check_network=0 Sep 30 23:18:00 np0005463759.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Sep 30 23:18:00 np0005463759.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 30 23:18:00 np0005463759.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Sep 30 23:18:00 np0005463759.novalocal setsebool[84470]: The os_neutron_dac_override policy boolean was changed to on by root Sep 30 23:18:00 np0005463759.novalocal ovs-vsctl[84477]: ovs|00001|vsctl|INFO|Called as /bin/ovs-vsctl add-br br-ex Sep 30 23:18:00 np0005463759.novalocal NetworkManager[858]: [1759288680.5449] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Sep 30 23:18:00 np0005463759.novalocal kernel: ovs-system: entered promiscuous mode Sep 30 23:18:00 np0005463759.novalocal NetworkManager[858]: [1759288680.5466] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/3) Sep 30 23:18:00 np0005463759.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=12 res=1 Sep 30 23:18:00 np0005463759.novalocal kernel: Timeout policy base is empty Sep 30 23:18:00 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:18:00 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:18:00 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:18:00 np0005463759.novalocal kernel: br-ex: entered promiscuous mode Sep 30 23:18:00 np0005463759.novalocal NetworkManager[858]: [1759288680.5923] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Sep 30 23:18:00 np0005463759.novalocal NetworkManager[858]: [1759288680.5933] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/4) Sep 30 23:18:00 np0005463759.novalocal systemd-udevd[84495]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:18:00 np0005463759.novalocal systemd-udevd[84497]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:18:00 np0005463759.novalocal NetworkManager[858]: [1759288680.6258] device (br-ex): carrier: link connected Sep 30 23:18:00 np0005463759.novalocal NetworkManager[858]: [1759288680.6732] manager: (loop1): new Dummy device (/org/freedesktop/NetworkManager/Devices/5) Sep 30 23:18:00 np0005463759.novalocal NetworkManager[858]: [1759288680.9521] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=84515 uid=0 result="success" Sep 30 23:18:00 np0005463759.novalocal ifdown[84516]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Sep 30 23:18:00 np0005463759.novalocal ifdown[84517]: 'network-scripts' will be removed from distribution in near future. Sep 30 23:18:00 np0005463759.novalocal ifdown[84518]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Sep 30 23:18:01 np0005463759.novalocal NetworkManager[858]: [1759288681.0045] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=84524 uid=0 result="success" Sep 30 23:18:01 np0005463759.novalocal NetworkManager[858]: [1759288681.0578] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=84532 uid=0 result="success" Sep 30 23:18:01 np0005463759.novalocal NetworkManager[858]: [1759288681.0990] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=84541 uid=0 result="success" Sep 30 23:18:01 np0005463759.novalocal NetworkManager[858]: [1759288681.2079] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=84564 uid=0 result="success" Sep 30 23:18:01 np0005463759.novalocal ovs-vsctl[84569]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-br br-ex Sep 30 23:18:01 np0005463759.novalocal kernel: br-ex: left promiscuous mode Sep 30 23:18:01 np0005463759.novalocal kernel: ovs-system: left promiscuous mode Sep 30 23:18:01 np0005463759.novalocal NetworkManager[858]: [1759288681.3222] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=84587 uid=0 result="success" Sep 30 23:18:01 np0005463759.novalocal ifdown[84591]: You are using 'ifdown' script provided by 'network-scripts', which are now deprecated. Sep 30 23:18:01 np0005463759.novalocal ifdown[84592]: 'network-scripts' will be removed from distribution in near future. Sep 30 23:18:01 np0005463759.novalocal ifdown[84593]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Sep 30 23:18:01 np0005463759.novalocal NetworkManager[858]: [1759288681.3736] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=84599 uid=0 result="success" Sep 30 23:18:01 np0005463759.novalocal NetworkManager[858]: [1759288681.4281] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=84610 uid=0 result="success" Sep 30 23:18:01 np0005463759.novalocal NetworkManager[858]: [1759288681.4756] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=84622 uid=0 result="success" Sep 30 23:18:01 np0005463759.novalocal NetworkManager[858]: [1759288681.5882] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=84648 uid=0 result="success" Sep 30 23:18:01 np0005463759.novalocal ovs-vsctl[84656]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 Sep 30 23:18:01 np0005463759.novalocal NetworkManager[858]: [1759288681.6873] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=84663 uid=0 result="success" Sep 30 23:18:01 np0005463759.novalocal ifup[84667]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Sep 30 23:18:01 np0005463759.novalocal ifup[84668]: 'network-scripts' will be removed from distribution in near future. Sep 30 23:18:01 np0005463759.novalocal ifup[84669]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Sep 30 23:18:01 np0005463759.novalocal NetworkManager[858]: [1759288681.7447] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=84675 uid=0 result="success" Sep 30 23:18:01 np0005463759.novalocal NetworkManager[858]: [1759288681.8232] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=84687 uid=0 result="success" Sep 30 23:18:01 np0005463759.novalocal ifup[84688]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Sep 30 23:18:01 np0005463759.novalocal ifup[84689]: 'network-scripts' will be removed from distribution in near future. Sep 30 23:18:01 np0005463759.novalocal ifup[84690]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Sep 30 23:18:01 np0005463759.novalocal NetworkManager[858]: [1759288681.8609] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=84696 uid=0 result="success" Sep 30 23:18:01 np0005463759.novalocal ovs-vsctl[84698]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Sep 30 23:18:01 np0005463759.novalocal kernel: ovs-system: entered promiscuous mode Sep 30 23:18:01 np0005463759.novalocal NetworkManager[858]: [1759288681.9304] manager: (ovs-system): 'openvswitch' plugin not available; creating generic device Sep 30 23:18:01 np0005463759.novalocal NetworkManager[858]: [1759288681.9318] manager: (ovs-system): new Generic device (/org/freedesktop/NetworkManager/Devices/6) Sep 30 23:18:01 np0005463759.novalocal kernel: No such timeout policy "ovs_test_tp" Sep 30 23:18:01 np0005463759.novalocal NetworkManager[858]: [1759288681.9409] manager: (br-ex): 'openvswitch' plugin not available; creating generic device Sep 30 23:18:01 np0005463759.novalocal kernel: br-ex: entered promiscuous mode Sep 30 23:18:01 np0005463759.novalocal NetworkManager[858]: [1759288681.9425] manager: (br-ex): new Generic device (/org/freedesktop/NetworkManager/Devices/7) Sep 30 23:18:01 np0005463759.novalocal NetworkManager[858]: [1759288681.9748] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=84719 uid=0 result="success" Sep 30 23:18:02 np0005463759.novalocal NetworkManager[858]: [1759288682.0185] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=84730 uid=0 result="success" Sep 30 23:18:02 np0005463759.novalocal NetworkManager[858]: [1759288682.0909] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-loop1" pid=84748 uid=0 result="success" Sep 30 23:18:02 np0005463759.novalocal ovs-vsctl[84768]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --if-exists del-port br-ex loop1 -- add-port br-ex loop1 Sep 30 23:18:02 np0005463759.novalocal kernel: loop1: entered promiscuous mode Sep 30 23:18:02 np0005463759.novalocal NetworkManager[858]: [1759288682.1632] device (loop1): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Sep 30 23:18:02 np0005463759.novalocal NetworkManager[858]: [1759288682.1653] device (loop1): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Sep 30 23:18:02 np0005463759.novalocal NetworkManager[858]: [1759288682.1969] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=84775 uid=0 result="success" Sep 30 23:18:02 np0005463759.novalocal ifup[84776]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Sep 30 23:18:02 np0005463759.novalocal ifup[84777]: 'network-scripts' will be removed from distribution in near future. Sep 30 23:18:02 np0005463759.novalocal ifup[84778]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Sep 30 23:18:02 np0005463759.novalocal NetworkManager[858]: [1759288682.2414] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=84784 uid=0 result="success" Sep 30 23:18:02 np0005463759.novalocal ovs-vsctl[84788]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Sep 30 23:18:02 np0005463759.novalocal NetworkManager[858]: [1759288682.3333] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=84795 uid=0 result="success" Sep 30 23:18:02 np0005463759.novalocal ifup[84796]: You are using 'ifup' script provided by 'network-scripts', which are now deprecated. Sep 30 23:18:02 np0005463759.novalocal ifup[84797]: 'network-scripts' will be removed from distribution in near future. Sep 30 23:18:02 np0005463759.novalocal ifup[84798]: It is advised to switch to 'NetworkManager' instead - it provides 'ifup/ifdown' scripts as well. Sep 30 23:18:02 np0005463759.novalocal NetworkManager[858]: [1759288682.3777] audit: op="connections-load" args="/etc/sysconfig/network-scripts/ifcfg-br-ex" pid=84804 uid=0 result="success" Sep 30 23:18:02 np0005463759.novalocal ovs-vsctl[84808]: ovs|00001|vsctl|INFO|Called as ovs-vsctl -t 10 -- --may-exist add-br br-ex -- set bridge br-ex fail_mode=standalone Sep 30 23:18:02 np0005463759.novalocal NetworkManager[858]: [1759288682.4541] device (br-ex): carrier: link connected Sep 30 23:18:07 np0005463759.novalocal groupadd[84836]: group added to /etc/group: name=radvd, GID=75 Sep 30 23:18:07 np0005463759.novalocal groupadd[84836]: group added to /etc/gshadow: name=radvd Sep 30 23:18:07 np0005463759.novalocal groupadd[84836]: new group: name=radvd, GID=75 Sep 30 23:18:07 np0005463759.novalocal useradd[84845]: new user: name=radvd, UID=75, GID=75, home=/, shell=/sbin/nologin, from=none Sep 30 23:18:08 np0005463759.novalocal groupadd[84860]: group added to /etc/group: name=haproxy, GID=982 Sep 30 23:18:08 np0005463759.novalocal groupadd[84860]: group added to /etc/gshadow: name=haproxy Sep 30 23:18:08 np0005463759.novalocal groupadd[84860]: new group: name=haproxy, GID=982 Sep 30 23:18:08 np0005463759.novalocal useradd[84867]: new user: name=haproxy, UID=983, GID=982, home=/var/lib/haproxy, shell=/usr/sbin/nologin, from=none Sep 30 23:18:08 np0005463759.novalocal groupadd[84879]: group added to /etc/group: name=dnsmasq, GID=981 Sep 30 23:18:08 np0005463759.novalocal groupadd[84879]: group added to /etc/gshadow: name=dnsmasq Sep 30 23:18:08 np0005463759.novalocal groupadd[84879]: new group: name=dnsmasq, GID=981 Sep 30 23:18:08 np0005463759.novalocal useradd[84886]: new user: name=dnsmasq, UID=982, GID=981, home=/var/lib/dnsmasq, shell=/usr/sbin/nologin, from=none Sep 30 23:18:08 np0005463759.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Sep 30 23:18:08 np0005463759.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Sep 30 23:18:10 np0005463759.novalocal groupadd[84898]: group added to /etc/group: name=neutron, GID=980 Sep 30 23:18:10 np0005463759.novalocal groupadd[84898]: group added to /etc/gshadow: name=neutron Sep 30 23:18:11 np0005463759.novalocal groupadd[84898]: new group: name=neutron, GID=980 Sep 30 23:18:11 np0005463759.novalocal useradd[84905]: new user: name=neutron, UID=981, GID=980, home=/var/lib/neutron, shell=/sbin/nologin, from=none Sep 30 23:18:12 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:18:12 np0005463759.novalocal systemd[1]: Starting man-db-cache-update.service... Sep 30 23:18:12 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:18:12 np0005463759.novalocal systemd-sysv-generator[84963]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:18:12 np0005463759.novalocal systemd-rc-local-generator[84959]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:18:12 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:18:12 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Sep 30 23:18:12 np0005463759.novalocal systemd[1]: Finished man-db-cache-update.service. Sep 30 23:18:12 np0005463759.novalocal systemd[1]: run-r62572611ab0c454a974611d6a82bb429.service: Deactivated successfully. Sep 30 23:18:17 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:18:17 np0005463759.novalocal systemd-rc-local-generator[85398]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:18:17 np0005463759.novalocal systemd-sysv-generator[85401]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:18:17 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:18:18 np0005463759.novalocal ovs-vsctl[85411]: ovs|00001|vsctl|INFO|Called as ovs-vsctl set-manager ptcp:6640:127.0.0.1 Sep 30 23:18:20 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:18:20 np0005463759.novalocal systemd[1]: Starting man-db-cache-update.service... Sep 30 23:18:20 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:18:20 np0005463759.novalocal systemd-rc-local-generator[85454]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:18:20 np0005463759.novalocal systemd-sysv-generator[85457]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:18:20 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:18:21 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Sep 30 23:18:21 np0005463759.novalocal systemd[1]: Finished man-db-cache-update.service. Sep 30 23:18:21 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Consumed 1.036s CPU time. Sep 30 23:18:21 np0005463759.novalocal systemd[1]: run-r0383995facc1460785c0189f2bcf360b.service: Deactivated successfully. Sep 30 23:18:23 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:18:23 np0005463759.novalocal systemd-rc-local-generator[85883]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:18:23 np0005463759.novalocal systemd-sysv-generator[85886]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:18:23 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:18:30 np0005463759.novalocal groupadd[85910]: group added to /etc/group: name=placement, GID=979 Sep 30 23:18:30 np0005463759.novalocal groupadd[85910]: group added to /etc/gshadow: name=placement Sep 30 23:18:30 np0005463759.novalocal groupadd[85910]: new group: name=placement, GID=979 Sep 30 23:18:31 np0005463759.novalocal useradd[85917]: new user: name=placement, UID=980, GID=979, home=/, shell=/bin/bash, from=none Sep 30 23:18:33 np0005463759.novalocal sshd-session[85930]: Received disconnect from 192.227.153.63 port 59316:11: Bye Bye [preauth] Sep 30 23:18:33 np0005463759.novalocal sshd-session[85930]: Disconnected from authenticating user root 192.227.153.63 port 59316 [preauth] Sep 30 23:18:36 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:18:36 np0005463759.novalocal systemd[1]: Starting man-db-cache-update.service... Sep 30 23:18:37 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Sep 30 23:18:37 np0005463759.novalocal systemd[1]: Finished man-db-cache-update.service. Sep 30 23:18:37 np0005463759.novalocal systemd[1]: run-r7408ecb8cf004f4e8693cfe30d13b20d.service: Deactivated successfully. Sep 30 23:18:38 np0005463759.novalocal groupadd[86091]: group added to /etc/group: name=nova, GID=162 Sep 30 23:18:38 np0005463759.novalocal groupadd[86091]: group added to /etc/gshadow: name=nova Sep 30 23:18:38 np0005463759.novalocal groupadd[86091]: new group: name=nova, GID=162 Sep 30 23:18:38 np0005463759.novalocal useradd[86098]: new user: name=nova, UID=162, GID=162, home=/var/lib/nova, shell=/sbin/nologin, from=none Sep 30 23:18:38 np0005463759.novalocal useradd[86098]: add 'nova' to group 'nobody' Sep 30 23:18:38 np0005463759.novalocal useradd[86098]: add 'nova' to group 'nova' Sep 30 23:18:38 np0005463759.novalocal useradd[86098]: add 'nova' to shadow group 'nobody' Sep 30 23:18:38 np0005463759.novalocal useradd[86098]: add 'nova' to shadow group 'nova' Sep 30 23:18:57 np0005463759.novalocal kernel: SELinux: Converting 2774 SID table entries... Sep 30 23:18:57 np0005463759.novalocal kernel: SELinux: policy capability network_peer_controls=1 Sep 30 23:18:57 np0005463759.novalocal kernel: SELinux: policy capability open_perms=1 Sep 30 23:18:57 np0005463759.novalocal kernel: SELinux: policy capability extended_socket_class=1 Sep 30 23:18:57 np0005463759.novalocal kernel: SELinux: policy capability always_check_network=0 Sep 30 23:18:57 np0005463759.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Sep 30 23:18:57 np0005463759.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 30 23:18:57 np0005463759.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Sep 30 23:19:06 np0005463759.novalocal kernel: SELinux: Converting 2774 SID table entries... Sep 30 23:19:06 np0005463759.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=13 res=1 Sep 30 23:19:06 np0005463759.novalocal kernel: SELinux: policy capability network_peer_controls=1 Sep 30 23:19:06 np0005463759.novalocal kernel: SELinux: policy capability open_perms=1 Sep 30 23:19:06 np0005463759.novalocal kernel: SELinux: policy capability extended_socket_class=1 Sep 30 23:19:06 np0005463759.novalocal kernel: SELinux: policy capability always_check_network=0 Sep 30 23:19:06 np0005463759.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Sep 30 23:19:06 np0005463759.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 30 23:19:06 np0005463759.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Sep 30 23:19:06 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:19:06 np0005463759.novalocal systemd[1]: Starting Cleanup of Temporary Directories... Sep 30 23:19:06 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:19:06 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:19:06 np0005463759.novalocal systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Sep 30 23:19:06 np0005463759.novalocal systemd[1]: Finished Cleanup of Temporary Directories. Sep 30 23:19:06 np0005463759.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=14 res=1 Sep 30 23:19:06 np0005463759.novalocal systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Sep 30 23:19:14 np0005463759.novalocal kernel: SELinux: Converting 2774 SID table entries... Sep 30 23:19:14 np0005463759.novalocal kernel: SELinux: policy capability network_peer_controls=1 Sep 30 23:19:14 np0005463759.novalocal kernel: SELinux: policy capability open_perms=1 Sep 30 23:19:14 np0005463759.novalocal kernel: SELinux: policy capability extended_socket_class=1 Sep 30 23:19:14 np0005463759.novalocal kernel: SELinux: policy capability always_check_network=0 Sep 30 23:19:14 np0005463759.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Sep 30 23:19:14 np0005463759.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 30 23:19:14 np0005463759.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Sep 30 23:19:23 np0005463759.novalocal kernel: SELinux: Converting 2774 SID table entries... Sep 30 23:19:23 np0005463759.novalocal kernel: SELinux: policy capability network_peer_controls=1 Sep 30 23:19:23 np0005463759.novalocal kernel: SELinux: policy capability open_perms=1 Sep 30 23:19:23 np0005463759.novalocal kernel: SELinux: policy capability extended_socket_class=1 Sep 30 23:19:23 np0005463759.novalocal kernel: SELinux: policy capability always_check_network=0 Sep 30 23:19:23 np0005463759.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Sep 30 23:19:23 np0005463759.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 30 23:19:23 np0005463759.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Sep 30 23:19:32 np0005463759.novalocal sshd-session[86238]: Invalid user zeshan from 192.227.153.63 port 58710 Sep 30 23:19:32 np0005463759.novalocal sshd-session[86238]: Received disconnect from 192.227.153.63 port 58710:11: Bye Bye [preauth] Sep 30 23:19:32 np0005463759.novalocal sshd-session[86238]: Disconnected from invalid user zeshan 192.227.153.63 port 58710 [preauth] Sep 30 23:19:32 np0005463759.novalocal kernel: SELinux: Converting 2774 SID table entries... Sep 30 23:19:32 np0005463759.novalocal kernel: SELinux: policy capability network_peer_controls=1 Sep 30 23:19:32 np0005463759.novalocal kernel: SELinux: policy capability open_perms=1 Sep 30 23:19:32 np0005463759.novalocal kernel: SELinux: policy capability extended_socket_class=1 Sep 30 23:19:32 np0005463759.novalocal kernel: SELinux: policy capability always_check_network=0 Sep 30 23:19:32 np0005463759.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Sep 30 23:19:32 np0005463759.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 30 23:19:32 np0005463759.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Sep 30 23:19:42 np0005463759.novalocal kernel: SELinux: Converting 2775 SID table entries... Sep 30 23:19:42 np0005463759.novalocal kernel: SELinux: policy capability network_peer_controls=1 Sep 30 23:19:42 np0005463759.novalocal kernel: SELinux: policy capability open_perms=1 Sep 30 23:19:42 np0005463759.novalocal kernel: SELinux: policy capability extended_socket_class=1 Sep 30 23:19:42 np0005463759.novalocal kernel: SELinux: policy capability always_check_network=0 Sep 30 23:19:42 np0005463759.novalocal kernel: SELinux: policy capability cgroup_seclabel=1 Sep 30 23:19:42 np0005463759.novalocal kernel: SELinux: policy capability nnp_nosuid_transition=1 Sep 30 23:19:42 np0005463759.novalocal kernel: SELinux: policy capability genfs_seclabel_symlinks=1 Sep 30 23:19:43 np0005463759.novalocal groupadd[86265]: group added to /etc/group: name=qemu, GID=107 Sep 30 23:19:43 np0005463759.novalocal groupadd[86265]: group added to /etc/gshadow: name=qemu Sep 30 23:19:43 np0005463759.novalocal groupadd[86265]: new group: name=qemu, GID=107 Sep 30 23:19:43 np0005463759.novalocal useradd[86272]: new user: name=qemu, UID=107, GID=107, home=/, shell=/sbin/nologin, from=none Sep 30 23:19:43 np0005463759.novalocal useradd[86272]: add 'qemu' to group 'kvm' Sep 30 23:19:43 np0005463759.novalocal useradd[86272]: add 'qemu' to shadow group 'kvm' Sep 30 23:19:43 np0005463759.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Sep 30 23:19:43 np0005463759.novalocal dbus-broker-launch[774]: avc: op=load_policy lsm=selinux seqno=18 res=1 Sep 30 23:19:43 np0005463759.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Sep 30 23:19:43 np0005463759.novalocal dbus-broker-launch[769]: Noticed file-system modification, trigger reload. Sep 30 23:19:44 np0005463759.novalocal groupadd[86310]: group added to /etc/group: name=libvirt, GID=978 Sep 30 23:19:44 np0005463759.novalocal groupadd[86310]: group added to /etc/gshadow: name=libvirt Sep 30 23:19:44 np0005463759.novalocal groupadd[86310]: new group: name=libvirt, GID=978 Sep 30 23:19:44 np0005463759.novalocal polkitd[2930]: Reloading rules Sep 30 23:19:44 np0005463759.novalocal polkitd[2930]: Collecting garbage unconditionally... Sep 30 23:19:44 np0005463759.novalocal polkitd[2930]: Loading rules from directory /etc/polkit-1/rules.d Sep 30 23:19:44 np0005463759.novalocal polkitd[2930]: Loading rules from directory /usr/share/polkit-1/rules.d Sep 30 23:19:44 np0005463759.novalocal polkitd[2930]: Finished loading, compiling and executing 6 rules Sep 30 23:19:44 np0005463759.novalocal polkitd[2930]: Reloading rules Sep 30 23:19:44 np0005463759.novalocal polkitd[2930]: Collecting garbage unconditionally... Sep 30 23:19:44 np0005463759.novalocal polkitd[2930]: Loading rules from directory /etc/polkit-1/rules.d Sep 30 23:19:44 np0005463759.novalocal polkitd[2930]: Loading rules from directory /usr/share/polkit-1/rules.d Sep 30 23:19:44 np0005463759.novalocal polkitd[2930]: Finished loading, compiling and executing 6 rules Sep 30 23:19:49 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:19:49 np0005463759.novalocal systemd[1]: Starting man-db-cache-update.service... Sep 30 23:19:49 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:19:49 np0005463759.novalocal systemd-rc-local-generator[87018]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:19:49 np0005463759.novalocal systemd-sysv-generator[87023]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:19:49 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:19:53 np0005463759.novalocal groupadd[89455]: group added to /etc/group: name=octavia, GID=977 Sep 30 23:19:53 np0005463759.novalocal groupadd[89455]: group added to /etc/gshadow: name=octavia Sep 30 23:19:53 np0005463759.novalocal groupadd[89455]: new group: name=octavia, GID=977 Sep 30 23:19:53 np0005463759.novalocal useradd[89494]: new user: name=octavia, UID=979, GID=977, home=/var/lib/octavia, shell=/sbin/nologin, from=none Sep 30 23:19:55 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Sep 30 23:19:55 np0005463759.novalocal systemd[1]: Finished man-db-cache-update.service. Sep 30 23:19:55 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Consumed 7.041s CPU time. Sep 30 23:19:55 np0005463759.novalocal systemd[1]: run-re0757f7414164d4289a443d66a02384f.service: Deactivated successfully. Sep 30 23:19:58 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:19:58 np0005463759.novalocal systemd-rc-local-generator[90584]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:19:58 np0005463759.novalocal systemd-sysv-generator[90588]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:19:58 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:20:02 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:20:02 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:20:02 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:20:03 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:20:03 np0005463759.novalocal systemd-rc-local-generator[90632]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:20:03 np0005463759.novalocal systemd-sysv-generator[90636]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:20:03 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:20:05 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:20:05 np0005463759.novalocal systemd-rc-local-generator[90670]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:20:05 np0005463759.novalocal systemd-sysv-generator[90675]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:20:06 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:20:08 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:20:08 np0005463759.novalocal systemd-rc-local-generator[90714]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:20:08 np0005463759.novalocal systemd-sysv-generator[90718]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:20:08 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:20:10 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:20:11 np0005463759.novalocal systemd-rc-local-generator[90753]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:20:11 np0005463759.novalocal systemd-sysv-generator[90756]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:20:11 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:20:21 np0005463759.novalocal groupadd[90784]: group added to /etc/group: name=apache, GID=48 Sep 30 23:20:21 np0005463759.novalocal groupadd[90784]: group added to /etc/gshadow: name=apache Sep 30 23:20:21 np0005463759.novalocal groupadd[90784]: new group: name=apache, GID=48 Sep 30 23:20:21 np0005463759.novalocal useradd[90793]: new user: name=apache, UID=48, GID=48, home=/usr/share/httpd, shell=/sbin/nologin, from=none Sep 30 23:20:25 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:20:25 np0005463759.novalocal systemd-rc-local-generator[90827]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:20:25 np0005463759.novalocal systemd-sysv-generator[90831]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:20:26 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:20:26 np0005463759.novalocal systemd[1]: Starting man-db-cache-update.service... Sep 30 23:20:27 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:20:27 np0005463759.novalocal systemd-rc-local-generator[90888]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:20:27 np0005463759.novalocal systemd-sysv-generator[90893]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:20:27 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:20:28 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Sep 30 23:20:28 np0005463759.novalocal systemd[1]: Finished man-db-cache-update.service. Sep 30 23:20:28 np0005463759.novalocal systemd[1]: run-rc66f8010818d4adb8258dfd1f61266e5.service: Deactivated successfully. Sep 30 23:20:32 np0005463759.novalocal sshd-session[91190]: Invalid user rta from 192.227.153.63 port 57780 Sep 30 23:20:32 np0005463759.novalocal sshd-session[91190]: Received disconnect from 192.227.153.63 port 57780:11: Bye Bye [preauth] Sep 30 23:20:32 np0005463759.novalocal sshd-session[91190]: Disconnected from invalid user rta 192.227.153.63 port 57780 [preauth] Sep 30 23:20:34 np0005463759.novalocal groupadd[91201]: group added to /etc/group: name=manila, GID=976 Sep 30 23:20:34 np0005463759.novalocal groupadd[91201]: group added to /etc/gshadow: name=manila Sep 30 23:20:34 np0005463759.novalocal groupadd[91201]: new group: name=manila, GID=976 Sep 30 23:20:34 np0005463759.novalocal useradd[91208]: new user: name=manila, UID=978, GID=976, home=/var/lib/manila, shell=/sbin/nologin, from=none Sep 30 23:20:34 np0005463759.novalocal useradd[91208]: add 'manila' to group 'nobody' Sep 30 23:20:34 np0005463759.novalocal useradd[91208]: add 'manila' to group 'manila' Sep 30 23:20:34 np0005463759.novalocal useradd[91208]: add 'manila' to shadow group 'nobody' Sep 30 23:20:34 np0005463759.novalocal useradd[91208]: add 'manila' to shadow group 'manila' Sep 30 23:20:35 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:20:35 np0005463759.novalocal systemd[1]: Starting man-db-cache-update.service... Sep 30 23:20:35 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:20:35 np0005463759.novalocal systemd-rc-local-generator[91246]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:20:35 np0005463759.novalocal systemd-sysv-generator[91250]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:20:35 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:20:36 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Sep 30 23:20:36 np0005463759.novalocal systemd[1]: Finished man-db-cache-update.service. Sep 30 23:20:36 np0005463759.novalocal systemd[1]: run-r756a58ed2665469ea2fa5226ae439bdb.service: Deactivated successfully. Sep 30 23:20:39 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:20:39 np0005463759.novalocal systemd[1]: Starting man-db-cache-update.service... Sep 30 23:20:39 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:20:39 np0005463759.novalocal systemd-sysv-generator[91463]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:20:39 np0005463759.novalocal systemd-rc-local-generator[91458]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:20:39 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:20:40 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Sep 30 23:20:40 np0005463759.novalocal systemd[1]: Finished man-db-cache-update.service. Sep 30 23:20:40 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Consumed 1.025s CPU time. Sep 30 23:20:40 np0005463759.novalocal systemd[1]: run-rf9506819e67a4b279502c68017ea06c3.service: Deactivated successfully. Sep 30 23:20:41 np0005463759.novalocal kernel: loop: module loaded Sep 30 23:20:41 np0005463759.novalocal kernel: loop3: detected capacity change from 0 to 31457280 Sep 30 23:20:41 np0005463759.novalocal lvm[91902]: PV /dev/loop3 not used. Sep 30 23:20:41 np0005463759.novalocal lvm[91905]: PV /dev/loop3 online, VG lvm-shares is complete. Sep 30 23:20:41 np0005463759.novalocal systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event lvm-shares. Sep 30 23:20:41 np0005463759.novalocal lvm[91907]: 0 logical volume(s) in volume group "lvm-shares" now active Sep 30 23:20:41 np0005463759.novalocal systemd[1]: lvm-activate-lvm-shares.service: Deactivated successfully. Sep 30 23:20:56 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:20:56 np0005463759.novalocal systemd[1]: Starting man-db-cache-update.service... Sep 30 23:20:57 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Sep 30 23:20:57 np0005463759.novalocal systemd[1]: Finished man-db-cache-update.service. Sep 30 23:20:57 np0005463759.novalocal systemd[1]: run-r10f5569991dc46c4b5394bc53adf935a.service: Deactivated successfully. Sep 30 23:21:05 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:21:05 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:21:05 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:21:05 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:21:05 np0005463759.novalocal systemd-rc-local-generator[92206]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:21:05 np0005463759.novalocal systemd-sysv-generator[92209]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:21:05 np0005463759.novalocal systemd[1]: Starting MariaDB 10.5 database server... Sep 30 23:21:05 np0005463759.novalocal mariadb-prepare-db-dir[92238]: Database MariaDB is probably initialized in /var/lib/mysql already, nothing is done. Sep 30 23:21:05 np0005463759.novalocal mariadb-prepare-db-dir[92238]: If this is not the case, make sure the /var/lib/mysql is empty before running mariadb-prepare-db-dir. Sep 30 23:21:06 np0005463759.novalocal systemd[1]: Started MariaDB 10.5 database server. Sep 30 23:21:06 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:21:06 np0005463759.novalocal systemd-rc-local-generator[92351]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:21:06 np0005463759.novalocal systemd-sysv-generator[92356]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:21:06 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:21:06 np0005463759.novalocal systemd-rc-local-generator[92378]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:21:06 np0005463759.novalocal systemd-sysv-generator[92381]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:21:07 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:21:07 np0005463759.novalocal systemd-rc-local-generator[92413]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:21:07 np0005463759.novalocal systemd-sysv-generator[92416]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:21:07 np0005463759.novalocal systemd[1]: Starting Redis persistent key-value database... Sep 30 23:21:07 np0005463759.novalocal systemd[1]: Started Redis persistent key-value database. Sep 30 23:21:07 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:21:07 np0005463759.novalocal systemd-sysv-generator[92454]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:21:07 np0005463759.novalocal systemd-rc-local-generator[92448]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:21:07 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:21:08 np0005463759.novalocal systemd-rc-local-generator[92481]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:21:08 np0005463759.novalocal systemd-sysv-generator[92484]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:21:08 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:21:08 np0005463759.novalocal systemd-sysv-generator[92512]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:21:08 np0005463759.novalocal systemd-rc-local-generator[92509]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:21:08 np0005463759.novalocal systemd[1]: Starting Redis Sentinel... Sep 30 23:21:08 np0005463759.novalocal systemd[1]: Started Redis Sentinel. Sep 30 23:21:08 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:21:08 np0005463759.novalocal systemd-rc-local-generator[92549]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:21:08 np0005463759.novalocal systemd-sysv-generator[92552]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:21:09 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:21:09 np0005463759.novalocal systemd-rc-local-generator[92578]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:21:09 np0005463759.novalocal systemd-sysv-generator[92581]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:21:09 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:21:10 np0005463759.novalocal systemd-rc-local-generator[92658]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:21:10 np0005463759.novalocal systemd-sysv-generator[92661]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:21:10 np0005463759.novalocal systemd[1]: Starting OVN northd management daemon... Sep 30 23:21:10 np0005463759.novalocal chown[92667]: /usr/bin/chown: cannot access '/var/lib/ovn': No such file or directory Sep 30 23:21:10 np0005463759.novalocal ovn-ctl[92668]: /var/lib/ovn/ovnnb_db.db does not exist ... (warning). Sep 30 23:21:10 np0005463759.novalocal ovn-ctl[92668]: Creating empty database /var/lib/ovn/ovnnb_db.db [ OK ] Sep 30 23:21:10 np0005463759.novalocal ovsdb-server[92770]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-nb.log Sep 30 23:21:10 np0005463759.novalocal ovsdb-server[92772]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.3.5-115.el9s Sep 30 23:21:10 np0005463759.novalocal ovsdb-server[92771]: ovs|00002|vlog(monitor)|INFO|closing log file Sep 30 23:21:10 np0005463759.novalocal ovsdb-server[92771]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Sep 30 23:21:10 np0005463759.novalocal ovn-ctl[92668]: Starting ovsdb-nb [ OK ] Sep 30 23:21:10 np0005463759.novalocal ovn-nbctl[92776]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl --no-leader-only --db=unix:/run/ovn/ovnnb_db.sock init Sep 30 23:21:10 np0005463759.novalocal ovn-ctl[92668]: /var/lib/ovn/ovnsb_db.db does not exist ... (warning). Sep 30 23:21:10 np0005463759.novalocal ovn-ctl[92668]: Creating empty database /var/lib/ovn/ovnsb_db.db [ OK ] Sep 30 23:21:10 np0005463759.novalocal ovsdb-server[92796]: ovs|00001|vlog|INFO|opened log file /var/log/ovn/ovsdb-server-sb.log Sep 30 23:21:10 np0005463759.novalocal ovsdb-server[92798]: ovs|00002|ovsdb_server|INFO|ovsdb-server (Open vSwitch) 3.3.5-115.el9s Sep 30 23:21:10 np0005463759.novalocal ovsdb-server[92797]: ovs|00002|vlog(monitor)|INFO|closing log file Sep 30 23:21:10 np0005463759.novalocal ovsdb-server[92797]: ovs|00003|vlog(monitor)|INFO|opened log file (null) Sep 30 23:21:10 np0005463759.novalocal ovn-ctl[92668]: Starting ovsdb-sb [ OK ] Sep 30 23:21:10 np0005463759.novalocal ovn-sbctl[92802]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl --no-leader-only --db=unix:/run/ovn/ovnsb_db.sock init Sep 30 23:21:11 np0005463759.novalocal ovn-ctl[92668]: Starting ovn-northd [ OK ] Sep 30 23:21:11 np0005463759.novalocal systemd[1]: Finished OVN northd management daemon. Sep 30 23:21:11 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:21:11 np0005463759.novalocal systemd-rc-local-generator[92836]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:21:11 np0005463759.novalocal systemd-sysv-generator[92840]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:21:11 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:21:11 np0005463759.novalocal systemd-rc-local-generator[92869]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:21:11 np0005463759.novalocal systemd-sysv-generator[92873]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:21:11 np0005463759.novalocal ovn-nbctl[92880]: ovs|00001|ovn_dbctl|INFO|Called as ovn-nbctl set-connection pssl:6641:[::1] Sep 30 23:21:11 np0005463759.novalocal ovn-sbctl[92884]: ovs|00001|ovn_dbctl|INFO|Called as ovn-sbctl set-connection pssl:6642:[::1] Sep 30 23:21:12 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:21:12 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:21:12 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:21:12 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:21:12 np0005463759.novalocal systemd-rc-local-generator[92934]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:21:12 np0005463759.novalocal systemd-sysv-generator[92937]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:21:12 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:21:12 np0005463759.novalocal systemd[1]: Starting OVN controller daemon... Sep 30 23:21:12 np0005463759.novalocal ovn-ctl[92942]: Starting ovn-controller [ OK ] Sep 30 23:21:12 np0005463759.novalocal systemd[1]: Started OVN controller daemon. Sep 30 23:21:12 np0005463759.novalocal kernel: br-int: entered promiscuous mode Sep 30 23:21:12 np0005463759.novalocal NetworkManager[858]: [1759288872.9327] manager: (br-int): 'openvswitch' plugin not available; creating generic device Sep 30 23:21:12 np0005463759.novalocal NetworkManager[858]: [1759288872.9342] manager: (br-int): new Generic device (/org/freedesktop/NetworkManager/Devices/8) Sep 30 23:21:12 np0005463759.novalocal systemd-udevd[92999]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:21:13 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:21:13 np0005463759.novalocal systemd-sysv-generator[93022]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:21:13 np0005463759.novalocal systemd-rc-local-generator[93019]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:21:13 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:21:13 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:21:13 np0005463759.novalocal systemd-sysv-generator[93053]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:21:13 np0005463759.novalocal systemd-rc-local-generator[93050]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:21:13 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:21:15 np0005463759.novalocal kernel: loop2: detected capacity change from 0 to 31457280 Sep 30 23:21:15 np0005463759.novalocal lvm[93071]: PV /dev/loop2 not used. Sep 30 23:21:16 np0005463759.novalocal lvm[93075]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:21:16 np0005463759.novalocal systemd[1]: Started /usr/sbin/lvm vgchange -aay --autoactivation event cinder-volumes. Sep 30 23:21:16 np0005463759.novalocal lvm[93078]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:21:16 np0005463759.novalocal lvm[93078]: VG cinder-volumes finished Sep 30 23:21:16 np0005463759.novalocal lvm[93077]: 0 logical volume(s) in volume group "cinder-volumes" now active Sep 30 23:21:16 np0005463759.novalocal systemd[1]: lvm-activate-cinder-volumes.service: Deactivated successfully. Sep 30 23:21:20 np0005463759.novalocal ovsdb-server[92772]: ovs|00003|memory|INFO|10344 kB peak resident set size after 10.1 seconds Sep 30 23:21:20 np0005463759.novalocal ovsdb-server[92772]: ovs|00004|memory|INFO|atoms:43 cells:43 json-caches:1 monitors:2 n-weak-refs:0 sessions:1 Sep 30 23:21:21 np0005463759.novalocal ovsdb-server[92798]: ovs|00003|memory|INFO|11304 kB peak resident set size after 10.2 seconds Sep 30 23:21:21 np0005463759.novalocal ovsdb-server[92798]: ovs|00004|memory|INFO|atoms:447 cells:355 json-caches:1 monitors:3 n-weak-refs:11 sessions:2 Sep 30 23:21:25 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:21:26 np0005463759.novalocal systemd-rc-local-generator[93113]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:21:26 np0005463759.novalocal systemd-sysv-generator[93118]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:21:26 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:21:26 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:21:28 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:21:28 np0005463759.novalocal systemd-sysv-generator[93158]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:21:28 np0005463759.novalocal systemd-rc-local-generator[93155]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:21:28 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:21:29 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:21:33 np0005463759.novalocal groupadd[93225]: group added to /etc/group: name=clevis, GID=975 Sep 30 23:21:33 np0005463759.novalocal groupadd[93225]: group added to /etc/gshadow: name=clevis Sep 30 23:21:33 np0005463759.novalocal groupadd[93225]: new group: name=clevis, GID=975 Sep 30 23:21:33 np0005463759.novalocal useradd[93232]: new user: name=clevis, UID=977, GID=975, home=/var/cache/clevis, shell=/usr/sbin/nologin, from=none Sep 30 23:21:33 np0005463759.novalocal usermod[93242]: add 'clevis' to group 'tss' Sep 30 23:21:33 np0005463759.novalocal usermod[93242]: add 'clevis' to shadow group 'tss' Sep 30 23:21:34 np0005463759.novalocal usermod[93255]: add 'nova' to group 'qemu' Sep 30 23:21:34 np0005463759.novalocal usermod[93255]: add 'nova' to shadow group 'qemu' Sep 30 23:21:34 np0005463759.novalocal usermod[93262]: add 'nova' to group 'libvirt' Sep 30 23:21:34 np0005463759.novalocal usermod[93262]: add 'nova' to shadow group 'libvirt' Sep 30 23:21:35 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:21:35 np0005463759.novalocal systemd[1]: Starting man-db-cache-update.service... Sep 30 23:21:35 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:21:35 np0005463759.novalocal systemd-sysv-generator[93345]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:21:35 np0005463759.novalocal systemd-rc-local-generator[93339]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:21:35 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:21:35 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:21:37 np0005463759.novalocal sshd-session[93960]: Received disconnect from 192.227.153.63 port 57668:11: Bye Bye [preauth] Sep 30 23:21:37 np0005463759.novalocal sshd-session[93960]: Disconnected from authenticating user root 192.227.153.63 port 57668 [preauth] Sep 30 23:21:38 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:21:38 np0005463759.novalocal systemd-sysv-generator[95096]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:21:38 np0005463759.novalocal systemd-rc-local-generator[95091]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:21:38 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:21:38 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:21:41 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:21:41 np0005463759.novalocal systemd-sysv-generator[97225]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:21:41 np0005463759.novalocal systemd-rc-local-generator[97221]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:21:41 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:21:41 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:21:41 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Sep 30 23:21:41 np0005463759.novalocal systemd[1]: Finished man-db-cache-update.service. Sep 30 23:21:41 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Consumed 7.690s CPU time. Sep 30 23:21:41 np0005463759.novalocal systemd[1]: run-r0d337257290f47d4b93996802d0dce17.service: Deactivated successfully. Sep 30 23:21:44 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:21:44 np0005463759.novalocal systemd-rc-local-generator[97281]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:21:44 np0005463759.novalocal systemd-sysv-generator[97285]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:21:44 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:22:00 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:22:00 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:22:00 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:22:06 np0005463759.novalocal crontab[97332]: (root) LIST (root) Sep 30 23:22:06 np0005463759.novalocal crontab[97333]: (root) LIST (keystone) Sep 30 23:22:06 np0005463759.novalocal crontab[97334]: (root) LIST (cinder) Sep 30 23:22:06 np0005463759.novalocal crontab[97335]: (root) LIST (glance) Sep 30 23:22:07 np0005463759.novalocal crontab[97336]: (root) LIST (nova) Sep 30 23:22:07 np0005463759.novalocal crontab[97337]: (root) LIST (manila) Sep 30 23:22:07 np0005463759.novalocal crontab[97338]: (root) REPLACE (cinder) Sep 30 23:22:07 np0005463759.novalocal crontab[97339]: (root) REPLACE (glance) Sep 30 23:22:07 np0005463759.novalocal crontab[97340]: (root) REPLACE (glance) Sep 30 23:22:13 np0005463759.novalocal crontab[97351]: (root) REPLACE (glance) Sep 30 23:22:43 np0005463759.novalocal sshd-session[97396]: Invalid user iptv from 192.227.153.63 port 57246 Sep 30 23:22:43 np0005463759.novalocal sshd-session[97396]: Received disconnect from 192.227.153.63 port 57246:11: Bye Bye [preauth] Sep 30 23:22:43 np0005463759.novalocal sshd-session[97396]: Disconnected from invalid user iptv 192.227.153.63 port 57246 [preauth] Sep 30 23:22:48 np0005463759.novalocal crontab[97399]: (root) REPLACE (nova) Sep 30 23:22:56 np0005463759.novalocal systemd[1]: Started /usr/bin/systemctl start man-db-cache-update. Sep 30 23:22:56 np0005463759.novalocal systemd[1]: Starting man-db-cache-update.service... Sep 30 23:22:56 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:22:56 np0005463759.novalocal systemd-rc-local-generator[97443]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:22:56 np0005463759.novalocal systemd-sysv-generator[97449]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:22:56 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:22:56 np0005463759.novalocal systemd[1]: Queuing reload/restart jobs for marked units… Sep 30 23:22:57 np0005463759.novalocal systemd[1]: man-db-cache-update.service: Deactivated successfully. Sep 30 23:22:57 np0005463759.novalocal systemd[1]: Finished man-db-cache-update.service. Sep 30 23:22:57 np0005463759.novalocal systemd[1]: run-r64ebfd3211644a24a7659ea0478fe77e.service: Deactivated successfully. Sep 30 23:23:06 np0005463759.novalocal crontab[97548]: (root) REPLACE (manila) Sep 30 23:23:06 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:23:06 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:06 np0005463759.novalocal systemd-rc-local-generator[97569]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:06 np0005463759.novalocal systemd-sysv-generator[97574]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:06 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:06 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:23:06 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:23:06 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:07 np0005463759.novalocal systemd-sysv-generator[97607]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:07 np0005463759.novalocal systemd-rc-local-generator[97604]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:07 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:07 np0005463759.novalocal systemd[97613]: epmd.socket: Failed to create listening socket ([::]:4369): Address already in use Sep 30 23:23:07 np0005463759.novalocal systemd[1]: epmd.socket: Failed to receive listening socket ([::]:4369): Input/output error Sep 30 23:23:07 np0005463759.novalocal systemd[1]: epmd.socket: Failed to listen on sockets: Input/output error Sep 30 23:23:07 np0005463759.novalocal systemd[1]: epmd.socket: Failed with result 'resources'. Sep 30 23:23:07 np0005463759.novalocal systemd[1]: Failed to listen on Erlang Port Mapper Daemon Activation Socket. Sep 30 23:23:07 np0005463759.novalocal systemd[1]: Starting RabbitMQ broker... Sep 30 23:23:07 np0005463759.novalocal rabbitmq-server[97614]: 2025-09-30 23:23:07.881603-04:00 [warning] <0.129.0> Both old (.config) and new (.conf) format config files exist. Sep 30 23:23:07 np0005463759.novalocal rabbitmq-server[97614]: 2025-09-30 23:23:07.895886-04:00 [warning] <0.129.0> Using the old format config file: /etc/rabbitmq/rabbitmq.config Sep 30 23:23:07 np0005463759.novalocal rabbitmq-server[97614]: 2025-09-30 23:23:07.895940-04:00 [warning] <0.129.0> Please update your config files to the new format and remove the old file. Sep 30 23:23:09 np0005463759.novalocal rabbitmq-server[97614]: 2025-09-30 23:23:09.780072-04:00 [info] <0.229.0> Feature flags: list of feature flags found: Sep 30 23:23:09 np0005463759.novalocal rabbitmq-server[97614]: 2025-09-30 23:23:09.780143-04:00 [info] <0.229.0> Feature flags: [ ] implicit_default_bindings Sep 30 23:23:09 np0005463759.novalocal rabbitmq-server[97614]: 2025-09-30 23:23:09.780163-04:00 [info] <0.229.0> Feature flags: [ ] maintenance_mode_status Sep 30 23:23:09 np0005463759.novalocal rabbitmq-server[97614]: 2025-09-30 23:23:09.780191-04:00 [info] <0.229.0> Feature flags: [ ] quorum_queue Sep 30 23:23:09 np0005463759.novalocal rabbitmq-server[97614]: 2025-09-30 23:23:09.780247-04:00 [info] <0.229.0> Feature flags: [ ] stream_queue Sep 30 23:23:09 np0005463759.novalocal rabbitmq-server[97614]: 2025-09-30 23:23:09.780265-04:00 [info] <0.229.0> Feature flags: [ ] user_limits Sep 30 23:23:09 np0005463759.novalocal rabbitmq-server[97614]: 2025-09-30 23:23:09.780283-04:00 [info] <0.229.0> Feature flags: [ ] virtual_host_metadata Sep 30 23:23:09 np0005463759.novalocal rabbitmq-server[97614]: 2025-09-30 23:23:09.780330-04:00 [info] <0.229.0> Feature flags: feature flag states written to disk: yes Sep 30 23:23:10 np0005463759.novalocal rabbitmq-server[97614]: 2025-09-30 23:23:10.107078-04:00 [notice] <0.44.0> Application syslog exited with reason: stopped Sep 30 23:23:10 np0005463759.novalocal rabbitmq-server[97614]: 2025-09-30 23:23:10.107214-04:00 [notice] <0.229.0> Logging: switching to configured handler(s); following messages may not be visible in this log output Sep 30 23:23:10 np0005463759.novalocal rabbitmq-server[97614]: ## ## RabbitMQ 3.9.21 Sep 30 23:23:10 np0005463759.novalocal rabbitmq-server[97614]: ## ## Sep 30 23:23:10 np0005463759.novalocal rabbitmq-server[97614]: ########## Copyright (c) 2007-2022 VMware, Inc. or its affiliates. Sep 30 23:23:10 np0005463759.novalocal rabbitmq-server[97614]: ###### ## Sep 30 23:23:10 np0005463759.novalocal rabbitmq-server[97614]: ########## Licensed under the MPL 2.0. Website: https://rabbitmq.com Sep 30 23:23:10 np0005463759.novalocal rabbitmq-server[97614]: Erlang: 24.3.4.2 [jit] Sep 30 23:23:10 np0005463759.novalocal rabbitmq-server[97614]: TLS Library: OpenSSL - OpenSSL 3.5.1 1 Jul 2025 Sep 30 23:23:10 np0005463759.novalocal rabbitmq-server[97614]: Doc guides: https://rabbitmq.com/documentation.html Sep 30 23:23:10 np0005463759.novalocal rabbitmq-server[97614]: Support: https://rabbitmq.com/contact.html Sep 30 23:23:10 np0005463759.novalocal rabbitmq-server[97614]: Tutorials: https://rabbitmq.com/getstarted.html Sep 30 23:23:10 np0005463759.novalocal rabbitmq-server[97614]: Monitoring: https://rabbitmq.com/monitoring.html Sep 30 23:23:10 np0005463759.novalocal rabbitmq-server[97614]: Logs: /var/log/rabbitmq/rabbit@localhost6.log Sep 30 23:23:10 np0005463759.novalocal rabbitmq-server[97614]: /var/log/rabbitmq/rabbit@localhost6_upgrade.log Sep 30 23:23:10 np0005463759.novalocal rabbitmq-server[97614]: Sep 30 23:23:10 np0005463759.novalocal rabbitmq-server[97614]: Config file(s): /etc/rabbitmq/rabbitmq.config Sep 30 23:23:13 np0005463759.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Sep 30 23:23:13 np0005463759.novalocal rabbitmq-server[97614]: Starting broker... completed with 3 plugins. Sep 30 23:23:13 np0005463759.novalocal systemd[1]: Started RabbitMQ broker. Sep 30 23:23:13 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:13 np0005463759.novalocal systemd-rc-local-generator[97720]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:13 np0005463759.novalocal systemd-sysv-generator[97723]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:13 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:14 np0005463759.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Sep 30 23:23:14 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:14 np0005463759.novalocal setroubleshoot[97697]: failed to retrieve rpm info for path '/proc/net/if_inet6': Sep 30 23:23:14 np0005463759.novalocal systemd-sysv-generator[97756]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:14 np0005463759.novalocal systemd-rc-local-generator[97752]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:14 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:14 np0005463759.novalocal systemd[1]: Created slice Slice /system/dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged. Sep 30 23:23:14 np0005463759.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service. Sep 30 23:23:14 np0005463759.novalocal runuser[97768]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:15 np0005463759.novalocal runuser[97768]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:15 np0005463759.novalocal runuser[97824]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:15 np0005463759.novalocal setroubleshoot[97697]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. For complete SELinux messages run: sealert -l b54a1dc4-9ee2-40fa-bb58-779045ea8596 Sep 30 23:23:15 np0005463759.novalocal setroubleshoot[97697]: SELinux is preventing /usr/lib64/erlang/erts-12.3.2.2/bin/inet_gethost from read access on the lnk_file /proc/net/if_inet6. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that inet_gethost should be allowed read access on the if_inet6 lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'inet_gethost' --raw | audit2allow -M my-inetgethost # semodule -X 300 -i my-inetgethost.pp Sep 30 23:23:16 np0005463759.novalocal runuser[97824]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:16 np0005463759.novalocal runuser[97877]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:16 np0005463759.novalocal runuser[97877]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:17 np0005463759.novalocal runuser[97931]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:17 np0005463759.novalocal runuser[97931]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:17 np0005463759.novalocal runuser[97985]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:18 np0005463759.novalocal runuser[97985]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:18 np0005463759.novalocal runuser[98037]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:19 np0005463759.novalocal runuser[98037]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:19 np0005463759.novalocal runuser[98089]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:19 np0005463759.novalocal runuser[98089]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:20 np0005463759.novalocal runuser[98141]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:20 np0005463759.novalocal runuser[98141]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:20 np0005463759.novalocal runuser[98193]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:21 np0005463759.novalocal runuser[98193]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:21 np0005463759.novalocal runuser[98247]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:22 np0005463759.novalocal runuser[98247]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:22 np0005463759.novalocal runuser[98299]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:22 np0005463759.novalocal runuser[98299]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:23 np0005463759.novalocal runuser[98353]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:23 np0005463759.novalocal runuser[98353]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:23 np0005463759.novalocal runuser[98405]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:24 np0005463759.novalocal runuser[98405]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:24 np0005463759.novalocal runuser[98457]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:24 np0005463759.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Deactivated successfully. Sep 30 23:23:24 np0005463759.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@0.service: Consumed 1.181s CPU time. Sep 30 23:23:25 np0005463759.novalocal runuser[98457]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:25 np0005463759.novalocal runuser[98509]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:25 np0005463759.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Sep 30 23:23:25 np0005463759.novalocal runuser[98509]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:26 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:26 np0005463759.novalocal systemd-rc-local-generator[98586]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:26 np0005463759.novalocal systemd-sysv-generator[98589]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:26 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:26 np0005463759.novalocal systemd[1]: Started OpenStack Cinder Scheduler Server. Sep 30 23:23:27 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:27 np0005463759.novalocal systemd-rc-local-generator[98619]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:27 np0005463759.novalocal systemd-sysv-generator[98622]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:27 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:27 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:27 np0005463759.novalocal systemd-sysv-generator[98651]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:27 np0005463759.novalocal systemd-rc-local-generator[98648]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:27 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:28 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:28 np0005463759.novalocal systemd-rc-local-generator[98682]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:28 np0005463759.novalocal systemd-sysv-generator[98686]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:28 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:28 np0005463759.novalocal systemd[1]: Started OpenStack Cinder Volume Server. Sep 30 23:23:28 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:28 np0005463759.novalocal systemd-rc-local-generator[98713]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:28 np0005463759.novalocal systemd-sysv-generator[98716]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:29 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:29 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:29 np0005463759.novalocal systemd-rc-local-generator[98744]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:29 np0005463759.novalocal systemd-sysv-generator[98748]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:29 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:29 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:30 np0005463759.novalocal systemd-rc-local-generator[98776]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:30 np0005463759.novalocal systemd-sysv-generator[98779]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:30 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:30 np0005463759.novalocal systemd[1]: Started OpenStack Cinder Backup Server. Sep 30 23:23:30 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:30 np0005463759.novalocal systemd-rc-local-generator[98811]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:30 np0005463759.novalocal systemd-sysv-generator[98815]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:30 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:30 np0005463759.novalocal sudo[98823]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings -o name cinder-volumes Sep 30 23:23:30 np0005463759.novalocal systemd[1]: Created slice User Slice of UID 0. Sep 30 23:23:30 np0005463759.novalocal systemd[1]: Starting User Runtime Directory /run/user/0... Sep 30 23:23:30 np0005463759.novalocal systemd[1]: Finished User Runtime Directory /run/user/0. Sep 30 23:23:30 np0005463759.novalocal systemd[1]: Starting User Manager for UID 0... Sep 30 23:23:30 np0005463759.novalocal systemd[98827]: pam_unix(systemd-user:session): session opened for user root(uid=0) by root(uid=0) Sep 30 23:23:30 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:30 np0005463759.novalocal systemd-rc-local-generator[98852]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:30 np0005463759.novalocal systemd-sysv-generator[98855]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:30 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:31 np0005463759.novalocal systemd[98827]: Queued start job for default target Main User Target. Sep 30 23:23:31 np0005463759.novalocal systemd[98827]: Created slice User Application Slice. Sep 30 23:23:31 np0005463759.novalocal systemd[98827]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Sep 30 23:23:31 np0005463759.novalocal systemd[98827]: Started Daily Cleanup of User's Temporary Directories. Sep 30 23:23:31 np0005463759.novalocal systemd[98827]: Reached target Paths. Sep 30 23:23:31 np0005463759.novalocal systemd[98827]: Reached target Timers. Sep 30 23:23:31 np0005463759.novalocal systemd[98827]: Starting D-Bus User Message Bus Socket... Sep 30 23:23:31 np0005463759.novalocal systemd[98827]: PipeWire PulseAudio was skipped because of an unmet condition check (ConditionUser=!root). Sep 30 23:23:31 np0005463759.novalocal systemd[98827]: Listening on PipeWire Multimedia System Sockets. Sep 30 23:23:31 np0005463759.novalocal systemd[98827]: Starting Create User's Volatile Files and Directories... Sep 30 23:23:31 np0005463759.novalocal systemd[98827]: Listening on D-Bus User Message Bus Socket. Sep 30 23:23:31 np0005463759.novalocal systemd[98827]: Reached target Sockets. Sep 30 23:23:31 np0005463759.novalocal systemd[98827]: Finished Create User's Volatile Files and Directories. Sep 30 23:23:31 np0005463759.novalocal systemd[98827]: Reached target Basic System. Sep 30 23:23:31 np0005463759.novalocal systemd[98827]: Reached target Main User Target. Sep 30 23:23:31 np0005463759.novalocal systemd[98827]: Startup finished in 217ms. Sep 30 23:23:31 np0005463759.novalocal systemd[1]: Started User Manager for UID 0. Sep 30 23:23:31 np0005463759.novalocal systemd[1]: Started Session c1 of User root. Sep 30 23:23:31 np0005463759.novalocal sudo[98823]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:23:31 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:31 np0005463759.novalocal sudo[98823]: pam_unix(sudo:session): session closed for user root Sep 30 23:23:31 np0005463759.novalocal systemd-rc-local-generator[98892]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:31 np0005463759.novalocal systemd-sysv-generator[98895]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:31 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:31 np0005463759.novalocal systemd[1]: session-c1.scope: Deactivated successfully. Sep 30 23:23:31 np0005463759.novalocal sudo[98872]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Sep 30 23:23:31 np0005463759.novalocal systemd[1]: Started Session c2 of User root. Sep 30 23:23:31 np0005463759.novalocal sudo[98872]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:23:31 np0005463759.novalocal systemd[1]: Starting Restore LIO kernel target configuration... Sep 30 23:23:32 np0005463759.novalocal kernel: Rounding down aligned max_sectors from 4294967295 to 4294967288 Sep 30 23:23:32 np0005463759.novalocal target[98904]: No saved config file at /etc/target/saveconfig.json, ok, exiting Sep 30 23:23:32 np0005463759.novalocal systemd[1]: Finished Restore LIO kernel target configuration. Sep 30 23:23:32 np0005463759.novalocal sudo[98872]: pam_unix(sudo:session): session closed for user root Sep 30 23:23:32 np0005463759.novalocal systemd[1]: session-c2.scope: Deactivated successfully. Sep 30 23:23:32 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:32 np0005463759.novalocal systemd-rc-local-generator[98936]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:32 np0005463759.novalocal systemd-sysv-generator[98939]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:32 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:32 np0005463759.novalocal sudo[98915]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:23:32 np0005463759.novalocal systemd[1]: Started Session c3 of User root. Sep 30 23:23:32 np0005463759.novalocal sudo[98915]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:23:32 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:32 np0005463759.novalocal systemd-rc-local-generator[98965]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:32 np0005463759.novalocal systemd-sysv-generator[98968]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:32 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:32 np0005463759.novalocal sudo[98915]: pam_unix(sudo:session): session closed for user root Sep 30 23:23:32 np0005463759.novalocal systemd[1]: session-c3.scope: Deactivated successfully. Sep 30 23:23:32 np0005463759.novalocal runuser[98977]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:32 np0005463759.novalocal sudo[98982]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -L 14.25g cinder-volumes/cinder-volumes-pool Sep 30 23:23:32 np0005463759.novalocal systemd[1]: Started Session c4 of User root. Sep 30 23:23:32 np0005463759.novalocal sudo[98982]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:23:33 np0005463759.novalocal systemd[1]: Started Device-mapper event daemon. Sep 30 23:23:33 np0005463759.novalocal dmeventd[99059]: dmeventd ready for processing. Sep 30 23:23:33 np0005463759.novalocal dmeventd[99059]: Monitoring thin pool cinder--volumes-cinder--volumes--pool. Sep 30 23:23:33 np0005463759.novalocal lvm[99064]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:23:33 np0005463759.novalocal lvm[99064]: VG cinder-volumes finished Sep 30 23:23:33 np0005463759.novalocal sudo[98982]: pam_unix(sudo:session): session closed for user root Sep 30 23:23:33 np0005463759.novalocal systemd[1]: session-c4.scope: Deactivated successfully. Sep 30 23:23:33 np0005463759.novalocal runuser[98977]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:33 np0005463759.novalocal sudo[99073]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/cinder-volumes-pool Sep 30 23:23:33 np0005463759.novalocal systemd[1]: Started Session c5 of User root. Sep 30 23:23:33 np0005463759.novalocal sudo[99073]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:23:33 np0005463759.novalocal runuser[99075]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:33 np0005463759.novalocal sudo[99073]: pam_unix(sudo:session): session closed for user root Sep 30 23:23:33 np0005463759.novalocal systemd[1]: session-c5.scope: Deactivated successfully. Sep 30 23:23:34 np0005463759.novalocal sudo[99123]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C pvs --noheadings --unit=g -o vg_name,name,size,free --separator | --nosuffix --ignoreskippedcluster Sep 30 23:23:34 np0005463759.novalocal systemd[1]: Started Session c6 of User root. Sep 30 23:23:34 np0005463759.novalocal sudo[99123]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:23:34 np0005463759.novalocal runuser[99075]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:34 np0005463759.novalocal sudo[99123]: pam_unix(sudo:session): session closed for user root Sep 30 23:23:34 np0005463759.novalocal systemd[1]: session-c6.scope: Deactivated successfully. Sep 30 23:23:34 np0005463759.novalocal runuser[99135]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:34 np0005463759.novalocal sudo[99143]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:23:34 np0005463759.novalocal systemd[1]: Started Session c7 of User root. Sep 30 23:23:34 np0005463759.novalocal sudo[99143]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:23:34 np0005463759.novalocal sudo[99143]: pam_unix(sudo:session): session closed for user root Sep 30 23:23:34 np0005463759.novalocal systemd[1]: session-c7.scope: Deactivated successfully. Sep 30 23:23:34 np0005463759.novalocal sudo[99184]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:23:34 np0005463759.novalocal systemd[1]: Started Session c8 of User root. Sep 30 23:23:34 np0005463759.novalocal sudo[99184]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:23:34 np0005463759.novalocal runuser[99135]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:35 np0005463759.novalocal runuser[99194]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:35 np0005463759.novalocal sudo[99184]: pam_unix(sudo:session): session closed for user root Sep 30 23:23:35 np0005463759.novalocal systemd[1]: session-c8.scope: Deactivated successfully. Sep 30 23:23:35 np0005463759.novalocal sudo[99240]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:23:35 np0005463759.novalocal systemd[1]: Started Session c9 of User root. Sep 30 23:23:35 np0005463759.novalocal sudo[99240]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:23:35 np0005463759.novalocal sudo[99240]: pam_unix(sudo:session): session closed for user root Sep 30 23:23:35 np0005463759.novalocal systemd[1]: session-c9.scope: Deactivated successfully. Sep 30 23:23:35 np0005463759.novalocal sudo[99246]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:23:35 np0005463759.novalocal systemd[1]: Started Session c10 of User root. Sep 30 23:23:35 np0005463759.novalocal sudo[99246]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:23:35 np0005463759.novalocal runuser[99194]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:35 np0005463759.novalocal sudo[99246]: pam_unix(sudo:session): session closed for user root Sep 30 23:23:35 np0005463759.novalocal systemd[1]: session-c10.scope: Deactivated successfully. Sep 30 23:23:36 np0005463759.novalocal sudo[99259]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Sep 30 23:23:36 np0005463759.novalocal systemd[1]: Started Session c11 of User root. Sep 30 23:23:36 np0005463759.novalocal sudo[99259]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:23:36 np0005463759.novalocal runuser[99261]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:36 np0005463759.novalocal sudo[99259]: pam_unix(sudo:session): session closed for user root Sep 30 23:23:36 np0005463759.novalocal systemd[1]: session-c11.scope: Deactivated successfully. Sep 30 23:23:36 np0005463759.novalocal sudo[99309]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/cinder-volumes-pool Sep 30 23:23:36 np0005463759.novalocal systemd[1]: Started Session c12 of User root. Sep 30 23:23:36 np0005463759.novalocal sudo[99309]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:23:36 np0005463759.novalocal runuser[99261]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:36 np0005463759.novalocal runuser[99319]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:36 np0005463759.novalocal sudo[99309]: pam_unix(sudo:session): session closed for user root Sep 30 23:23:36 np0005463759.novalocal systemd[1]: session-c12.scope: Deactivated successfully. Sep 30 23:23:36 np0005463759.novalocal sudo[99337]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:23:36 np0005463759.novalocal systemd[1]: Started Session c13 of User root. Sep 30 23:23:36 np0005463759.novalocal sudo[99337]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:23:37 np0005463759.novalocal sudo[99337]: pam_unix(sudo:session): session closed for user root Sep 30 23:23:37 np0005463759.novalocal systemd[1]: session-c13.scope: Deactivated successfully. Sep 30 23:23:37 np0005463759.novalocal sudo[99369]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:23:37 np0005463759.novalocal systemd[1]: Started Session c14 of User root. Sep 30 23:23:37 np0005463759.novalocal sudo[99369]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:23:37 np0005463759.novalocal runuser[99319]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:37 np0005463759.novalocal runuser[99379]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:37 np0005463759.novalocal sudo[99369]: pam_unix(sudo:session): session closed for user root Sep 30 23:23:37 np0005463759.novalocal systemd[1]: session-c14.scope: Deactivated successfully. Sep 30 23:23:37 np0005463759.novalocal sudo[99394]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:23:37 np0005463759.novalocal systemd[1]: Started Session c15 of User root. Sep 30 23:23:37 np0005463759.novalocal sudo[99394]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:23:37 np0005463759.novalocal sudo[99394]: pam_unix(sudo:session): session closed for user root Sep 30 23:23:37 np0005463759.novalocal systemd[1]: session-c15.scope: Deactivated successfully. Sep 30 23:23:38 np0005463759.novalocal sudo[99429]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:23:38 np0005463759.novalocal systemd[1]: Started Session c16 of User root. Sep 30 23:23:38 np0005463759.novalocal sudo[99429]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:23:38 np0005463759.novalocal runuser[99379]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:38 np0005463759.novalocal runuser[99439]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:38 np0005463759.novalocal sudo[99429]: pam_unix(sudo:session): session closed for user root Sep 30 23:23:38 np0005463759.novalocal systemd[1]: session-c16.scope: Deactivated successfully. Sep 30 23:23:38 np0005463759.novalocal sudo[99486]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:23:38 np0005463759.novalocal systemd[1]: Started Session c17 of User root. Sep 30 23:23:38 np0005463759.novalocal sudo[99486]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:23:38 np0005463759.novalocal runuser[99439]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:38 np0005463759.novalocal sudo[99486]: pam_unix(sudo:session): session closed for user root Sep 30 23:23:38 np0005463759.novalocal systemd[1]: session-c17.scope: Deactivated successfully. Sep 30 23:23:38 np0005463759.novalocal sudo[99498]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:23:38 np0005463759.novalocal systemd[1]: Started Session c18 of User root. Sep 30 23:23:38 np0005463759.novalocal sudo[99498]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:23:39 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:39 np0005463759.novalocal sudo[99498]: pam_unix(sudo:session): session closed for user root Sep 30 23:23:39 np0005463759.novalocal systemd-rc-local-generator[99526]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:39 np0005463759.novalocal systemd-sysv-generator[99530]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:39 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:39 np0005463759.novalocal systemd[1]: session-c18.scope: Deactivated successfully. Sep 30 23:23:39 np0005463759.novalocal sudo[99505]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:23:39 np0005463759.novalocal systemd[1]: Started Session c19 of User root. Sep 30 23:23:39 np0005463759.novalocal systemd[1]: Starting OpenStack Neutron Server... Sep 30 23:23:39 np0005463759.novalocal sudo[99505]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:23:39 np0005463759.novalocal sudo[99505]: pam_unix(sudo:session): session closed for user root Sep 30 23:23:39 np0005463759.novalocal systemd[1]: session-c19.scope: Deactivated successfully. Sep 30 23:23:39 np0005463759.novalocal sudo[99540]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:23:39 np0005463759.novalocal systemd[1]: Started Session c20 of User root. Sep 30 23:23:39 np0005463759.novalocal sudo[99540]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:23:40 np0005463759.novalocal sudo[99540]: pam_unix(sudo:session): session closed for user root Sep 30 23:23:40 np0005463759.novalocal systemd[1]: session-c20.scope: Deactivated successfully. Sep 30 23:23:40 np0005463759.novalocal sudo[99546]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:23:40 np0005463759.novalocal systemd[1]: Started Session c21 of User root. Sep 30 23:23:40 np0005463759.novalocal sudo[99546]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:23:40 np0005463759.novalocal sudo[99546]: pam_unix(sudo:session): session closed for user root Sep 30 23:23:40 np0005463759.novalocal systemd[1]: session-c21.scope: Deactivated successfully. Sep 30 23:23:40 np0005463759.novalocal sudo[99550]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:23:41 np0005463759.novalocal systemd[1]: Started Session c22 of User root. Sep 30 23:23:41 np0005463759.novalocal sudo[99550]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:23:41 np0005463759.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Sep 30 23:23:41 np0005463759.novalocal sudo[99550]: pam_unix(sudo:session): session closed for user root Sep 30 23:23:41 np0005463759.novalocal systemd[1]: session-c22.scope: Deactivated successfully. Sep 30 23:23:41 np0005463759.novalocal sudo[99555]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:23:41 np0005463759.novalocal systemd[1]: Started Session c23 of User root. Sep 30 23:23:41 np0005463759.novalocal sudo[99555]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:23:41 np0005463759.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Sep 30 23:23:41 np0005463759.novalocal sudo[99555]: pam_unix(sudo:session): session closed for user root Sep 30 23:23:41 np0005463759.novalocal systemd[1]: session-c23.scope: Deactivated successfully. Sep 30 23:23:41 np0005463759.novalocal sudo[99562]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:23:41 np0005463759.novalocal systemd[1]: Started Session c24 of User root. Sep 30 23:23:41 np0005463759.novalocal sudo[99562]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:23:41 np0005463759.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service. Sep 30 23:23:42 np0005463759.novalocal sudo[99562]: pam_unix(sudo:session): session closed for user root Sep 30 23:23:42 np0005463759.novalocal systemd[1]: session-c24.scope: Deactivated successfully. Sep 30 23:23:42 np0005463759.novalocal systemd[1]: Started OpenStack Neutron Server. Sep 30 23:23:43 np0005463759.novalocal setroubleshoot[99553]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l cec0716e-b2f3-4020-b4f1-d7f6c13ef243 Sep 30 23:23:43 np0005463759.novalocal setroubleshoot[99553]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'neutron-server' --raw | audit2allow -M my-neutronserver # semodule -X 300 -i my-neutronserver.pp Sep 30 23:23:43 np0005463759.novalocal setroubleshoot[99553]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l cec0716e-b2f3-4020-b4f1-d7f6c13ef243 Sep 30 23:23:43 np0005463759.novalocal setroubleshoot[99553]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'neutron-server' --raw | audit2allow -M my-neutronserver # semodule -X 300 -i my-neutronserver.pp Sep 30 23:23:43 np0005463759.novalocal setroubleshoot[99553]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l cec0716e-b2f3-4020-b4f1-d7f6c13ef243 Sep 30 23:23:43 np0005463759.novalocal setroubleshoot[99553]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'neutron-server' --raw | audit2allow -M my-neutronserver # semodule -X 300 -i my-neutronserver.pp Sep 30 23:23:43 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:43 np0005463759.novalocal systemd-sysv-generator[99614]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:43 np0005463759.novalocal systemd-rc-local-generator[99610]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:43 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:43 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:43 np0005463759.novalocal systemd-rc-local-generator[99641]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:43 np0005463759.novalocal systemd-sysv-generator[99645]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:43 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:44 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:44 np0005463759.novalocal systemd-rc-local-generator[99671]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:44 np0005463759.novalocal systemd-sysv-generator[99674]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:44 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:44 np0005463759.novalocal sshd-session[99653]: Invalid user teamspeak3 from 192.227.153.63 port 56574 Sep 30 23:23:44 np0005463759.novalocal sshd-session[99653]: Received disconnect from 192.227.153.63 port 56574:11: Bye Bye [preauth] Sep 30 23:23:44 np0005463759.novalocal sshd-session[99653]: Disconnected from invalid user teamspeak3 192.227.153.63 port 56574 [preauth] Sep 30 23:23:44 np0005463759.novalocal systemd[1]: Started OpenStack Neutron OVN Agent. Sep 30 23:23:44 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:44 np0005463759.novalocal systemd-rc-local-generator[99706]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:44 np0005463759.novalocal systemd-sysv-generator[99709]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:44 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:45 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:45 np0005463759.novalocal systemd-rc-local-generator[99738]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:45 np0005463759.novalocal systemd-sysv-generator[99742]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:45 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:45 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:45 np0005463759.novalocal systemd-sysv-generator[99773]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:45 np0005463759.novalocal systemd-rc-local-generator[99769]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:45 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:46 np0005463759.novalocal systemd[1]: Started OpenStack Neutron VPNaaS support for OVN. Sep 30 23:23:46 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:46 np0005463759.novalocal systemd-rc-local-generator[99800]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:46 np0005463759.novalocal systemd-sysv-generator[99803]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:46 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:46 np0005463759.novalocal sudo[99812]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmpjo9k2639/privsep.sock Sep 30 23:23:46 np0005463759.novalocal systemd[1]: Started Session c25 of User root. Sep 30 23:23:46 np0005463759.novalocal sudo[99812]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Sep 30 23:23:46 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:46 np0005463759.novalocal systemd-rc-local-generator[99836]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:46 np0005463759.novalocal systemd-sysv-generator[99841]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:46 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:47 np0005463759.novalocal runuser[99845]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:47 np0005463759.novalocal kernel: capability: warning: `privsep-helper' uses deprecated v2 capabilities in a way that may be insecure Sep 30 23:23:47 np0005463759.novalocal sudo[99812]: pam_unix(sudo:session): session closed for user root Sep 30 23:23:47 np0005463759.novalocal runuser[99845]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:47 np0005463759.novalocal runuser[99901]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:48 np0005463759.novalocal runuser[99901]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:48 np0005463759.novalocal runuser[99955]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:48 np0005463759.novalocal sudo[99972]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.namespace_cmd --privsep_sock_path /tmp/tmp6pcq82oe/privsep.sock Sep 30 23:23:48 np0005463759.novalocal systemd[1]: Started Session c26 of User root. Sep 30 23:23:48 np0005463759.novalocal sudo[99972]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Sep 30 23:23:49 np0005463759.novalocal runuser[99955]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:49 np0005463759.novalocal runuser[100011]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:23:49 np0005463759.novalocal sudo[99972]: pam_unix(sudo:session): session closed for user root Sep 30 23:23:49 np0005463759.novalocal runuser[100011]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:23:50 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:50 np0005463759.novalocal systemd-rc-local-generator[100094]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:50 np0005463759.novalocal systemd-sysv-generator[100097]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:50 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:50 np0005463759.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Sep 30 23:23:50 np0005463759.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Sep 30 23:23:51 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:51 np0005463759.novalocal systemd-sysv-generator[100130]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:51 np0005463759.novalocal systemd-rc-local-generator[100127]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:51 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:51 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:51 np0005463759.novalocal systemd-rc-local-generator[100156]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:51 np0005463759.novalocal systemd-sysv-generator[100160]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:51 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:52 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:52 np0005463759.novalocal systemd-rc-local-generator[100191]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:52 np0005463759.novalocal systemd-sysv-generator[100194]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:52 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:52 np0005463759.novalocal systemd[1]: Listening on libvirt locking daemon socket. Sep 30 23:23:52 np0005463759.novalocal systemd[1]: Listening on libvirt locking daemon admin socket. Sep 30 23:23:52 np0005463759.novalocal systemd[1]: Starting libvirt locking daemon... Sep 30 23:23:52 np0005463759.novalocal systemd[1]: Started libvirt locking daemon. Sep 30 23:23:53 np0005463759.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Deactivated successfully. Sep 30 23:23:53 np0005463759.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@1.service: Consumed 1.129s CPU time. Sep 30 23:23:53 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:53 np0005463759.novalocal systemd-sysv-generator[100229]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:53 np0005463759.novalocal systemd-rc-local-generator[100225]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:53 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:53 np0005463759.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Sep 30 23:23:53 np0005463759.novalocal systemd[1]: setroubleshootd.service: Consumed 1.133s CPU time. Sep 30 23:23:53 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:53 np0005463759.novalocal systemd-rc-local-generator[100252]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:53 np0005463759.novalocal systemd-sysv-generator[100257]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:53 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:54 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:54 np0005463759.novalocal systemd-sysv-generator[100290]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:54 np0005463759.novalocal systemd-rc-local-generator[100287]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:54 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:54 np0005463759.novalocal systemd[1]: Listening on libvirt logging daemon socket. Sep 30 23:23:54 np0005463759.novalocal systemd[1]: Listening on libvirt logging daemon admin socket. Sep 30 23:23:54 np0005463759.novalocal systemd[1]: Starting libvirt logging daemon... Sep 30 23:23:54 np0005463759.novalocal systemd[1]: Started libvirt logging daemon. Sep 30 23:23:54 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:54 np0005463759.novalocal systemd-rc-local-generator[100318]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:54 np0005463759.novalocal systemd-sysv-generator[100321]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:55 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:55 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:55 np0005463759.novalocal systemd-rc-local-generator[100347]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:55 np0005463759.novalocal systemd-sysv-generator[100351]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:55 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:55 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:56 np0005463759.novalocal systemd-rc-local-generator[100379]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:56 np0005463759.novalocal systemd-sysv-generator[100385]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:56 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:56 np0005463759.novalocal systemd[1]: Listening on libvirt secret daemon socket. Sep 30 23:23:56 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:56 np0005463759.novalocal systemd-sysv-generator[100421]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:56 np0005463759.novalocal systemd-rc-local-generator[100418]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:57 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:57 np0005463759.novalocal systemd[1]: Listening on libvirt nodedev daemon socket. Sep 30 23:23:57 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:57 np0005463759.novalocal systemd-rc-local-generator[100452]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:57 np0005463759.novalocal systemd-sysv-generator[100456]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:57 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:58 np0005463759.novalocal systemd[1]: Listening on libvirt QEMU daemon socket. Sep 30 23:23:58 np0005463759.novalocal systemd[1]: virtproxyd-tcp.socket: Deactivated successfully. Sep 30 23:23:58 np0005463759.novalocal systemd[1]: Closed libvirt proxy daemon non-TLS IP socket. Sep 30 23:23:58 np0005463759.novalocal systemd[1]: Stopping libvirt proxy daemon non-TLS IP socket... Sep 30 23:23:58 np0005463759.novalocal systemd[1]: virtproxyd.socket: Deactivated successfully. Sep 30 23:23:58 np0005463759.novalocal systemd[1]: Closed libvirt proxy daemon socket. Sep 30 23:23:58 np0005463759.novalocal systemd[1]: Stopping libvirt proxy daemon socket... Sep 30 23:23:58 np0005463759.novalocal systemd[1]: Listening on libvirt proxy daemon socket. Sep 30 23:23:58 np0005463759.novalocal systemd[1]: Listening on libvirt proxy daemon non-TLS IP socket. Sep 30 23:23:59 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:23:59 np0005463759.novalocal systemd-rc-local-generator[100491]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:23:59 np0005463759.novalocal systemd-sysv-generator[100496]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:23:59 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:23:59 np0005463759.novalocal systemd[1]: Listening on libvirt storage daemon socket. Sep 30 23:23:59 np0005463759.novalocal systemd[1]: Created slice Virtual Machine and Container Slice. Sep 30 23:23:59 np0005463759.novalocal systemd[1]: Listening on libvirt QEMU daemon admin socket. Sep 30 23:23:59 np0005463759.novalocal systemd[1]: Listening on libvirt QEMU daemon read-only socket. Sep 30 23:23:59 np0005463759.novalocal systemd[1]: Virtual Machine and Container Storage (Compatibility) was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Sep 30 23:23:59 np0005463759.novalocal systemd[1]: Starting Virtual Machine and Container Registration Service... Sep 30 23:23:59 np0005463759.novalocal systemd[1]: Started Virtual Machine and Container Registration Service. Sep 30 23:24:00 np0005463759.novalocal systemd[1]: Starting libvirt QEMU daemon... Sep 30 23:24:00 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:24:00 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:24:00 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:24:00 np0005463759.novalocal systemd[1]: Started libvirt QEMU daemon. Sep 30 23:24:00 np0005463759.novalocal virtqemud[100509]: libvirt version: 10.10.0, package: 15.el9 (builder@centos.org, 2025-08-18-13:22:20, ) Sep 30 23:24:00 np0005463759.novalocal virtqemud[100509]: hostname: np0005463759.novalocal Sep 30 23:24:00 np0005463759.novalocal virtqemud[100509]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Sep 30 23:24:00 np0005463759.novalocal virtqemud[100509]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Sep 30 23:24:00 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:00 np0005463759.novalocal systemd-rc-local-generator[100556]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:00 np0005463759.novalocal systemd-sysv-generator[100559]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:00 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:01 np0005463759.novalocal systemd[1]: Reached target libvirt guests shutdown target. Sep 30 23:24:01 np0005463759.novalocal systemd[1]: Starting libvirt guests suspend/resume service... Sep 30 23:24:01 np0005463759.novalocal systemd[1]: Finished libvirt guests suspend/resume service. Sep 30 23:24:01 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:01 np0005463759.novalocal systemd-rc-local-generator[100596]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:01 np0005463759.novalocal systemd-sysv-generator[100599]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:01 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:01 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:01 np0005463759.novalocal systemd-rc-local-generator[100624]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:01 np0005463759.novalocal systemd-sysv-generator[100627]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:01 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:01 np0005463759.novalocal sshd-session[100564]: Invalid user admin from 185.156.73.233 port 26302 Sep 30 23:24:02 np0005463759.novalocal sshd-session[100564]: Connection closed by invalid user admin 185.156.73.233 port 26302 [preauth] Sep 30 23:24:02 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:02 np0005463759.novalocal systemd-rc-local-generator[100660]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:02 np0005463759.novalocal systemd-sysv-generator[100664]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:02 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:03 np0005463759.novalocal systemd[1]: Started OpenStack Nova NoVNC Proxy Server. Sep 30 23:24:03 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:03 np0005463759.novalocal systemd-rc-local-generator[100691]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:03 np0005463759.novalocal systemd-sysv-generator[100697]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:03 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:03 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:03 np0005463759.novalocal systemd-rc-local-generator[100721]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:03 np0005463759.novalocal systemd-sysv-generator[100725]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:03 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:04 np0005463759.novalocal runuser[100731]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:24:04 np0005463759.novalocal runuser[100731]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:24:04 np0005463759.novalocal runuser[100783]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:24:05 np0005463759.novalocal runuser[100783]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:24:05 np0005463759.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Sep 30 23:24:05 np0005463759.novalocal runuser[100837]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:24:05 np0005463759.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Sep 30 23:24:06 np0005463759.novalocal runuser[100837]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:24:06 np0005463759.novalocal runuser[100892]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:24:06 np0005463759.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service. Sep 30 23:24:06 np0005463759.novalocal runuser[100892]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:24:07 np0005463759.novalocal setroubleshoot[100836]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l c304c811-900a-41cf-a805-183ffcb25884 Sep 30 23:24:07 np0005463759.novalocal setroubleshoot[100836]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Sep 30 23:24:07 np0005463759.novalocal setroubleshoot[100836]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 039ce429-955b-4e49-b646-f5fdb0cc350a Sep 30 23:24:07 np0005463759.novalocal setroubleshoot[100836]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Sep 30 23:24:07 np0005463759.novalocal setroubleshoot[100836]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 92192edd-35f0-4c49-b5e8-0b43d4adf83b Sep 30 23:24:07 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:07 np0005463759.novalocal setroubleshoot[100836]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Sep 30 23:24:07 np0005463759.novalocal setroubleshoot[100836]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 43360ec0-56a4-4af6-bfa9-4c7fe650f686 Sep 30 23:24:07 np0005463759.novalocal setroubleshoot[100836]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Sep 30 23:24:07 np0005463759.novalocal setroubleshoot[100836]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l 9176e069-e933-4c83-b0f9-0b20196d2b40 Sep 30 23:24:07 np0005463759.novalocal setroubleshoot[100836]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Sep 30 23:24:07 np0005463759.novalocal systemd-rc-local-generator[100983]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:07 np0005463759.novalocal systemd-sysv-generator[100986]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:07 np0005463759.novalocal setroubleshoot[100836]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l a2aeb75d-f06a-4956-8ff2-62cc3f0fb9c8 Sep 30 23:24:07 np0005463759.novalocal setroubleshoot[100836]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Sep 30 23:24:07 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:07 np0005463759.novalocal setroubleshoot[100836]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l d650db9f-7cbd-4654-be98-14c910ec25b8 Sep 30 23:24:07 np0005463759.novalocal setroubleshoot[100836]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Sep 30 23:24:07 np0005463759.novalocal setroubleshoot[100836]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l d3c773bf-b7ba-4dbb-bf41-138ffa783685 Sep 30 23:24:07 np0005463759.novalocal setroubleshoot[100836]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Sep 30 23:24:07 np0005463759.novalocal setroubleshoot[100836]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l 5a84059e-6a86-4c47-ba6e-0a8e953807bb Sep 30 23:24:07 np0005463759.novalocal setroubleshoot[100836]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Sep 30 23:24:07 np0005463759.novalocal setroubleshoot[100836]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l e7be439c-b044-4ffb-b231-9345cff28ccf Sep 30 23:24:07 np0005463759.novalocal setroubleshoot[100836]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Sep 30 23:24:07 np0005463759.novalocal setroubleshoot[100836]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l af8125a8-7072-4298-9d39-55bc0dceaa40 Sep 30 23:24:07 np0005463759.novalocal systemd[1]: Started OpenStack Octavia Health-Manager service. Sep 30 23:24:07 np0005463759.novalocal setroubleshoot[100836]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-novncproxy' --raw | audit2allow -M my-novanovncproxy # semodule -X 300 -i my-novanovncproxy.pp Sep 30 23:24:08 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:08 np0005463759.novalocal systemd-sysv-generator[101025]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:08 np0005463759.novalocal systemd-rc-local-generator[101022]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:08 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:08 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:08 np0005463759.novalocal systemd-rc-local-generator[101052]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:08 np0005463759.novalocal systemd-sysv-generator[101055]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:08 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:09 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:09 np0005463759.novalocal systemd-rc-local-generator[101082]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:09 np0005463759.novalocal systemd-sysv-generator[101085]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:09 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:09 np0005463759.novalocal systemd[1]: Started OpenStack Octavia Housekeeping service. Sep 30 23:24:09 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:09 np0005463759.novalocal systemd-sysv-generator[101118]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:09 np0005463759.novalocal systemd-rc-local-generator[101114]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:09 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:10 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:10 np0005463759.novalocal systemd-rc-local-generator[101144]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:10 np0005463759.novalocal systemd-sysv-generator[101147]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:10 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:10 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:10 np0005463759.novalocal systemd-sysv-generator[101179]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:10 np0005463759.novalocal systemd-rc-local-generator[101176]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:10 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:11 np0005463759.novalocal systemd[1]: Started OpenStack Octavia Driver Agent service. Sep 30 23:24:11 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:11 np0005463759.novalocal systemd-sysv-generator[101212]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:11 np0005463759.novalocal systemd-rc-local-generator[101209]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:11 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:11 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:11 np0005463759.novalocal systemd-sysv-generator[101242]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:11 np0005463759.novalocal systemd-rc-local-generator[101238]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:11 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:12 np0005463759.novalocal runuser[101247]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:24:12 np0005463759.novalocal runuser[101247]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:24:12 np0005463759.novalocal runuser[101302]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:24:13 np0005463759.novalocal runuser[101302]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:24:13 np0005463759.novalocal runuser[101394]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:24:14 np0005463759.novalocal runuser[101394]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:24:14 np0005463759.novalocal runuser[101447]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:24:15 np0005463759.novalocal runuser[101447]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:24:15 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:15 np0005463759.novalocal systemd-rc-local-generator[101541]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:15 np0005463759.novalocal systemd-sysv-generator[101545]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:15 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:16 np0005463759.novalocal systemd[1]: Started OpenStack Manila Scheduler. Sep 30 23:24:16 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:16 np0005463759.novalocal systemd-rc-local-generator[101569]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:16 np0005463759.novalocal systemd-sysv-generator[101574]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:16 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:16 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:16 np0005463759.novalocal systemd-sysv-generator[101605]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:16 np0005463759.novalocal systemd-rc-local-generator[101602]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:16 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:17 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:17 np0005463759.novalocal systemd-sysv-generator[101637]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:17 np0005463759.novalocal systemd-rc-local-generator[101634]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:17 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:17 np0005463759.novalocal systemd[1]: Started OpenStack Manila Share Service. Sep 30 23:24:17 np0005463759.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Deactivated successfully. Sep 30 23:24:17 np0005463759.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@2.service: Consumed 1.147s CPU time. Sep 30 23:24:17 np0005463759.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Sep 30 23:24:17 np0005463759.novalocal systemd[1]: setroubleshootd.service: Consumed 1.501s CPU time. Sep 30 23:24:18 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:18 np0005463759.novalocal systemd-rc-local-generator[101670]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:18 np0005463759.novalocal systemd-sysv-generator[101673]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:18 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:18 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:18 np0005463759.novalocal systemd-rc-local-generator[101702]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:18 np0005463759.novalocal systemd-sysv-generator[101705]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:18 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:19 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:19 np0005463759.novalocal systemd-rc-local-generator[101731]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:19 np0005463759.novalocal systemd-sysv-generator[101737]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:19 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:19 np0005463759.novalocal sudo[101741]: manila : PWD=/ ; USER=root ; COMMAND=/usr/bin/privsep-helper --config-file /usr/share/manila/manila-dist.conf --config-file /etc/manila/manila.conf --privsep_context manila.privsep.sys_admin_pctxt --privsep_sock_path /tmp/tmpmj1yxzj3/privsep.sock Sep 30 23:24:19 np0005463759.novalocal systemd[1]: Started Session c27 of User root. Sep 30 23:24:19 np0005463759.novalocal sudo[101741]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=978) Sep 30 23:24:19 np0005463759.novalocal systemd[1]: Started OpenStack Manila Data Server. Sep 30 23:24:19 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:19 np0005463759.novalocal systemd-sysv-generator[101772]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:19 np0005463759.novalocal systemd-rc-local-generator[101768]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:19 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:20 np0005463759.novalocal sudo[101741]: pam_unix(sudo:session): session closed for user root Sep 30 23:24:20 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:20 np0005463759.novalocal systemd-rc-local-generator[101799]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:20 np0005463759.novalocal systemd-sysv-generator[101806]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:20 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:21 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:21 np0005463759.novalocal systemd-rc-local-generator[101832]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:21 np0005463759.novalocal systemd-sysv-generator[101837]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:21 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:21 np0005463759.novalocal systemd[1]: Starting One-time temporary TLS key generation for httpd.service... Sep 30 23:24:21 np0005463759.novalocal systemd[1]: httpd-init.service: Deactivated successfully. Sep 30 23:24:21 np0005463759.novalocal systemd[1]: Finished One-time temporary TLS key generation for httpd.service. Sep 30 23:24:21 np0005463759.novalocal systemd[1]: Starting The Apache HTTP Server... Sep 30 23:24:22 np0005463759.novalocal python3[101848]: /usr/lib/python3.9/site-packages/django/conf/__init__.py:267: RemovedInDjango50Warning: The USE_L10N setting is deprecated. Starting with Django 5.0, localized formatting of data will always be enabled. For example Django will display numbers and dates using the format of the current locale. Sep 30 23:24:22 np0005463759.novalocal python3[101848]: warnings.warn(USE_L10N_DEPRECATED_MSG, RemovedInDjango50Warning) Sep 30 23:24:22 np0005463759.novalocal python3[101848]: /usr/lib/python3.9/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. Sep 30 23:24:22 np0005463759.novalocal python3[101848]: version_info = version.StrictVersion(__version__).version Sep 30 23:24:25 np0005463759.novalocal python3[101851]: /usr/lib/python3.9/site-packages/django/conf/__init__.py:267: RemovedInDjango50Warning: The USE_L10N setting is deprecated. Starting with Django 5.0, localized formatting of data will always be enabled. For example Django will display numbers and dates using the format of the current locale. Sep 30 23:24:25 np0005463759.novalocal python3[101851]: warnings.warn(USE_L10N_DEPRECATED_MSG, RemovedInDjango50Warning) Sep 30 23:24:26 np0005463759.novalocal python3[101851]: /usr/lib/python3.9/site-packages/debreach/__init__.py:6: DeprecationWarning: distutils Version classes are deprecated. Use packaging.version instead. Sep 30 23:24:26 np0005463759.novalocal python3[101851]: version_info = version.StrictVersion(__version__).version Sep 30 23:24:34 np0005463759.novalocal httpd[101861]: Server configured, listening on: ::1 port 9876, ... Sep 30 23:24:34 np0005463759.novalocal systemd[1]: Started The Apache HTTP Server. Sep 30 23:24:34 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:34 np0005463759.novalocal systemd-rc-local-generator[101970]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:34 np0005463759.novalocal systemd-sysv-generator[101973]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:34 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:34 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:24:35 np0005463759.novalocal systemd-rc-local-generator[102001]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:24:35 np0005463759.novalocal systemd-sysv-generator[102005]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:24:35 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:24:35 np0005463759.novalocal crontab[102009]: (root) REPLACE (keystone) Sep 30 23:24:38 np0005463759.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Sep 30 23:24:38 np0005463759.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Sep 30 23:24:39 np0005463759.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service. Sep 30 23:24:40 np0005463759.novalocal setroubleshoot[102013]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 540d75c5-b0c9-42ff-a775-b3eb6b4c7bc4 Sep 30 23:24:40 np0005463759.novalocal setroubleshoot[102013]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:24:40 np0005463759.novalocal setroubleshoot[102013]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). For complete SELinux messages run: sealert -l f3a44e9e-e16e-4724-ad50-9696f3868464 Sep 30 23:24:40 np0005463759.novalocal setroubleshoot[102013]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:24:40 np0005463759.novalocal setroubleshoot[102013]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). For complete SELinux messages run: sealert -l 376996dc-fd4f-4d5e-aad2-5f188b29a97d Sep 30 23:24:40 np0005463759.novalocal setroubleshoot[102013]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/keystone/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:24:40 np0005463759.novalocal setroubleshoot[102013]: failed to retrieve rpm info for path '/var/lib/keystone/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d': Sep 30 23:24:40 np0005463759.novalocal setroubleshoot[102013]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. For complete SELinux messages run: sealert -l fb9984c2-4074-4d1f-800e-83941ec1f1a1 Sep 30 23:24:40 np0005463759.novalocal setroubleshoot[102013]: SELinux is preventing /usr/sbin/httpd from write access on the file /var/lib/keystone/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:24:43 np0005463759.novalocal sshd-session[102031]: Invalid user superadmin from 192.227.153.63 port 55916 Sep 30 23:24:43 np0005463759.novalocal sshd-session[102031]: Received disconnect from 192.227.153.63 port 55916:11: Bye Bye [preauth] Sep 30 23:24:43 np0005463759.novalocal sshd-session[102031]: Disconnected from invalid user superadmin 192.227.153.63 port 55916 [preauth] Sep 30 23:24:50 np0005463759.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Deactivated successfully. Sep 30 23:24:50 np0005463759.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@3.service: Consumed 1.114s CPU time. Sep 30 23:24:50 np0005463759.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Sep 30 23:24:50 np0005463759.novalocal systemd[1]: setroubleshootd.service: Consumed 1.182s CPU time. Sep 30 23:25:03 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:25:03 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:25:03 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:25:09 np0005463759.novalocal sshd-session[102052]: Invalid user u1 from 154.92.109.196 port 3654 Sep 30 23:25:09 np0005463759.novalocal sshd-session[102052]: Received disconnect from 154.92.109.196 port 3654:11: Bye Bye [preauth] Sep 30 23:25:09 np0005463759.novalocal sshd-session[102052]: Disconnected from invalid user u1 154.92.109.196 port 3654 [preauth] Sep 30 23:25:11 np0005463759.novalocal sudo[102055]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:25:11 np0005463759.novalocal systemd[1]: Started Session c28 of User root. Sep 30 23:25:11 np0005463759.novalocal sudo[102055]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:25:11 np0005463759.novalocal octavia-health-manager[101188]: /usr/lib/python3.9/site-packages/octavia/db/repositories.py:1594: SAWarning: Coercing Subquery object into a select() for use in IN(); please pass a select() construct explicitly Sep 30 23:25:11 np0005463759.novalocal octavia-health-manager[101188]: self.model_class.amphora_id.in_(expired_ids_query) Sep 30 23:25:11 np0005463759.novalocal sudo[102055]: pam_unix(sudo:session): session closed for user root Sep 30 23:25:11 np0005463759.novalocal systemd[1]: session-c28.scope: Deactivated successfully. Sep 30 23:25:11 np0005463759.novalocal sudo[102061]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:25:11 np0005463759.novalocal systemd[1]: Started Session c29 of User root. Sep 30 23:25:11 np0005463759.novalocal sudo[102061]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:25:12 np0005463759.novalocal sudo[102061]: pam_unix(sudo:session): session closed for user root Sep 30 23:25:12 np0005463759.novalocal systemd[1]: session-c29.scope: Deactivated successfully. Sep 30 23:25:12 np0005463759.novalocal sudo[102065]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:25:12 np0005463759.novalocal systemd[1]: Started Session c30 of User root. Sep 30 23:25:12 np0005463759.novalocal sudo[102065]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:25:12 np0005463759.novalocal sudo[102065]: pam_unix(sudo:session): session closed for user root Sep 30 23:25:12 np0005463759.novalocal systemd[1]: session-c30.scope: Deactivated successfully. Sep 30 23:25:12 np0005463759.novalocal sudo[102069]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:25:12 np0005463759.novalocal systemd[1]: Started Session c31 of User root. Sep 30 23:25:12 np0005463759.novalocal sudo[102069]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:25:12 np0005463759.novalocal sudo[102069]: pam_unix(sudo:session): session closed for user root Sep 30 23:25:12 np0005463759.novalocal systemd[1]: session-c31.scope: Deactivated successfully. Sep 30 23:25:41 np0005463759.novalocal sshd-session[102130]: Received disconnect from 192.227.153.63 port 54924:11: Bye Bye [preauth] Sep 30 23:25:41 np0005463759.novalocal sshd-session[102130]: Disconnected from authenticating user root 192.227.153.63 port 54924 [preauth] Sep 30 23:25:48 np0005463759.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Sep 30 23:25:49 np0005463759.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Sep 30 23:25:49 np0005463759.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service. Sep 30 23:25:50 np0005463759.novalocal setroubleshoot[102138]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 7ca1de18-4ddb-4ba1-91b9-d9fa7124f756 Sep 30 23:25:50 np0005463759.novalocal setroubleshoot[102138]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Sep 30 23:25:50 np0005463759.novalocal setroubleshoot[102138]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 9c44a755-4ff8-44ad-a6c5-942b6b6c05ac Sep 30 23:25:50 np0005463759.novalocal setroubleshoot[102138]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Sep 30 23:25:50 np0005463759.novalocal setroubleshoot[102138]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 4f877ec7-1eff-40a7-b5a7-6fc3ad984c14 Sep 30 23:25:50 np0005463759.novalocal setroubleshoot[102138]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Sep 30 23:25:52 np0005463759.novalocal setroubleshoot[102138]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 7ca1de18-4ddb-4ba1-91b9-d9fa7124f756 Sep 30 23:25:52 np0005463759.novalocal setroubleshoot[102138]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Sep 30 23:25:52 np0005463759.novalocal setroubleshoot[102138]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 9c44a755-4ff8-44ad-a6c5-942b6b6c05ac Sep 30 23:25:52 np0005463759.novalocal setroubleshoot[102138]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Sep 30 23:25:53 np0005463759.novalocal setroubleshoot[102138]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 4f877ec7-1eff-40a7-b5a7-6fc3ad984c14 Sep 30 23:25:53 np0005463759.novalocal setroubleshoot[102138]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Sep 30 23:26:00 np0005463759.novalocal systemd[1]: virtqemud.service: Deactivated successfully. Sep 30 23:26:00 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:26:00 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:26:00 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:26:03 np0005463759.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Deactivated successfully. Sep 30 23:26:03 np0005463759.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Consumed 1.131s CPU time. Sep 30 23:26:03 np0005463759.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Sep 30 23:26:03 np0005463759.novalocal systemd[1]: setroubleshootd.service: Consumed 1.230s CPU time. Sep 30 23:26:11 np0005463759.novalocal sudo[102177]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:26:11 np0005463759.novalocal systemd[1]: Started Session c32 of User root. Sep 30 23:26:11 np0005463759.novalocal sudo[102177]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:11 np0005463759.novalocal sudo[102177]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:11 np0005463759.novalocal systemd[1]: session-c32.scope: Deactivated successfully. Sep 30 23:26:11 np0005463759.novalocal sudo[102181]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:26:11 np0005463759.novalocal systemd[1]: Started Session c33 of User root. Sep 30 23:26:11 np0005463759.novalocal sudo[102181]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:12 np0005463759.novalocal sudo[102181]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:12 np0005463759.novalocal systemd[1]: session-c33.scope: Deactivated successfully. Sep 30 23:26:12 np0005463759.novalocal sudo[102186]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:26:12 np0005463759.novalocal systemd[1]: Started Session c34 of User root. Sep 30 23:26:12 np0005463759.novalocal sudo[102186]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:12 np0005463759.novalocal sudo[102186]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:12 np0005463759.novalocal systemd[1]: session-c34.scope: Deactivated successfully. Sep 30 23:26:12 np0005463759.novalocal sudo[102190]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:26:12 np0005463759.novalocal systemd[1]: Started Session c35 of User root. Sep 30 23:26:12 np0005463759.novalocal sudo[102190]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:12 np0005463759.novalocal sudo[102190]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:12 np0005463759.novalocal systemd[1]: session-c35.scope: Deactivated successfully. Sep 30 23:26:17 np0005463759.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Sep 30 23:26:17 np0005463759.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Sep 30 23:26:18 np0005463759.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service. Sep 30 23:26:19 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 7ca1de18-4ddb-4ba1-91b9-d9fa7124f756 Sep 30 23:26:19 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Sep 30 23:26:19 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 9c44a755-4ff8-44ad-a6c5-942b6b6c05ac Sep 30 23:26:19 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Sep 30 23:26:19 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 4f877ec7-1eff-40a7-b5a7-6fc3ad984c14 Sep 30 23:26:19 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Sep 30 23:26:19 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l 7ca1de18-4ddb-4ba1-91b9-d9fa7124f756 Sep 30 23:26:19 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Sep 30 23:26:19 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 9c44a755-4ff8-44ad-a6c5-942b6b6c05ac Sep 30 23:26:19 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Sep 30 23:26:20 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 4f877ec7-1eff-40a7-b5a7-6fc3ad984c14 Sep 30 23:26:20 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Sep 30 23:26:23 np0005463759.novalocal sudo[102265]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29 cinder-volumes/cinder-volumes-pool Sep 30 23:26:23 np0005463759.novalocal systemd[1]: Started Session c36 of User root. Sep 30 23:26:23 np0005463759.novalocal sudo[102265]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:24 np0005463759.novalocal dmeventd[99059]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool. Sep 30 23:26:25 np0005463759.novalocal dmeventd[99059]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Sep 30 23:26:25 np0005463759.novalocal lvm[102321]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:26:25 np0005463759.novalocal lvm[102321]: VG cinder-volumes finished Sep 30 23:26:25 np0005463759.novalocal sudo[102265]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:25 np0005463759.novalocal systemd[1]: session-c36.scope: Deactivated successfully. Sep 30 23:26:27 np0005463759.novalocal sudo[102323]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf privsep-helper --config-file /etc/glance/glance-image-import.conf --config-file /etc/glance/glance-api.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmpaozcovh2/privsep.sock Sep 30 23:26:27 np0005463759.novalocal systemd[1]: Started Session c37 of User root. Sep 30 23:26:27 np0005463759.novalocal sudo[102323]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Sep 30 23:26:27 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 0fa462a0-ae8a-453c-841b-e4907d894c99 Sep 30 23:26:27 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Sep 30 23:26:27 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 10893932-1eb7-4f70-b9d7-eccc653d1342 Sep 30 23:26:27 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Sep 30 23:26:27 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l fb66315e-6430-4cfe-b55c-969a50e95184 Sep 30 23:26:27 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Sep 30 23:26:27 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l a806d9fe-06b1-44be-8ccb-027d4929151a Sep 30 23:26:27 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Sep 30 23:26:27 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 8ef2e192-5a7e-47b0-8e0d-9e4d5e99b822 Sep 30 23:26:27 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Sep 30 23:26:27 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l e25a5ae4-1d82-49d9-8726-90c4054e4e6a Sep 30 23:26:27 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Sep 30 23:26:27 np0005463759.novalocal sudo[102323]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 7436169c-fb8b-473d-8c3b-731daff8d7aa Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 0fd29c57-b8f3-4f59-b7df-4b8d68a9b941 Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:28 np0005463759.novalocal sudo[102353]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29 Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: failed to retrieve rpm info for path '/dev/vda1': Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l ab9dcf13-2124-489d-932d-8c317adc82db Sep 30 23:26:28 np0005463759.novalocal systemd[1]: Started Session c38 of User root. Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 576dcadc-f36e-402a-90af-04162b864cde Sep 30 23:26:28 np0005463759.novalocal sudo[102353]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 7ff0f317-843f-4f45-9d09-c35bfbe4940b Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 2f10addc-fd64-4754-839e-f6e74c8ef93e Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l 8846eff9-9428-413e-95d2-a061ed97c667 Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l a9465fa8-2490-4ce9-80fc-eba6fd6955a8 Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l a8912153-569e-4e5f-b6c7-783a75ab5df7 Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 8f59ee38-3e4b-429f-91e6-a1adeacc5b0d Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-1KTy3O. For complete SELinux messages run: sealert -l f995e1c6-bebe-4efd-846c-af9b324743bc Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-1KTy3O. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read write open access on the blkid.tab-1KTy3O file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-1KTy3O. For complete SELinux messages run: sealert -l 18699a01-aed8-442c-bfe9-29ae2aaef38c Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-1KTy3O. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-1KTy3O file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l d49b0236-5832-482d-a75a-606a1d248aa5 Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 33d3bb15-b9f5-49fc-9342-699f0d4d5277 Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l f4990b95-9305-46e0-ad7b-62c5fc2ceed9 Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 3b44b39a-09c5-4320-aeea-6d7064ab4147 Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l 5a3ef010-eeb5-45a4-bd65-c7ebd711b4c0 Sep 30 23:26:28 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:28 np0005463759.novalocal sudo[102353]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:28 np0005463759.novalocal systemd[1]: session-c38.scope: Deactivated successfully. Sep 30 23:26:28 np0005463759.novalocal sudo[102358]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29 iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29 tr2rMhvP7n8Qg2986JFx e3SNTBVxTo94GfN9 False -p3260 -a::1 Sep 30 23:26:28 np0005463759.novalocal systemd[1]: Started Session c39 of User root. Sep 30 23:26:28 np0005463759.novalocal sudo[102358]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:29 np0005463759.novalocal sudo[102358]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:29 np0005463759.novalocal systemd[1]: session-c39.scope: Deactivated successfully. Sep 30 23:26:29 np0005463759.novalocal sudo[102375]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Sep 30 23:26:29 np0005463759.novalocal systemd[1]: Started Session c40 of User root. Sep 30 23:26:29 np0005463759.novalocal sudo[102375]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:30 np0005463759.novalocal sudo[102375]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:30 np0005463759.novalocal systemd[1]: session-c40.scope: Deactivated successfully. Sep 30 23:26:30 np0005463759.novalocal sudo[102380]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Sep 30 23:26:30 np0005463759.novalocal systemd[1]: Started Session c41 of User root. Sep 30 23:26:30 np0005463759.novalocal sudo[102380]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:30 np0005463759.novalocal sudo[102380]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:30 np0005463759.novalocal systemd[1]: session-c41.scope: Deactivated successfully. Sep 30 23:26:30 np0005463759.novalocal sudo[102385]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29 tr2rMhvP7n8Qg2986JFx e3SNTBVxTo94GfN9 iqn.1994-05.com.redhat:e8763877e0f9 Sep 30 23:26:30 np0005463759.novalocal systemd[1]: Started Session c42 of User root. Sep 30 23:26:30 np0005463759.novalocal sudo[102385]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:31 np0005463759.novalocal sudo[102385]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:31 np0005463759.novalocal systemd[1]: session-c42.scope: Deactivated successfully. Sep 30 23:26:31 np0005463759.novalocal sudo[102390]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Sep 30 23:26:31 np0005463759.novalocal systemd[1]: Started Session c43 of User root. Sep 30 23:26:31 np0005463759.novalocal sudo[102390]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:31 np0005463759.novalocal sudo[102390]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:31 np0005463759.novalocal systemd[1]: session-c43.scope: Deactivated successfully. Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 68adcfc5-43ec-40cc-902e-b1f995a405f8 Sep 30 23:26:32 np0005463759.novalocal kernel: iscsi: registered transport (tcp) Sep 30 23:26:32 np0005463759.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Sep 30 23:26:32 np0005463759.novalocal iscsid[83869]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29, portal: ::1,3260] through [iface: default] is operational now Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l da7dd66e-7faa-42fd-92d9-720ccdc29de4 Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:32 np0005463759.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Sep 30 23:26:32 np0005463759.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Sep 30 23:26:32 np0005463759.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405c8c5ba0451f24aeabb22c4e12 port group 0 rel port 1 Sep 30 23:26:32 np0005463759.novalocal kernel: scsi 2:0:0:0: Attached scsi generic sg1 type 0 Sep 30 23:26:32 np0005463759.novalocal kernel: scsi 2:0:0:0: alua: transition timeout set to 60 seconds Sep 30 23:26:32 np0005463759.novalocal kernel: scsi 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 646beed4-88ff-466c-8a9e-b445068010a7 Sep 30 23:26:32 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Sep 30 23:26:32 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Sep 30 23:26:32 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Sep 30 23:26:32 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Sep 30 23:26:32 np0005463759.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Sep 30 23:26:32 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Sep 30 23:26:32 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Sep 30 23:26:32 np0005463759.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 7869df62-01da-440e-b5c8-9bea0427369d Sep 30 23:26:32 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 8140d595-8e3f-4d5f-965d-5e80f8500ec2 Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 31b06990-2e65-4b38-976e-9edcd322510e Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 5ccb5141-5bba-4aa2-9795-445150e3cc5e Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l d9a63156-dcd5-4777-8e42-13192fa4522b Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 0dad90c3-a224-48d6-80dd-ec2e35760506 Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 5a451f8c-50ab-4c93-a39f-9037908da70d Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l decbbc35-497f-44da-bc7f-a20b330ff77f Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l a31f0e7c-9988-4f44-9d1a-be88b259268c Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 6609219a-8381-494b-91a0-f5483b146663 Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29/::1,3260. For complete SELinux messages run: sealert -l d91998f7-e5ad-4d19-b705-ba30001134de Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29/::1,3260. For complete SELinux messages run: sealert -l 9d48f760-6bcd-4191-a608-77ebf9b3d54a Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l d004ae25-306f-4132-91d1-a215bb3afc76 Sep 30 23:26:32 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:33 np0005463759.novalocal setroubleshoot[102235]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Sep 30 23:26:33 np0005463759.novalocal sudo[102444]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Sep 30 23:26:33 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 9361f8f1-6e4b-4da3-9d0e-b59675317202 Sep 30 23:26:33 np0005463759.novalocal systemd[1]: Started Session c44 of User root. Sep 30 23:26:33 np0005463759.novalocal sudo[102444]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Sep 30 23:26:33 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Sep 30 23:26:33 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 9c3ce059-ab5c-4198-9cf2-bb39d5e83159 Sep 30 23:26:33 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Sep 30 23:26:33 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l cb245f10-87ac-463d-888c-082df616fb86 Sep 30 23:26:33 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Sep 30 23:26:33 np0005463759.novalocal setroubleshoot[102235]: failed to retrieve rpm info for path '/dev/sda': Sep 30 23:26:33 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l ab9dcf13-2124-489d-932d-8c317adc82db Sep 30 23:26:33 np0005463759.novalocal sudo[102444]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:33 np0005463759.novalocal systemd[1]: session-c44.scope: Deactivated successfully. Sep 30 23:26:34 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:34 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 0fa462a0-ae8a-453c-841b-e4907d894c99 Sep 30 23:26:34 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Sep 30 23:26:34 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 10893932-1eb7-4f70-b9d7-eccc653d1342 Sep 30 23:26:34 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Sep 30 23:26:34 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l fb66315e-6430-4cfe-b55c-969a50e95184 Sep 30 23:26:34 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Sep 30 23:26:34 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l a806d9fe-06b1-44be-8ccb-027d4929151a Sep 30 23:26:34 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Sep 30 23:26:34 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 8ef2e192-5a7e-47b0-8e0d-9e4d5e99b822 Sep 30 23:26:34 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Sep 30 23:26:34 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l e25a5ae4-1d82-49d9-8726-90c4054e4e6a Sep 30 23:26:34 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Sep 30 23:26:34 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l ab9dcf13-2124-489d-932d-8c317adc82db Sep 30 23:26:34 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:34 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 944abb7f-6abd-4763-9953-7f99bd756a8f Sep 30 23:26:34 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Sep 30 23:26:34 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l 4a781110-14a8-45f6-baff-1855f4202b27 Sep 30 23:26:34 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:26:34 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 7ff0f317-843f-4f45-9d09-c35bfbe4940b Sep 30 23:26:34 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:34 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 2f10addc-fd64-4754-839e-f6e74c8ef93e Sep 30 23:26:34 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:34 np0005463759.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Sep 30 23:26:35 np0005463759.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Sep 30 23:26:35 np0005463759.novalocal kernel: GPT:229375 != 2097151 Sep 30 23:26:35 np0005463759.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Sep 30 23:26:35 np0005463759.novalocal kernel: GPT:229375 != 2097151 Sep 30 23:26:35 np0005463759.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Sep 30 23:26:35 np0005463759.novalocal kernel: sda: sda1 sda15 Sep 30 23:26:35 np0005463759.novalocal sudo[102459]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Sep 30 23:26:35 np0005463759.novalocal systemd[1]: Started Session c45 of User root. Sep 30 23:26:35 np0005463759.novalocal sudo[102459]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Sep 30 23:26:35 np0005463759.novalocal sudo[102459]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:35 np0005463759.novalocal systemd[1]: session-c45.scope: Deactivated successfully. Sep 30 23:26:35 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 68adcfc5-43ec-40cc-902e-b1f995a405f8 Sep 30 23:26:35 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Sep 30 23:26:35 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:35 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l 5ccb5141-5bba-4aa2-9795-445150e3cc5e Sep 30 23:26:35 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:35 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29/::1,3260. For complete SELinux messages run: sealert -l 9d48f760-6bcd-4191-a608-77ebf9b3d54a Sep 30 23:26:35 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:35 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l da7dd66e-7faa-42fd-92d9-720ccdc29de4 Sep 30 23:26:35 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:35 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 646beed4-88ff-466c-8a9e-b445068010a7 Sep 30 23:26:35 np0005463759.novalocal kernel: scsi 2:0:0:0: alua: Detached Sep 30 23:26:35 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:35 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 7869df62-01da-440e-b5c8-9bea0427369d Sep 30 23:26:35 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:35 np0005463759.novalocal iscsid[83869]: iscsid: Connection1:0 to [target: iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29, portal: ::1,3260] through [iface: default] is shutdown. Sep 30 23:26:35 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 8140d595-8e3f-4d5f-965d-5e80f8500ec2 Sep 30 23:26:35 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:35 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 31b06990-2e65-4b38-976e-9edcd322510e Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:36 np0005463759.novalocal sshd-session[102455]: Received disconnect from 218.51.148.194 port 33948:11: Bye Bye [preauth] Sep 30 23:26:36 np0005463759.novalocal sshd-session[102455]: Disconnected from authenticating user root 218.51.148.194 port 33948 [preauth] Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l d004ae25-306f-4132-91d1-a215bb3afc76 Sep 30 23:26:36 np0005463759.novalocal sudo[102501]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29 iqn.1994-05.com.redhat:e8763877e0f9 Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29/::1,3260. For complete SELinux messages run: sealert -l ef64128a-6e32-49c1-8089-58abc0cfa5f6 Sep 30 23:26:36 np0005463759.novalocal systemd[1]: Started Session c46 of User root. Sep 30 23:26:36 np0005463759.novalocal sudo[102501]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l d9a63156-dcd5-4777-8e42-13192fa4522b Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 0dad90c3-a224-48d6-80dd-ec2e35760506 Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 42304c26-5652-4ac0-9fb6-6b90d670ce35 Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l a09bd0dd-8a49-4d92-8acc-4e8b275a5b3e Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 02e6326e-8615-4774-a4f7-6590a91ff889 Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 576dcadc-f36e-402a-90af-04162b864cde Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 76d0e081-39d2-4c13-9e4e-9d2015884271 Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29. For complete SELinux messages run: sealert -l 5a451f8c-50ab-4c93-a39f-9037908da70d Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29 default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l 91938296-bf27-47b7-ac35-cf8431b893ed Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 7656fc14-08fc-49e9-a74b-cd224da736c7 Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29. For complete SELinux messages run: sealert -l 9327697d-a860-4a3f-ab0f-bd66008ae83d Sep 30 23:26:36 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:36 np0005463759.novalocal sudo[102501]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:36 np0005463759.novalocal systemd[1]: session-c46.scope: Deactivated successfully. Sep 30 23:26:36 np0005463759.novalocal sudo[102511]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Sep 30 23:26:36 np0005463759.novalocal systemd[1]: Started Session c47 of User root. Sep 30 23:26:36 np0005463759.novalocal sudo[102511]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:37 np0005463759.novalocal sudo[102511]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:37 np0005463759.novalocal systemd[1]: session-c47.scope: Deactivated successfully. Sep 30 23:26:37 np0005463759.novalocal sudo[102516]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Sep 30 23:26:37 np0005463759.novalocal systemd[1]: Started Session c48 of User root. Sep 30 23:26:37 np0005463759.novalocal sudo[102516]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:37 np0005463759.novalocal sudo[102516]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:37 np0005463759.novalocal systemd[1]: session-c48.scope: Deactivated successfully. Sep 30 23:26:37 np0005463759.novalocal sudo[102521]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29 Sep 30 23:26:37 np0005463759.novalocal systemd[1]: Started Session c49 of User root. Sep 30 23:26:37 np0005463759.novalocal sudo[102521]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:38 np0005463759.novalocal sudo[102521]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:38 np0005463759.novalocal systemd[1]: session-c49.scope: Deactivated successfully. Sep 30 23:26:38 np0005463759.novalocal sudo[102526]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Sep 30 23:26:38 np0005463759.novalocal systemd[1]: Started Session c50 of User root. Sep 30 23:26:38 np0005463759.novalocal sudo[102526]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:38 np0005463759.novalocal sudo[102526]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:38 np0005463759.novalocal systemd[1]: session-c50.scope: Deactivated successfully. Sep 30 23:26:40 np0005463759.novalocal sshd-session[102532]: Invalid user ubuntu from 192.227.153.63 port 54288 Sep 30 23:26:40 np0005463759.novalocal sshd-session[102532]: Received disconnect from 192.227.153.63 port 54288:11: Bye Bye [preauth] Sep 30 23:26:40 np0005463759.novalocal sshd-session[102532]: Disconnected from invalid user ubuntu 192.227.153.63 port 54288 [preauth] Sep 30 23:26:43 np0005463759.novalocal sudo[102537]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-c8878dbc-3809-451d-bf98-9f26248bb148 cinder-volumes/cinder-volumes-pool Sep 30 23:26:43 np0005463759.novalocal systemd[1]: Started Session c51 of User root. Sep 30 23:26:43 np0005463759.novalocal sudo[102537]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:43 np0005463759.novalocal lvm[102548]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:26:43 np0005463759.novalocal lvm[102548]: VG cinder-volumes finished Sep 30 23:26:43 np0005463759.novalocal sudo[102537]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:43 np0005463759.novalocal systemd[1]: session-c51.scope: Deactivated successfully. Sep 30 23:26:44 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 42d75745-bc54-4888-81eb-cac32a47a902 Sep 30 23:26:44 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:44 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 4f33bdc6-3fe8-448c-80e1-38b9c56ed4e7 Sep 30 23:26:44 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:44 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l ab9dcf13-2124-489d-932d-8c317adc82db Sep 30 23:26:44 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:44 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 576dcadc-f36e-402a-90af-04162b864cde Sep 30 23:26:44 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:45 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 7ff0f317-843f-4f45-9d09-c35bfbe4940b Sep 30 23:26:45 np0005463759.novalocal sudo[102563]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-c8878dbc-3809-451d-bf98-9f26248bb148 Sep 30 23:26:45 np0005463759.novalocal systemd[1]: Started Session c52 of User root. Sep 30 23:26:45 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:45 np0005463759.novalocal sudo[102563]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:45 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 2f10addc-fd64-4754-839e-f6e74c8ef93e Sep 30 23:26:45 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:45 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l ce3d3faf-569f-4f19-ae62-a7cdcf777bf8 Sep 30 23:26:45 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:45 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l a9465fa8-2490-4ce9-80fc-eba6fd6955a8 Sep 30 23:26:45 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:45 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l a8912153-569e-4e5f-b6c7-783a75ab5df7 Sep 30 23:26:45 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:45 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 8f59ee38-3e4b-429f-91e6-a1adeacc5b0d Sep 30 23:26:45 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:45 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-djAVWc. For complete SELinux messages run: sealert -l 18699a01-aed8-442c-bfe9-29ae2aaef38c Sep 30 23:26:45 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-djAVWc. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-djAVWc file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:45 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l d49b0236-5832-482d-a75a-606a1d248aa5 Sep 30 23:26:45 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:45 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 5a3ef010-eeb5-45a4-bd65-c7ebd711b4c0 Sep 30 23:26:45 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. blkid.tab.old default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v blkid.tab.old ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:45 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l af2f9477-99f1-424b-b5f9-a05d900474e8 Sep 30 23:26:45 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:45 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 3b44b39a-09c5-4320-aeea-6d7064ab4147 Sep 30 23:26:45 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:45 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l 33d3bb15-b9f5-49fc-9342-699f0d4d5277 Sep 30 23:26:45 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:45 np0005463759.novalocal sudo[102563]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:45 np0005463759.novalocal systemd[1]: session-c52.scope: Deactivated successfully. Sep 30 23:26:45 np0005463759.novalocal sudo[102567]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-c8878dbc-3809-451d-bf98-9f26248bb148 iqn.2010-10.org.openstack:volume-c8878dbc-3809-451d-bf98-9f26248bb148 jTw2vZYFS2QanGs4nYRM P6dE7YTjPVDsv7ry False -p3260 -a::1 Sep 30 23:26:45 np0005463759.novalocal systemd[1]: Started Session c53 of User root. Sep 30 23:26:45 np0005463759.novalocal sudo[102567]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:45 np0005463759.novalocal sudo[102567]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:45 np0005463759.novalocal systemd[1]: session-c53.scope: Deactivated successfully. Sep 30 23:26:45 np0005463759.novalocal sudo[102573]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Sep 30 23:26:46 np0005463759.novalocal systemd[1]: Started Session c54 of User root. Sep 30 23:26:46 np0005463759.novalocal sudo[102573]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:46 np0005463759.novalocal sudo[102573]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:46 np0005463759.novalocal systemd[1]: session-c54.scope: Deactivated successfully. Sep 30 23:26:46 np0005463759.novalocal sudo[102578]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Sep 30 23:26:46 np0005463759.novalocal systemd[1]: Started Session c55 of User root. Sep 30 23:26:46 np0005463759.novalocal sudo[102578]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:47 np0005463759.novalocal sudo[102578]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:47 np0005463759.novalocal systemd[1]: session-c55.scope: Deactivated successfully. Sep 30 23:26:47 np0005463759.novalocal sudo[102584]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-c8878dbc-3809-451d-bf98-9f26248bb148 jTw2vZYFS2QanGs4nYRM P6dE7YTjPVDsv7ry iqn.1994-05.com.redhat:e8763877e0f9 Sep 30 23:26:47 np0005463759.novalocal systemd[1]: Started Session c56 of User root. Sep 30 23:26:47 np0005463759.novalocal sudo[102584]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:47 np0005463759.novalocal sudo[102584]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:47 np0005463759.novalocal systemd[1]: session-c56.scope: Deactivated successfully. Sep 30 23:26:47 np0005463759.novalocal sudo[102589]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Sep 30 23:26:47 np0005463759.novalocal systemd[1]: Started Session c57 of User root. Sep 30 23:26:47 np0005463759.novalocal sudo[102589]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:48 np0005463759.novalocal sudo[102589]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:48 np0005463759.novalocal systemd[1]: session-c57.scope: Deactivated successfully. Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 68adcfc5-43ec-40cc-902e-b1f995a405f8 Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:48 np0005463759.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Sep 30 23:26:48 np0005463759.novalocal iscsid[83869]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-c8878dbc-3809-451d-bf98-9f26248bb148, portal: ::1,3260] through [iface: default] is operational now Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l da7dd66e-7faa-42fd-92d9-720ccdc29de4 Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:48 np0005463759.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Sep 30 23:26:48 np0005463759.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Sep 30 23:26:48 np0005463759.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405b550c78f2e57418fa750e271b port group 0 rel port 1 Sep 30 23:26:48 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Sep 30 23:26:48 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Sep 30 23:26:48 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Sep 30 23:26:48 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Sep 30 23:26:48 np0005463759.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Sep 30 23:26:48 np0005463759.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Sep 30 23:26:48 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Sep 30 23:26:48 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Sep 30 23:26:48 np0005463759.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 646beed4-88ff-466c-8a9e-b445068010a7 Sep 30 23:26:48 np0005463759.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Sep 30 23:26:48 np0005463759.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Sep 30 23:26:48 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 7869df62-01da-440e-b5c8-9bea0427369d Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 8140d595-8e3f-4d5f-965d-5e80f8500ec2 Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 31b06990-2e65-4b38-976e-9edcd322510e Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 5ccb5141-5bba-4aa2-9795-445150e3cc5e Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l d9a63156-dcd5-4777-8e42-13192fa4522b Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 0dad90c3-a224-48d6-80dd-ec2e35760506 Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 5a451f8c-50ab-4c93-a39f-9037908da70d Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l decbbc35-497f-44da-bc7f-a20b330ff77f Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l a31f0e7c-9988-4f44-9d1a-be88b259268c Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 6609219a-8381-494b-91a0-f5483b146663 Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c8878dbc-3809-451d-bf98-9f26248bb148/::1,3260. For complete SELinux messages run: sealert -l d91998f7-e5ad-4d19-b705-ba30001134de Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c8878dbc-3809-451d-bf98-9f26248bb148/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c8878dbc-3809-451d-bf98-9f26248bb148/::1,3260. For complete SELinux messages run: sealert -l 9d48f760-6bcd-4191-a608-77ebf9b3d54a Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c8878dbc-3809-451d-bf98-9f26248bb148/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l d004ae25-306f-4132-91d1-a215bb3afc76 Sep 30 23:26:48 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:49 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 9361f8f1-6e4b-4da3-9d0e-b59675317202 Sep 30 23:26:49 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Sep 30 23:26:49 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 9c3ce059-ab5c-4198-9cf2-bb39d5e83159 Sep 30 23:26:49 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Sep 30 23:26:49 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l cb245f10-87ac-463d-888c-082df616fb86 Sep 30 23:26:49 np0005463759.novalocal sudo[102639]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Sep 30 23:26:49 np0005463759.novalocal systemd[1]: Started Session c58 of User root. Sep 30 23:26:49 np0005463759.novalocal sudo[102639]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Sep 30 23:26:49 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Sep 30 23:26:49 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l 292f1cb0-af4e-40df-9f44-4b55b4dd3b4e Sep 30 23:26:49 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Sep 30 23:26:49 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 10893932-1eb7-4f70-b9d7-eccc653d1342 Sep 30 23:26:49 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Sep 30 23:26:49 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l fb66315e-6430-4cfe-b55c-969a50e95184 Sep 30 23:26:49 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Sep 30 23:26:49 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l a806d9fe-06b1-44be-8ccb-027d4929151a Sep 30 23:26:50 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Sep 30 23:26:50 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 8ef2e192-5a7e-47b0-8e0d-9e4d5e99b822 Sep 30 23:26:50 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Sep 30 23:26:50 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l e25a5ae4-1d82-49d9-8726-90c4054e4e6a Sep 30 23:26:50 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Sep 30 23:26:50 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l ab9dcf13-2124-489d-932d-8c317adc82db Sep 30 23:26:50 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:50 np0005463759.novalocal sudo[102639]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:50 np0005463759.novalocal systemd[1]: session-c58.scope: Deactivated successfully. Sep 30 23:26:50 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 944abb7f-6abd-4763-9953-7f99bd756a8f Sep 30 23:26:50 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Sep 30 23:26:50 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l 4a781110-14a8-45f6-baff-1855f4202b27 Sep 30 23:26:50 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:26:50 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 7ff0f317-843f-4f45-9d09-c35bfbe4940b Sep 30 23:26:50 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:51 np0005463759.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Sep 30 23:26:51 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 2f10addc-fd64-4754-839e-f6e74c8ef93e Sep 30 23:26:51 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:51 np0005463759.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Sep 30 23:26:51 np0005463759.novalocal kernel: GPT:229375 != 2097151 Sep 30 23:26:51 np0005463759.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Sep 30 23:26:51 np0005463759.novalocal kernel: GPT:229375 != 2097151 Sep 30 23:26:51 np0005463759.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Sep 30 23:26:51 np0005463759.novalocal kernel: sda: sda1 sda15 Sep 30 23:26:51 np0005463759.novalocal sudo[102646]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Sep 30 23:26:51 np0005463759.novalocal systemd[1]: Started Session c59 of User root. Sep 30 23:26:51 np0005463759.novalocal sudo[102646]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Sep 30 23:26:51 np0005463759.novalocal sudo[102646]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:51 np0005463759.novalocal systemd[1]: session-c59.scope: Deactivated successfully. Sep 30 23:26:51 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 68adcfc5-43ec-40cc-902e-b1f995a405f8 Sep 30 23:26:51 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:51 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Sep 30 23:26:51 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l 5ccb5141-5bba-4aa2-9795-445150e3cc5e Sep 30 23:26:51 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:51 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 7869df62-01da-440e-b5c8-9bea0427369d Sep 30 23:26:51 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:51 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 8140d595-8e3f-4d5f-965d-5e80f8500ec2 Sep 30 23:26:51 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:51 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l d9a63156-dcd5-4777-8e42-13192fa4522b Sep 30 23:26:51 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:51 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 42304c26-5652-4ac0-9fb6-6b90d670ce35 Sep 30 23:26:51 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Sep 30 23:26:51 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l a09bd0dd-8a49-4d92-8acc-4e8b275a5b3e Sep 30 23:26:51 np0005463759.novalocal kernel: scsi 2:0:0:0: alua: Detached Sep 30 23:26:51 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Sep 30 23:26:51 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 02e6326e-8615-4774-a4f7-6590a91ff889 Sep 30 23:26:51 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Sep 30 23:26:51 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 576dcadc-f36e-402a-90af-04162b864cde Sep 30 23:26:51 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:26:51 np0005463759.novalocal iscsid[83869]: iscsid: Connection2:0 to [target: iqn.2010-10.org.openstack:volume-c8878dbc-3809-451d-bf98-9f26248bb148, portal: ::1,3260] through [iface: default] is shutdown. Sep 30 23:26:52 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l cb245f10-87ac-463d-888c-082df616fb86 Sep 30 23:26:52 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Sep 30 23:26:52 np0005463759.novalocal sudo[102687]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-c8878dbc-3809-451d-bf98-9f26248bb148 iqn.1994-05.com.redhat:e8763877e0f9 Sep 30 23:26:52 np0005463759.novalocal systemd[1]: Started Session c60 of User root. Sep 30 23:26:52 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l da7dd66e-7faa-42fd-92d9-720ccdc29de4 Sep 30 23:26:52 np0005463759.novalocal sudo[102687]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:52 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:52 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 646beed4-88ff-466c-8a9e-b445068010a7 Sep 30 23:26:52 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:52 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 31b06990-2e65-4b38-976e-9edcd322510e Sep 30 23:26:52 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:52 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c8878dbc-3809-451d-bf98-9f26248bb148/::1,3260. For complete SELinux messages run: sealert -l 9d48f760-6bcd-4191-a608-77ebf9b3d54a Sep 30 23:26:52 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c8878dbc-3809-451d-bf98-9f26248bb148/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:52 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l d004ae25-306f-4132-91d1-a215bb3afc76 Sep 30 23:26:52 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:52 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c8878dbc-3809-451d-bf98-9f26248bb148/::1,3260. For complete SELinux messages run: sealert -l ef64128a-6e32-49c1-8089-58abc0cfa5f6 Sep 30 23:26:52 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-c8878dbc-3809-451d-bf98-9f26248bb148/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:52 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 76d0e081-39d2-4c13-9e4e-9d2015884271 Sep 30 23:26:52 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:52 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 0dad90c3-a224-48d6-80dd-ec2e35760506 Sep 30 23:26:52 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:52 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-c8878dbc-3809-451d-bf98-9f26248bb148. For complete SELinux messages run: sealert -l 5a451f8c-50ab-4c93-a39f-9037908da70d Sep 30 23:26:52 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-c8878dbc-3809-451d-bf98-9f26248bb148. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-c8878dbc-3809-451d-bf98-9f26248bb148 default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-c8878dbc-3809-451d-bf98-9f26248bb148 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-c8878dbc-3809-451d-bf98-9f26248bb148 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:52 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l 91938296-bf27-47b7-ac35-cf8431b893ed Sep 30 23:26:52 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:52 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l 7656fc14-08fc-49e9-a74b-cd224da736c7 Sep 30 23:26:52 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:52 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-c8878dbc-3809-451d-bf98-9f26248bb148. For complete SELinux messages run: sealert -l 9327697d-a860-4a3f-ab0f-bd66008ae83d Sep 30 23:26:52 np0005463759.novalocal setroubleshoot[102235]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-c8878dbc-3809-451d-bf98-9f26248bb148. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-c8878dbc-3809-451d-bf98-9f26248bb148 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:26:52 np0005463759.novalocal sudo[102687]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:52 np0005463759.novalocal systemd[1]: session-c60.scope: Deactivated successfully. Sep 30 23:26:52 np0005463759.novalocal sudo[102698]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Sep 30 23:26:52 np0005463759.novalocal systemd[1]: Started Session c61 of User root. Sep 30 23:26:52 np0005463759.novalocal sudo[102698]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:53 np0005463759.novalocal sudo[102698]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:53 np0005463759.novalocal systemd[1]: session-c61.scope: Deactivated successfully. Sep 30 23:26:53 np0005463759.novalocal sudo[102705]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Sep 30 23:26:53 np0005463759.novalocal systemd[1]: Started Session c62 of User root. Sep 30 23:26:53 np0005463759.novalocal sudo[102705]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:53 np0005463759.novalocal sudo[102705]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:53 np0005463759.novalocal systemd[1]: session-c62.scope: Deactivated successfully. Sep 30 23:26:53 np0005463759.novalocal sudo[102711]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-c8878dbc-3809-451d-bf98-9f26248bb148 Sep 30 23:26:53 np0005463759.novalocal systemd[1]: Started Session c63 of User root. Sep 30 23:26:53 np0005463759.novalocal sudo[102711]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:54 np0005463759.novalocal sudo[102711]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:54 np0005463759.novalocal systemd[1]: session-c63.scope: Deactivated successfully. Sep 30 23:26:54 np0005463759.novalocal sudo[102716]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Sep 30 23:26:54 np0005463759.novalocal systemd[1]: Started Session c64 of User root. Sep 30 23:26:54 np0005463759.novalocal sudo[102716]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:26:54 np0005463759.novalocal sudo[102716]: pam_unix(sudo:session): session closed for user root Sep 30 23:26:54 np0005463759.novalocal systemd[1]: session-c64.scope: Deactivated successfully. Sep 30 23:27:02 np0005463759.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Deactivated successfully. Sep 30 23:27:02 np0005463759.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@5.service: Consumed 1.337s CPU time. Sep 30 23:27:02 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:27:02 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:27:02 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:27:02 np0005463759.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Sep 30 23:27:02 np0005463759.novalocal systemd[1]: setroubleshootd.service: Consumed 6.612s CPU time. Sep 30 23:27:11 np0005463759.novalocal sudo[102734]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:27:11 np0005463759.novalocal systemd[1]: Started Session c65 of User root. Sep 30 23:27:11 np0005463759.novalocal sudo[102734]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:27:11 np0005463759.novalocal sudo[102734]: pam_unix(sudo:session): session closed for user root Sep 30 23:27:11 np0005463759.novalocal systemd[1]: session-c65.scope: Deactivated successfully. Sep 30 23:27:11 np0005463759.novalocal sudo[102738]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:27:11 np0005463759.novalocal systemd[1]: Started Session c66 of User root. Sep 30 23:27:11 np0005463759.novalocal sudo[102738]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:27:12 np0005463759.novalocal sudo[102738]: pam_unix(sudo:session): session closed for user root Sep 30 23:27:12 np0005463759.novalocal systemd[1]: session-c66.scope: Deactivated successfully. Sep 30 23:27:12 np0005463759.novalocal sudo[102742]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:27:12 np0005463759.novalocal systemd[1]: Started Session c67 of User root. Sep 30 23:27:12 np0005463759.novalocal sudo[102742]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:27:12 np0005463759.novalocal sudo[102742]: pam_unix(sudo:session): session closed for user root Sep 30 23:27:12 np0005463759.novalocal systemd[1]: session-c67.scope: Deactivated successfully. Sep 30 23:27:12 np0005463759.novalocal sudo[102747]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:27:12 np0005463759.novalocal systemd[1]: Started Session c68 of User root. Sep 30 23:27:12 np0005463759.novalocal sudo[102747]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:27:12 np0005463759.novalocal sudo[102747]: pam_unix(sudo:session): session closed for user root Sep 30 23:27:12 np0005463759.novalocal systemd[1]: session-c68.scope: Deactivated successfully. Sep 30 23:27:39 np0005463759.novalocal sshd-session[102808]: Invalid user master from 192.227.153.63 port 53652 Sep 30 23:27:39 np0005463759.novalocal sshd-session[102808]: Received disconnect from 192.227.153.63 port 53652:11: Bye Bye [preauth] Sep 30 23:27:39 np0005463759.novalocal sshd-session[102808]: Disconnected from invalid user master 192.227.153.63 port 53652 [preauth] Sep 30 23:28:03 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:28:03 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:28:03 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:28:04 np0005463759.novalocal PackageKit[2926]: daemon quit Sep 30 23:28:04 np0005463759.novalocal systemd[1]: packagekit.service: Deactivated successfully. Sep 30 23:28:11 np0005463759.novalocal sudo[102835]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:28:11 np0005463759.novalocal systemd[1]: Started Session c69 of User root. Sep 30 23:28:11 np0005463759.novalocal sudo[102835]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:28:11 np0005463759.novalocal sudo[102835]: pam_unix(sudo:session): session closed for user root Sep 30 23:28:11 np0005463759.novalocal systemd[1]: session-c69.scope: Deactivated successfully. Sep 30 23:28:11 np0005463759.novalocal sudo[102840]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:28:11 np0005463759.novalocal systemd[1]: Started Session c70 of User root. Sep 30 23:28:11 np0005463759.novalocal sudo[102840]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:28:11 np0005463759.novalocal sudo[102840]: pam_unix(sudo:session): session closed for user root Sep 30 23:28:12 np0005463759.novalocal systemd[1]: session-c70.scope: Deactivated successfully. Sep 30 23:28:12 np0005463759.novalocal sudo[102844]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:28:12 np0005463759.novalocal systemd[1]: Started Session c71 of User root. Sep 30 23:28:12 np0005463759.novalocal sudo[102844]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:28:12 np0005463759.novalocal sudo[102844]: pam_unix(sudo:session): session closed for user root Sep 30 23:28:12 np0005463759.novalocal systemd[1]: session-c71.scope: Deactivated successfully. Sep 30 23:28:12 np0005463759.novalocal sudo[102848]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:28:12 np0005463759.novalocal systemd[1]: Started Session c72 of User root. Sep 30 23:28:12 np0005463759.novalocal sudo[102848]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:28:12 np0005463759.novalocal sudo[102848]: pam_unix(sudo:session): session closed for user root Sep 30 23:28:12 np0005463759.novalocal systemd[1]: session-c72.scope: Deactivated successfully. Sep 30 23:28:40 np0005463759.novalocal sshd-session[102907]: Invalid user pavan from 192.227.153.63 port 53118 Sep 30 23:28:40 np0005463759.novalocal sshd-session[102907]: Received disconnect from 192.227.153.63 port 53118:11: Bye Bye [preauth] Sep 30 23:28:40 np0005463759.novalocal sshd-session[102907]: Disconnected from invalid user pavan 192.227.153.63 port 53118 [preauth] Sep 30 23:29:01 np0005463759.novalocal sshd-session[102925]: Received disconnect from 154.92.109.196 port 34172:11: Bye Bye [preauth] Sep 30 23:29:01 np0005463759.novalocal sshd-session[102925]: Disconnected from authenticating user root 154.92.109.196 port 34172 [preauth] Sep 30 23:29:03 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:29:03 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:29:03 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:29:07 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:29:08 np0005463759.novalocal systemd-rc-local-generator[102957]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:29:08 np0005463759.novalocal systemd-sysv-generator[102962]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:29:08 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:29:08 np0005463759.novalocal systemd[1]: Starting OpenStack Nova Conductor Server... Sep 30 23:29:10 np0005463759.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Sep 30 23:29:10 np0005463759.novalocal systemd[98827]: Created slice User Background Tasks Slice. Sep 30 23:29:10 np0005463759.novalocal systemd[98827]: Starting Cleanup of User's Temporary Files and Directories... Sep 30 23:29:10 np0005463759.novalocal systemd[98827]: Finished Cleanup of User's Temporary Files and Directories. Sep 30 23:29:10 np0005463759.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Sep 30 23:29:11 np0005463759.novalocal sudo[102974]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:29:11 np0005463759.novalocal systemd[1]: Started Session c73 of User root. Sep 30 23:29:11 np0005463759.novalocal sudo[102974]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:29:11 np0005463759.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service. Sep 30 23:29:11 np0005463759.novalocal sudo[102974]: pam_unix(sudo:session): session closed for user root Sep 30 23:29:11 np0005463759.novalocal systemd[1]: session-c73.scope: Deactivated successfully. Sep 30 23:29:11 np0005463759.novalocal sudo[102986]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:29:11 np0005463759.novalocal systemd[1]: Started Session c74 of User root. Sep 30 23:29:11 np0005463759.novalocal sudo[102986]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:29:12 np0005463759.novalocal sudo[102986]: pam_unix(sudo:session): session closed for user root Sep 30 23:29:12 np0005463759.novalocal systemd[1]: session-c74.scope: Deactivated successfully. Sep 30 23:29:12 np0005463759.novalocal systemd[1]: Started OpenStack Nova Conductor Server. Sep 30 23:29:12 np0005463759.novalocal sudo[102998]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:29:12 np0005463759.novalocal systemd[1]: Started Session c75 of User root. Sep 30 23:29:12 np0005463759.novalocal sudo[102998]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:29:12 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:29:12 np0005463759.novalocal systemd-sysv-generator[103024]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:29:12 np0005463759.novalocal systemd-rc-local-generator[103021]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:29:12 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:29:12 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l c68fe4f6-2eab-482b-bbf2-7d107c2280e2 Sep 30 23:29:12 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Sep 30 23:29:12 np0005463759.novalocal sudo[102998]: pam_unix(sudo:session): session closed for user root Sep 30 23:29:12 np0005463759.novalocal systemd[1]: session-c75.scope: Deactivated successfully. Sep 30 23:29:12 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 3150bd30-dc8e-4f74-9812-f5dcec363278 Sep 30 23:29:12 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Sep 30 23:29:12 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:29:12 np0005463759.novalocal sshd-session[102976]: Received disconnect from 218.51.148.194 port 43950:11: Bye Bye [preauth] Sep 30 23:29:12 np0005463759.novalocal sshd-session[102976]: Disconnected from authenticating user root 218.51.148.194 port 43950 [preauth] Sep 30 23:29:12 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 780fd72c-4d47-4304-b646-eba66e667e5c Sep 30 23:29:12 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Sep 30 23:29:12 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 50553651-8572-4d8d-84be-57b6aa18ea09 Sep 30 23:29:12 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Sep 30 23:29:12 np0005463759.novalocal systemd-rc-local-generator[103060]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:29:12 np0005463759.novalocal systemd-sysv-generator[103064]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:29:12 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l eb0f8b31-9be7-4358-8b42-2a25065cc415 Sep 30 23:29:12 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Sep 30 23:29:12 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:29:12 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 5df600f7-282d-4f24-b604-d9fa91113ccd Sep 30 23:29:12 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Sep 30 23:29:12 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l a9acd0d4-15ed-4cd5-98f0-4763ccf7e9a9 Sep 30 23:29:12 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Sep 30 23:29:12 np0005463759.novalocal sudo[103037]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:29:12 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l bf4bb92b-2d50-42a8-8a11-41861c93c5f1 Sep 30 23:29:12 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Sep 30 23:29:12 np0005463759.novalocal systemd[1]: Started Session c76 of User root. Sep 30 23:29:12 np0005463759.novalocal sudo[103037]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:29:12 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l be5aef6c-dfd1-4655-9fe5-998143e61c2c Sep 30 23:29:12 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Sep 30 23:29:12 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l 79263265-3a0f-464d-83ea-3d3c2bd96a34 Sep 30 23:29:12 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Sep 30 23:29:13 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l d4c0772d-2b8e-4143-b9ce-4675e47df318 Sep 30 23:29:13 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Sep 30 23:29:13 np0005463759.novalocal sudo[103037]: pam_unix(sudo:session): session closed for user root Sep 30 23:29:13 np0005463759.novalocal systemd[1]: session-c76.scope: Deactivated successfully. Sep 30 23:29:13 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:29:13 np0005463759.novalocal systemd-rc-local-generator[103103]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:29:13 np0005463759.novalocal systemd-sysv-generator[103106]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:29:13 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:29:13 np0005463759.novalocal systemd[1]: Starting OpenStack Nova Compute Server... Sep 30 23:29:18 np0005463759.novalocal systemd[1]: Started OpenStack Nova Compute Server. Sep 30 23:29:19 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:29:19 np0005463759.novalocal systemd-rc-local-generator[103180]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:29:19 np0005463759.novalocal systemd-sysv-generator[103183]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:29:19 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:29:19 np0005463759.novalocal systemd[1]: Starting libvirt QEMU daemon... Sep 30 23:29:19 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:29:19 np0005463759.novalocal systemd-rc-local-generator[103248]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:29:19 np0005463759.novalocal systemd-sysv-generator[103251]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:29:19 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:29:19 np0005463759.novalocal systemd[1]: Started libvirt QEMU daemon. Sep 30 23:29:19 np0005463759.novalocal nova-compute[103113]: libvirt: error : internal error: could not initialize domain event timer Sep 30 23:29:20 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:29:20 np0005463759.novalocal systemd-sysv-generator[103299]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:29:20 np0005463759.novalocal systemd-rc-local-generator[103295]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:29:20 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:29:20 np0005463759.novalocal systemd[1]: Starting OpenStack Nova Scheduler Server... Sep 30 23:29:21 np0005463759.novalocal systemd[1]: Listening on libvirt nodedev daemon admin socket. Sep 30 23:29:21 np0005463759.novalocal systemd[1]: Listening on libvirt nodedev daemon read-only socket. Sep 30 23:29:21 np0005463759.novalocal systemd[1]: Starting libvirt nodedev daemon... Sep 30 23:29:21 np0005463759.novalocal systemd[1]: Started libvirt nodedev daemon. Sep 30 23:29:22 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. For complete SELinux messages run: sealert -l c68fe4f6-2eab-482b-bbf2-7d107c2280e2 Sep 30 23:29:22 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/hostname. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the hostname file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Sep 30 23:29:22 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. For complete SELinux messages run: sealert -l 3150bd30-dc8e-4f74-9812-f5dcec363278 Sep 30 23:29:22 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/rpm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the rpm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Sep 30 23:29:22 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. For complete SELinux messages run: sealert -l 780fd72c-4d47-4304-b646-eba66e667e5c Sep 30 23:29:22 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/gpg. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the gpg file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Sep 30 23:29:22 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 50553651-8572-4d8d-84be-57b6aa18ea09 Sep 30 23:29:22 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Sep 30 23:29:22 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. For complete SELinux messages run: sealert -l eb0f8b31-9be7-4358-8b42-2a25065cc415 Sep 30 23:29:22 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/libexec/dnf-utils. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the dnf-utils file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Sep 30 23:29:22 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. For complete SELinux messages run: sealert -l 5df600f7-282d-4f24-b604-d9fa91113ccd Sep 30 23:29:22 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/traceroute. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the traceroute file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Sep 30 23:29:22 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. For complete SELinux messages run: sealert -l a9acd0d4-15ed-4cd5-98f0-4763ccf7e9a9 Sep 30 23:29:22 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/consolehelper. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the consolehelper file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Sep 30 23:29:22 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. For complete SELinux messages run: sealert -l bf4bb92b-2d50-42a8-8a11-41861c93c5f1 Sep 30 23:29:22 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadb-backup. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadb-backup file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Sep 30 23:29:22 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. For complete SELinux messages run: sealert -l be5aef6c-dfd1-4655-9fe5-998143e61c2c Sep 30 23:29:22 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/mariadbd-safe. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the mariadbd-safe file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Sep 30 23:29:22 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. For complete SELinux messages run: sealert -l 79263265-3a0f-464d-83ea-3d3c2bd96a34 Sep 30 23:29:22 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/bin/redis-server. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the redis-server file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Sep 30 23:29:22 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. For complete SELinux messages run: sealert -l d4c0772d-2b8e-4143-b9ce-4675e47df318 Sep 30 23:29:22 np0005463759.novalocal setroubleshoot[102969]: SELinux is preventing /usr/bin/python3.9 from getattr access on the file /usr/sbin/keepalived. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed getattr access on the keepalived file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'nova-conductor' --raw | audit2allow -M my-novaconductor # semodule -X 300 -i my-novaconductor.pp Sep 30 23:29:22 np0005463759.novalocal systemd[1]: Started OpenStack Nova Scheduler Server. Sep 30 23:29:23 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:29:23 np0005463759.novalocal systemd-rc-local-generator[103366]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:29:23 np0005463759.novalocal systemd-sysv-generator[103372]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:29:23 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:29:23 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:29:23 np0005463759.novalocal systemd-rc-local-generator[103399]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:29:23 np0005463759.novalocal systemd-sysv-generator[103403]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:29:23 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:29:32 np0005463759.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Deactivated successfully. Sep 30 23:29:32 np0005463759.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@6.service: Consumed 1.163s CPU time. Sep 30 23:29:32 np0005463759.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Sep 30 23:29:32 np0005463759.novalocal systemd[1]: setroubleshootd.service: Consumed 2.159s CPU time. Sep 30 23:29:41 np0005463759.novalocal sshd-session[103416]: Received disconnect from 192.227.153.63 port 52648:11: Bye Bye [preauth] Sep 30 23:29:41 np0005463759.novalocal sshd-session[103416]: Disconnected from authenticating user root 192.227.153.63 port 52648 [preauth] Sep 30 23:29:58 np0005463759.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Sep 30 23:29:59 np0005463759.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Sep 30 23:29:59 np0005463759.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service. Sep 30 23:30:00 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l 9e323f8b-b3bc-4fac-acb9-191b7d59cf12 Sep 30 23:30:00 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/sbin/httpd from write access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:30:00 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). For complete SELinux messages run: sealert -l 52487f9c-9cef-4344-af79-ef7945d5670a Sep 30 23:30:00 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/sbin/httpd from add_name access on the directory /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:30:00 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). For complete SELinux messages run: sealert -l d08fd111-b66d-436d-88f2-d506152bc196 Sep 30 23:30:00 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/sbin/httpd from create access on the file /var/lib/nova/(null). ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:30:01 np0005463759.novalocal setroubleshoot[103428]: failed to retrieve rpm info for path '/var/lib/nova/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d': Sep 30 23:30:01 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. For complete SELinux messages run: sealert -l be3d3c69-6bee-4cf9-8d93-6708a693b466 Sep 30 23:30:01 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/sbin/httpd from 'write, open' accesses on the file /var/lib/nova/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write open access on the a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:30:01 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. For complete SELinux messages run: sealert -l 566eeb17-c4e1-47c7-bab0-6366371d3170 Sep 30 23:30:01 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:30:01 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. For complete SELinux messages run: sealert -l b2a93297-a1ec-43aa-bad4-08803dd153a4 Sep 30 23:30:01 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:30:01 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l df0baffc-ddef-4689-8b75-9cc69b4598c8 Sep 30 23:30:01 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Sep 30 23:30:01 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l c2fd0af8-db9d-409b-974b-f3c3b74e1107 Sep 30 23:30:01 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Sep 30 23:30:01 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l c530652a-70f9-42be-8256-6519aa3f0b28 Sep 30 23:30:01 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Sep 30 23:30:01 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:30:01 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:30:01 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:30:01 np0005463759.novalocal systemd[1]: Created slice User Slice of UID 161. Sep 30 23:30:01 np0005463759.novalocal systemd[1]: Starting User Runtime Directory /run/user/161... Sep 30 23:30:01 np0005463759.novalocal systemd[1]: Created slice User Slice of UID 163. Sep 30 23:30:01 np0005463759.novalocal systemd[1]: Starting User Runtime Directory /run/user/163... Sep 30 23:30:01 np0005463759.novalocal systemd[1]: Finished User Runtime Directory /run/user/161. Sep 30 23:30:01 np0005463759.novalocal systemd[1]: Starting User Manager for UID 161... Sep 30 23:30:01 np0005463759.novalocal systemd[1]: Finished User Runtime Directory /run/user/163. Sep 30 23:30:01 np0005463759.novalocal systemd[1]: Starting User Manager for UID 163... Sep 30 23:30:01 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/sbin/httpd from read access on the file a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. For complete SELinux messages run: sealert -l cb407ad5-3a4a-453a-b2a8-f33ebe376faa Sep 30 23:30:01 np0005463759.novalocal systemd[103455]: pam_unix(systemd-user:session): session opened for user glance(uid=161) by glance(uid=0) Sep 30 23:30:01 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/sbin/httpd from read access on the file a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:30:01 np0005463759.novalocal systemd[103456]: pam_unix(systemd-user:session): session opened for user keystone(uid=163) by keystone(uid=0) Sep 30 23:30:01 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. For complete SELinux messages run: sealert -l 61108ba9-07a7-483e-80df-6a5a66d52e98 Sep 30 23:30:01 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed open access on the a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:30:01 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. For complete SELinux messages run: sealert -l 566eeb17-c4e1-47c7-bab0-6366371d3170 Sep 30 23:30:01 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:30:01 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. For complete SELinux messages run: sealert -l b2a93297-a1ec-43aa-bad4-08803dd153a4 Sep 30 23:30:01 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:30:01 np0005463759.novalocal systemd[103455]: Queued start job for default target Main User Target. Sep 30 23:30:01 np0005463759.novalocal systemd[103455]: Created slice User Application Slice. Sep 30 23:30:01 np0005463759.novalocal systemd[103455]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Sep 30 23:30:01 np0005463759.novalocal systemd[103455]: Started Daily Cleanup of User's Temporary Directories. Sep 30 23:30:01 np0005463759.novalocal systemd[103455]: Reached target Paths. Sep 30 23:30:01 np0005463759.novalocal systemd[103455]: Reached target Timers. Sep 30 23:30:01 np0005463759.novalocal systemd[103455]: Starting D-Bus User Message Bus Socket... Sep 30 23:30:01 np0005463759.novalocal systemd[103456]: Queued start job for default target Main User Target. Sep 30 23:30:01 np0005463759.novalocal systemd[103455]: Listening on PipeWire PulseAudio. Sep 30 23:30:01 np0005463759.novalocal systemd[103455]: Listening on PipeWire Multimedia System Sockets. Sep 30 23:30:01 np0005463759.novalocal systemd[103456]: Created slice User Application Slice. Sep 30 23:30:01 np0005463759.novalocal systemd[103456]: Mark boot as successful after the user session has run 2 minutes was skipped because of an unmet condition check (ConditionUser=!@system). Sep 30 23:30:01 np0005463759.novalocal systemd[103456]: Started Daily Cleanup of User's Temporary Directories. Sep 30 23:30:01 np0005463759.novalocal systemd[103456]: Reached target Paths. Sep 30 23:30:01 np0005463759.novalocal systemd[103456]: Reached target Timers. Sep 30 23:30:01 np0005463759.novalocal systemd[103455]: Starting Create User's Volatile Files and Directories... Sep 30 23:30:01 np0005463759.novalocal systemd[103456]: Starting D-Bus User Message Bus Socket... Sep 30 23:30:01 np0005463759.novalocal systemd[103456]: Listening on PipeWire PulseAudio. Sep 30 23:30:01 np0005463759.novalocal systemd[103456]: Listening on PipeWire Multimedia System Sockets. Sep 30 23:30:01 np0005463759.novalocal systemd[103456]: Starting Create User's Volatile Files and Directories... Sep 30 23:30:01 np0005463759.novalocal systemd[103456]: Listening on D-Bus User Message Bus Socket. Sep 30 23:30:01 np0005463759.novalocal systemd[103456]: Reached target Sockets. Sep 30 23:30:01 np0005463759.novalocal systemd[103455]: Listening on D-Bus User Message Bus Socket. Sep 30 23:30:01 np0005463759.novalocal systemd[103455]: Reached target Sockets. Sep 30 23:30:01 np0005463759.novalocal systemd[103455]: Finished Create User's Volatile Files and Directories. Sep 30 23:30:01 np0005463759.novalocal systemd[103455]: Reached target Basic System. Sep 30 23:30:01 np0005463759.novalocal systemd[103455]: Reached target Main User Target. Sep 30 23:30:01 np0005463759.novalocal systemd[103455]: Startup finished in 232ms. Sep 30 23:30:01 np0005463759.novalocal systemd[1]: Started User Manager for UID 161. Sep 30 23:30:01 np0005463759.novalocal systemd[1]: Started Session 5 of User glance. Sep 30 23:30:01 np0005463759.novalocal systemd[103456]: Finished Create User's Volatile Files and Directories. Sep 30 23:30:01 np0005463759.novalocal systemd[103456]: Reached target Basic System. Sep 30 23:30:01 np0005463759.novalocal systemd[1]: Started User Manager for UID 163. Sep 30 23:30:01 np0005463759.novalocal systemd[1]: Started Session 6 of User keystone. Sep 30 23:30:01 np0005463759.novalocal systemd[103456]: Reached target Main User Target. Sep 30 23:30:01 np0005463759.novalocal systemd[103456]: Startup finished in 221ms. Sep 30 23:30:01 np0005463759.novalocal CROND[103475]: (glance) CMD (glance-cache-pruner) Sep 30 23:30:01 np0005463759.novalocal CROND[103476]: (keystone) CMD (keystone-manage fernet_rotate) Sep 30 23:30:02 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. For complete SELinux messages run: sealert -l df0baffc-ddef-4689-8b75-9cc69b4598c8 Sep 30 23:30:02 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/bin/grep from read access on the file iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed read access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Sep 30 23:30:02 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l c2fd0af8-db9d-409b-974b-f3c3b74e1107 Sep 30 23:30:02 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/bin/grep from open access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Sep 30 23:30:02 np0005463759.novalocal CROND[103447]: (glance) CMDOUT (2025-09-30 23:30:02.621 103475 INFO glance.image_cache [-] Image cache loaded driver 'centralized_db'.) Sep 30 23:30:02 np0005463759.novalocal CROND[103447]: (glance) CMDOUT (2025-09-30 23:30:02.838 103475 DEBUG glance.image_cache [None req-ec13ba7a-c5d4-4c42-b596-19fcd61402ff - - - - - -] Image cache has free space, skipping prune... prune /usr/lib/python3.9/site-packages/glance/image_cache/__init__.py:291) Sep 30 23:30:02 np0005463759.novalocal CROND[103447]: (glance) CMDEND (glance-cache-pruner) Sep 30 23:30:02 np0005463759.novalocal systemd[1]: session-5.scope: Deactivated successfully. Sep 30 23:30:02 np0005463759.novalocal systemd[1]: session-5.scope: Consumed 1.211s CPU time. Sep 30 23:30:03 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l c530652a-70f9-42be-8256-6519aa3f0b28 Sep 30 23:30:03 np0005463759.novalocal setroubleshoot[103428]: SELinux is preventing /usr/bin/grep from getattr access on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that grep should be allowed getattr access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'grep' --raw | audit2allow -M my-grep # semodule -X 300 -i my-grep.pp Sep 30 23:30:03 np0005463759.novalocal CROND[103448]: (keystone) CMDEND (keystone-manage fernet_rotate) Sep 30 23:30:03 np0005463759.novalocal systemd[1]: session-6.scope: Deactivated successfully. Sep 30 23:30:03 np0005463759.novalocal systemd[1]: session-6.scope: Consumed 1.841s CPU time. Sep 30 23:30:10 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:30:10 np0005463759.novalocal systemd-rc-local-generator[103511]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:30:10 np0005463759.novalocal systemd-sysv-generator[103514]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:30:10 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:30:10 np0005463759.novalocal systemd[1]: Started OpenStack Octavia Worker service. Sep 30 23:30:10 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:30:10 np0005463759.novalocal systemd-rc-local-generator[103543]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:30:10 np0005463759.novalocal systemd-sysv-generator[103547]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:30:10 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:30:11 np0005463759.novalocal systemd[1]: Reloading. Sep 30 23:30:11 np0005463759.novalocal systemd-sysv-generator[103578]: SysV service '/etc/rc.d/init.d/network' lacks a native systemd unit file. Automatically generating a unit file for compatibility. Please update package to include a native systemd unit file, in order to make it more safe and robust. Sep 30 23:30:11 np0005463759.novalocal systemd-rc-local-generator[103574]: /etc/rc.d/rc.local is not marked executable, skipping. Sep 30 23:30:11 np0005463759.novalocal systemd[1]: /usr/lib/systemd/system/ovn-controller.service:24: PIDFile= references a path below legacy directory /var/run/, updating /var/run/ovn/ovn-controller.pid → /run/ovn/ovn-controller.pid; please update the unit file accordingly. Sep 30 23:30:11 np0005463759.novalocal sudo[103553]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:30:11 np0005463759.novalocal systemd[1]: Started Session c77 of User root. Sep 30 23:30:11 np0005463759.novalocal sudo[103553]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:30:11 np0005463759.novalocal sudo[103553]: pam_unix(sudo:session): session closed for user root Sep 30 23:30:11 np0005463759.novalocal systemd[1]: session-c77.scope: Deactivated successfully. Sep 30 23:30:11 np0005463759.novalocal sudo[103586]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:30:11 np0005463759.novalocal systemd[1]: Started Session c78 of User root. Sep 30 23:30:11 np0005463759.novalocal sudo[103586]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:30:12 np0005463759.novalocal sudo[103586]: pam_unix(sudo:session): session closed for user root Sep 30 23:30:12 np0005463759.novalocal systemd[1]: session-c78.scope: Deactivated successfully. Sep 30 23:30:12 np0005463759.novalocal sudo[103590]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:30:12 np0005463759.novalocal systemd[1]: Started Session c79 of User root. Sep 30 23:30:12 np0005463759.novalocal sudo[103590]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:30:12 np0005463759.novalocal sudo[103590]: pam_unix(sudo:session): session closed for user root Sep 30 23:30:12 np0005463759.novalocal systemd[1]: session-c79.scope: Deactivated successfully. Sep 30 23:30:12 np0005463759.novalocal sudo[103594]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:30:12 np0005463759.novalocal systemd[1]: Started Session c80 of User root. Sep 30 23:30:12 np0005463759.novalocal sudo[103594]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:30:13 np0005463759.novalocal sudo[103594]: pam_unix(sudo:session): session closed for user root Sep 30 23:30:13 np0005463759.novalocal systemd[1]: Stopping User Manager for UID 161... Sep 30 23:30:13 np0005463759.novalocal systemd[1]: session-c80.scope: Deactivated successfully. Sep 30 23:30:13 np0005463759.novalocal systemd[103455]: Activating special unit Exit the Session... Sep 30 23:30:13 np0005463759.novalocal systemd[103455]: Stopped target Main User Target. Sep 30 23:30:13 np0005463759.novalocal systemd[103455]: Stopped target Basic System. Sep 30 23:30:13 np0005463759.novalocal systemd[103455]: Stopped target Paths. Sep 30 23:30:13 np0005463759.novalocal systemd[103455]: Stopped target Sockets. Sep 30 23:30:13 np0005463759.novalocal systemd[103455]: Stopped target Timers. Sep 30 23:30:13 np0005463759.novalocal systemd[103455]: Stopped Daily Cleanup of User's Temporary Directories. Sep 30 23:30:13 np0005463759.novalocal systemd[103455]: Closed D-Bus User Message Bus Socket. Sep 30 23:30:13 np0005463759.novalocal systemd[103455]: Closed PipeWire PulseAudio. Sep 30 23:30:13 np0005463759.novalocal systemd[103455]: Closed PipeWire Multimedia System Sockets. Sep 30 23:30:13 np0005463759.novalocal systemd[103455]: Stopped Create User's Volatile Files and Directories. Sep 30 23:30:13 np0005463759.novalocal systemd[103455]: Removed slice User Application Slice. Sep 30 23:30:13 np0005463759.novalocal systemd[103455]: Reached target Shutdown. Sep 30 23:30:13 np0005463759.novalocal systemd[103455]: Finished Exit the Session. Sep 30 23:30:13 np0005463759.novalocal systemd[103455]: Reached target Exit the Session. Sep 30 23:30:13 np0005463759.novalocal systemd[1]: user@161.service: Deactivated successfully. Sep 30 23:30:13 np0005463759.novalocal systemd[1]: Stopped User Manager for UID 161. Sep 30 23:30:13 np0005463759.novalocal systemd[1]: Stopping User Runtime Directory /run/user/161... Sep 30 23:30:13 np0005463759.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Deactivated successfully. Sep 30 23:30:13 np0005463759.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@7.service: Consumed 1.153s CPU time. Sep 30 23:30:13 np0005463759.novalocal systemd[1]: run-user-161.mount: Deactivated successfully. Sep 30 23:30:13 np0005463759.novalocal systemd[1]: user-runtime-dir@161.service: Deactivated successfully. Sep 30 23:30:13 np0005463759.novalocal systemd[1]: Stopped User Runtime Directory /run/user/161. Sep 30 23:30:13 np0005463759.novalocal systemd[1]: Removed slice User Slice of UID 161. Sep 30 23:30:13 np0005463759.novalocal systemd[1]: user-161.slice: Consumed 1.496s CPU time. Sep 30 23:30:13 np0005463759.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Sep 30 23:30:13 np0005463759.novalocal systemd[1]: setroubleshootd.service: Consumed 1.668s CPU time. Sep 30 23:30:13 np0005463759.novalocal systemd[1]: Stopping User Manager for UID 163... Sep 30 23:30:13 np0005463759.novalocal systemd[103456]: Activating special unit Exit the Session... Sep 30 23:30:13 np0005463759.novalocal systemd[103456]: Stopped target Main User Target. Sep 30 23:30:13 np0005463759.novalocal systemd[103456]: Stopped target Basic System. Sep 30 23:30:13 np0005463759.novalocal systemd[103456]: Stopped target Paths. Sep 30 23:30:13 np0005463759.novalocal systemd[103456]: Stopped target Sockets. Sep 30 23:30:13 np0005463759.novalocal systemd[103456]: Stopped target Timers. Sep 30 23:30:13 np0005463759.novalocal systemd[103456]: Stopped Daily Cleanup of User's Temporary Directories. Sep 30 23:30:13 np0005463759.novalocal systemd[103456]: Closed D-Bus User Message Bus Socket. Sep 30 23:30:13 np0005463759.novalocal systemd[103456]: Closed PipeWire PulseAudio. Sep 30 23:30:13 np0005463759.novalocal systemd[103456]: Closed PipeWire Multimedia System Sockets. Sep 30 23:30:13 np0005463759.novalocal systemd[103456]: Stopped Create User's Volatile Files and Directories. Sep 30 23:30:13 np0005463759.novalocal systemd[103456]: Removed slice User Application Slice. Sep 30 23:30:13 np0005463759.novalocal systemd[103456]: Reached target Shutdown. Sep 30 23:30:13 np0005463759.novalocal systemd[103456]: Finished Exit the Session. Sep 30 23:30:13 np0005463759.novalocal systemd[103456]: Reached target Exit the Session. Sep 30 23:30:13 np0005463759.novalocal systemd[1]: user@163.service: Deactivated successfully. Sep 30 23:30:13 np0005463759.novalocal systemd[1]: Stopped User Manager for UID 163. Sep 30 23:30:13 np0005463759.novalocal systemd[1]: Stopping User Runtime Directory /run/user/163... Sep 30 23:30:13 np0005463759.novalocal systemd[1]: run-user-163.mount: Deactivated successfully. Sep 30 23:30:13 np0005463759.novalocal systemd[1]: user-runtime-dir@163.service: Deactivated successfully. Sep 30 23:30:13 np0005463759.novalocal systemd[1]: Stopped User Runtime Directory /run/user/163. Sep 30 23:30:13 np0005463759.novalocal systemd[1]: Removed slice User Slice of UID 163. Sep 30 23:30:13 np0005463759.novalocal systemd[1]: user-163.slice: Consumed 2.148s CPU time. Sep 30 23:30:15 np0005463759.novalocal sshd-session[103604]: Invalid user wikijs from 154.92.109.196 port 20663 Sep 30 23:30:15 np0005463759.novalocal sshd-session[103604]: Received disconnect from 154.92.109.196 port 20663:11: Bye Bye [preauth] Sep 30 23:30:15 np0005463759.novalocal sshd-session[103604]: Disconnected from invalid user wikijs 154.92.109.196 port 20663 [preauth] Sep 30 23:30:25 np0005463759.novalocal runuser[103808]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:30:26 np0005463759.novalocal runuser[103808]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:30:26 np0005463759.novalocal runuser[103861]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:30:27 np0005463759.novalocal runuser[103861]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:30:27 np0005463759.novalocal runuser[103917]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:30:27 np0005463759.novalocal sshd-session[103906]: Invalid user drew from 218.51.148.194 port 39718 Sep 30 23:30:27 np0005463759.novalocal runuser[103917]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:30:27 np0005463759.novalocal sshd-session[103906]: Received disconnect from 218.51.148.194 port 39718:11: Bye Bye [preauth] Sep 30 23:30:27 np0005463759.novalocal sshd-session[103906]: Disconnected from invalid user drew 218.51.148.194 port 39718 [preauth] Sep 30 23:30:41 np0005463759.novalocal sshd-session[104031]: Received disconnect from 192.227.153.63 port 51670:11: Bye Bye [preauth] Sep 30 23:30:41 np0005463759.novalocal sshd-session[104031]: Disconnected from authenticating user root 192.227.153.63 port 51670 [preauth] Sep 30 23:31:03 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:31:03 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:31:03 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:31:11 np0005463759.novalocal sudo[104346]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:31:11 np0005463759.novalocal systemd[1]: Started Session c81 of User root. Sep 30 23:31:11 np0005463759.novalocal sudo[104346]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:31:11 np0005463759.novalocal sudo[104346]: pam_unix(sudo:session): session closed for user root Sep 30 23:31:11 np0005463759.novalocal systemd[1]: session-c81.scope: Deactivated successfully. Sep 30 23:31:11 np0005463759.novalocal sudo[104355]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:31:11 np0005463759.novalocal systemd[1]: Started Session c82 of User root. Sep 30 23:31:11 np0005463759.novalocal sudo[104355]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:31:11 np0005463759.novalocal sudo[104355]: pam_unix(sudo:session): session closed for user root Sep 30 23:31:11 np0005463759.novalocal systemd[1]: session-c82.scope: Deactivated successfully. Sep 30 23:31:11 np0005463759.novalocal sudo[104362]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:31:11 np0005463759.novalocal systemd[1]: Started Session c83 of User root. Sep 30 23:31:11 np0005463759.novalocal sudo[104362]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:31:12 np0005463759.novalocal crontab[104367]: (root) LIST (root) Sep 30 23:31:12 np0005463759.novalocal crontab[104368]: (root) LIST (keystone) Sep 30 23:31:12 np0005463759.novalocal sudo[104362]: pam_unix(sudo:session): session closed for user root Sep 30 23:31:12 np0005463759.novalocal crontab[104370]: (root) LIST (cinder) Sep 30 23:31:12 np0005463759.novalocal systemd[1]: session-c83.scope: Deactivated successfully. Sep 30 23:31:12 np0005463759.novalocal sudo[104371]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:31:12 np0005463759.novalocal systemd[1]: Started Session c84 of User root. Sep 30 23:31:12 np0005463759.novalocal sudo[104371]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:31:12 np0005463759.novalocal crontab[104373]: (root) LIST (glance) Sep 30 23:31:12 np0005463759.novalocal crontab[104375]: (root) LIST (nova) Sep 30 23:31:12 np0005463759.novalocal crontab[104376]: (root) LIST (manila) Sep 30 23:31:12 np0005463759.novalocal sudo[104371]: pam_unix(sudo:session): session closed for user root Sep 30 23:31:12 np0005463759.novalocal systemd[1]: session-c84.scope: Deactivated successfully. Sep 30 23:31:15 np0005463759.novalocal runuser[104422]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:31:16 np0005463759.novalocal runuser[104422]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:31:16 np0005463759.novalocal runuser[104476]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:31:17 np0005463759.novalocal runuser[104476]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:31:17 np0005463759.novalocal runuser[104528]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:31:18 np0005463759.novalocal runuser[104528]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:31:18 np0005463759.novalocal runuser[104582]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:31:18 np0005463759.novalocal runuser[104582]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:31:18 np0005463759.novalocal runuser[104634]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:31:19 np0005463759.novalocal runuser[104634]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:31:19 np0005463759.novalocal runuser[104686]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:31:20 np0005463759.novalocal runuser[104686]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:31:20 np0005463759.novalocal runuser[104738]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:31:21 np0005463759.novalocal runuser[104738]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:31:21 np0005463759.novalocal runuser[104792]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:31:21 np0005463759.novalocal runuser[104792]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:31:21 np0005463759.novalocal runuser[104844]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:31:22 np0005463759.novalocal runuser[104844]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:31:22 np0005463759.novalocal runuser[104898]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:31:23 np0005463759.novalocal runuser[104898]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:31:24 np0005463759.novalocal runuser[104963]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:31:24 np0005463759.novalocal runuser[104963]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:31:25 np0005463759.novalocal runuser[105017]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:31:25 np0005463759.novalocal runuser[105017]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:31:25 np0005463759.novalocal runuser[105071]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:31:26 np0005463759.novalocal sshd-session[105008]: Received disconnect from 154.92.109.196 port 51788:11: Bye Bye [preauth] Sep 30 23:31:26 np0005463759.novalocal sshd-session[105008]: Disconnected from authenticating user root 154.92.109.196 port 51788 [preauth] Sep 30 23:31:26 np0005463759.novalocal runuser[105071]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:31:26 np0005463759.novalocal runuser[105123]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:31:27 np0005463759.novalocal runuser[105123]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:31:28 np0005463759.novalocal runuser[105182]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:31:28 np0005463759.novalocal runuser[105182]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:31:28 np0005463759.novalocal runuser[105234]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:31:29 np0005463759.novalocal runuser[105234]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:31:31 np0005463759.novalocal virtqemud[103209]: libvirt version: 10.10.0, package: 15.el9 (builder@centos.org, 2025-08-18-13:22:20, ) Sep 30 23:31:31 np0005463759.novalocal virtqemud[103209]: hostname: np0005463759.novalocal Sep 30 23:31:31 np0005463759.novalocal virtqemud[103209]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Sep 30 23:31:31 np0005463759.novalocal virtqemud[103209]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Sep 30 23:31:32 np0005463759.novalocal runuser[105317]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:31:33 np0005463759.novalocal runuser[105317]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:31:33 np0005463759.novalocal runuser[105369]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:31:33 np0005463759.novalocal runuser[105369]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:31:34 np0005463759.novalocal runuser[105431]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:31:35 np0005463759.novalocal runuser[105431]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:31:35 np0005463759.novalocal runuser[105483]: pam_unix(runuser:session): session opened for user rabbitmq(uid=987) by zuul-worker(uid=0) Sep 30 23:31:35 np0005463759.novalocal runuser[105483]: pam_unix(runuser:session): session closed for user rabbitmq Sep 30 23:31:38 np0005463759.novalocal sshd-session[105546]: Invalid user user from 192.227.153.63 port 50728 Sep 30 23:31:38 np0005463759.novalocal sshd-session[105546]: Received disconnect from 192.227.153.63 port 50728:11: Bye Bye [preauth] Sep 30 23:31:38 np0005463759.novalocal sshd-session[105546]: Disconnected from invalid user user 192.227.153.63 port 50728 [preauth] Sep 30 23:31:41 np0005463759.novalocal sshd-session[105549]: Received disconnect from 218.51.148.194 port 35498:11: Bye Bye [preauth] Sep 30 23:31:41 np0005463759.novalocal sshd-session[105549]: Disconnected from authenticating user root 218.51.148.194 port 35498 [preauth] Sep 30 23:32:04 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:32:04 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:32:04 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:32:11 np0005463759.novalocal sudo[105578]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:32:11 np0005463759.novalocal systemd[1]: Started Session c85 of User root. Sep 30 23:32:11 np0005463759.novalocal sudo[105578]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:32:11 np0005463759.novalocal sudo[105578]: pam_unix(sudo:session): session closed for user root Sep 30 23:32:11 np0005463759.novalocal systemd[1]: session-c85.scope: Deactivated successfully. Sep 30 23:32:11 np0005463759.novalocal sudo[105582]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:32:11 np0005463759.novalocal systemd[1]: Started Session c86 of User root. Sep 30 23:32:11 np0005463759.novalocal sudo[105582]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:32:12 np0005463759.novalocal sudo[105582]: pam_unix(sudo:session): session closed for user root Sep 30 23:32:12 np0005463759.novalocal systemd[1]: session-c86.scope: Deactivated successfully. Sep 30 23:32:12 np0005463759.novalocal sudo[105586]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:32:12 np0005463759.novalocal systemd[1]: Started Session c87 of User root. Sep 30 23:32:12 np0005463759.novalocal sudo[105586]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:32:12 np0005463759.novalocal sudo[105586]: pam_unix(sudo:session): session closed for user root Sep 30 23:32:12 np0005463759.novalocal systemd[1]: session-c87.scope: Deactivated successfully. Sep 30 23:32:12 np0005463759.novalocal sudo[105590]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:32:12 np0005463759.novalocal systemd[1]: Started Session c88 of User root. Sep 30 23:32:12 np0005463759.novalocal sudo[105590]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:32:12 np0005463759.novalocal sudo[105590]: pam_unix(sudo:session): session closed for user root Sep 30 23:32:12 np0005463759.novalocal systemd[1]: session-c88.scope: Deactivated successfully. Sep 30 23:32:32 np0005463759.novalocal sshd-session[105645]: Received disconnect from 154.92.109.196 port 2291:11: Bye Bye [preauth] Sep 30 23:32:32 np0005463759.novalocal sshd-session[105645]: Disconnected from authenticating user root 154.92.109.196 port 2291 [preauth] Sep 30 23:32:34 np0005463759.novalocal sshd-session[105651]: Invalid user shopify from 192.227.153.63 port 49966 Sep 30 23:32:34 np0005463759.novalocal sshd-session[105651]: Received disconnect from 192.227.153.63 port 49966:11: Bye Bye [preauth] Sep 30 23:32:34 np0005463759.novalocal sshd-session[105651]: Disconnected from invalid user shopify 192.227.153.63 port 49966 [preauth] Sep 30 23:32:55 np0005463759.novalocal sshd-session[105669]: Received disconnect from 218.51.148.194 port 59486:11: Bye Bye [preauth] Sep 30 23:32:55 np0005463759.novalocal sshd-session[105669]: Disconnected from authenticating user root 218.51.148.194 port 59486 [preauth] Sep 30 23:33:04 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:33:04 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:33:04 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:33:11 np0005463759.novalocal sudo[105690]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:33:11 np0005463759.novalocal systemd[1]: Started Session c89 of User root. Sep 30 23:33:11 np0005463759.novalocal sudo[105690]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:33:11 np0005463759.novalocal sudo[105690]: pam_unix(sudo:session): session closed for user root Sep 30 23:33:11 np0005463759.novalocal systemd[1]: session-c89.scope: Deactivated successfully. Sep 30 23:33:11 np0005463759.novalocal sudo[105694]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:33:11 np0005463759.novalocal systemd[1]: Started Session c90 of User root. Sep 30 23:33:11 np0005463759.novalocal sudo[105694]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:33:11 np0005463759.novalocal sudo[105694]: pam_unix(sudo:session): session closed for user root Sep 30 23:33:11 np0005463759.novalocal systemd[1]: session-c90.scope: Deactivated successfully. Sep 30 23:33:12 np0005463759.novalocal sudo[105698]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:33:12 np0005463759.novalocal systemd[1]: Started Session c91 of User root. Sep 30 23:33:12 np0005463759.novalocal sudo[105698]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:33:12 np0005463759.novalocal sudo[105698]: pam_unix(sudo:session): session closed for user root Sep 30 23:33:12 np0005463759.novalocal systemd[1]: session-c91.scope: Deactivated successfully. Sep 30 23:33:12 np0005463759.novalocal sudo[105703]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:33:12 np0005463759.novalocal systemd[1]: Started Session c92 of User root. Sep 30 23:33:12 np0005463759.novalocal sudo[105703]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:33:12 np0005463759.novalocal sudo[105703]: pam_unix(sudo:session): session closed for user root Sep 30 23:33:12 np0005463759.novalocal systemd[1]: session-c92.scope: Deactivated successfully. Sep 30 23:33:29 np0005463759.novalocal sudo[105774]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.default --privsep_sock_path /tmp/tmpfy4i4fme/privsep.sock Sep 30 23:33:29 np0005463759.novalocal systemd[1]: Started Session c93 of User root. Sep 30 23:33:29 np0005463759.novalocal sudo[105774]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Sep 30 23:33:30 np0005463759.novalocal sudo[105774]: pam_unix(sudo:session): session closed for user root Sep 30 23:33:31 np0005463759.novalocal sshd-session[105785]: Invalid user minecraft from 192.227.153.63 port 49068 Sep 30 23:33:31 np0005463759.novalocal sshd-session[105785]: Received disconnect from 192.227.153.63 port 49068:11: Bye Bye [preauth] Sep 30 23:33:31 np0005463759.novalocal sshd-session[105785]: Disconnected from invalid user minecraft 192.227.153.63 port 49068 [preauth] Sep 30 23:33:37 np0005463759.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Sep 30 23:33:37 np0005463759.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Sep 30 23:33:38 np0005463759.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service. Sep 30 23:33:38 np0005463759.novalocal sshd-session[105794]: Received disconnect from 154.92.109.196 port 23011:11: Bye Bye [preauth] Sep 30 23:33:38 np0005463759.novalocal sshd-session[105794]: Disconnected from authenticating user root 154.92.109.196 port 23011 [preauth] Sep 30 23:33:39 np0005463759.novalocal setroubleshoot[105796]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. For complete SELinux messages run: sealert -l 03552cac-9bca-483e-9f25-72e3acd1a3da Sep 30 23:33:39 np0005463759.novalocal setroubleshoot[105796]: SELinux is preventing /usr/bin/python3.9 from read access on the lnk_file /usr/bin/debuginfo-install. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed read access on the debuginfo-install lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'neutron-server:' --raw | audit2allow -M my-neutronserver # semodule -X 300 -i my-neutronserver.pp Sep 30 23:33:48 np0005463759.novalocal sudo[105830]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29 Sep 30 23:33:48 np0005463759.novalocal systemd[1]: Started Session c94 of User root. Sep 30 23:33:48 np0005463759.novalocal sudo[105830]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:33:48 np0005463759.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Deactivated successfully. Sep 30 23:33:48 np0005463759.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@8.service: Consumed 1.119s CPU time. Sep 30 23:33:48 np0005463759.novalocal sudo[105830]: pam_unix(sudo:session): session closed for user root Sep 30 23:33:48 np0005463759.novalocal systemd[1]: session-c94.scope: Deactivated successfully. Sep 30 23:33:48 np0005463759.novalocal sudo[105835]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate --name volume-0bb2fbf6-125c-4d11-90a4-5b0441684e06 --snapshot cinder-volumes/volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29 Sep 30 23:33:48 np0005463759.novalocal systemd[1]: Started Session c95 of User root. Sep 30 23:33:48 np0005463759.novalocal sudo[105835]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:33:49 np0005463759.novalocal dmeventd[99059]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Sep 30 23:33:49 np0005463759.novalocal dmeventd[99059]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Sep 30 23:33:49 np0005463759.novalocal lvm[105849]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:33:49 np0005463759.novalocal lvm[105849]: VG cinder-volumes finished Sep 30 23:33:49 np0005463759.novalocal sudo[105835]: pam_unix(sudo:session): session closed for user root Sep 30 23:33:49 np0005463759.novalocal systemd[1]: session-c95.scope: Deactivated successfully. Sep 30 23:33:49 np0005463759.novalocal sudo[105851]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -k n cinder-volumes/volume-0bb2fbf6-125c-4d11-90a4-5b0441684e06 Sep 30 23:33:49 np0005463759.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Sep 30 23:33:49 np0005463759.novalocal systemd[1]: setroubleshootd.service: Consumed 1.323s CPU time. Sep 30 23:33:49 np0005463759.novalocal systemd[1]: Started Session c96 of User root. Sep 30 23:33:49 np0005463759.novalocal sudo[105851]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:33:49 np0005463759.novalocal lvm[105856]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:33:49 np0005463759.novalocal lvm[105856]: VG cinder-volumes finished Sep 30 23:33:49 np0005463759.novalocal sudo[105851]: pam_unix(sudo:session): session closed for user root Sep 30 23:33:49 np0005463759.novalocal systemd[1]: session-c96.scope: Deactivated successfully. Sep 30 23:33:52 np0005463759.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Sep 30 23:33:53 np0005463759.novalocal sudo[105878]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29 Sep 30 23:33:53 np0005463759.novalocal systemd[1]: Started Session c97 of User root. Sep 30 23:33:53 np0005463759.novalocal sudo[105878]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:33:53 np0005463759.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Sep 30 23:33:53 np0005463759.novalocal sudo[105878]: pam_unix(sudo:session): session closed for user root Sep 30 23:33:53 np0005463759.novalocal systemd[1]: session-c97.scope: Deactivated successfully. Sep 30 23:33:53 np0005463759.novalocal sudo[105886]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29 iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29 tr2rMhvP7n8Qg2986JFx e3SNTBVxTo94GfN9 False -p3260 -a::1 Sep 30 23:33:53 np0005463759.novalocal systemd[1]: Started Session c98 of User root. Sep 30 23:33:53 np0005463759.novalocal sudo[105886]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:33:53 np0005463759.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service. Sep 30 23:33:54 np0005463759.novalocal sudo[105886]: pam_unix(sudo:session): session closed for user root Sep 30 23:33:54 np0005463759.novalocal systemd[1]: session-c98.scope: Deactivated successfully. Sep 30 23:33:54 np0005463759.novalocal sudo[105917]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Sep 30 23:33:54 np0005463759.novalocal systemd[1]: Started Session c99 of User root. Sep 30 23:33:54 np0005463759.novalocal sudo[105917]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:33:54 np0005463759.novalocal sudo[105917]: pam_unix(sudo:session): session closed for user root Sep 30 23:33:54 np0005463759.novalocal systemd[1]: session-c99.scope: Deactivated successfully. Sep 30 23:33:54 np0005463759.novalocal sudo[105924]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Sep 30 23:33:54 np0005463759.novalocal systemd[1]: Started Session c100 of User root. Sep 30 23:33:54 np0005463759.novalocal sudo[105924]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:33:54 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l ea75f89c-1d7a-4f9b-8d95-9b1913c9fcaf Sep 30 23:33:54 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l 6cae35ad-3d47-4bd4-b77e-9dabe6d585ff Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: failed to retrieve rpm info for path '/dev/vda1': Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l ab9dcf13-2124-489d-932d-8c317adc82db Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 576dcadc-f36e-402a-90af-04162b864cde Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 7ff0f317-843f-4f45-9d09-c35bfbe4940b Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 2f10addc-fd64-4754-839e-f6e74c8ef93e Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l b25aa180-bb41-4e3c-be39-738d12554b5c Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l 07dd388d-37b2-4580-bfe9-e26ba13b807d Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 8376bb97-c0bc-4a5d-8226-53cbdf2074c0 Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l 1c45d4da-2483-4949-a612-35ffea8601b5 Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-KDDoE7. For complete SELinux messages run: sealert -l 942818fd-5e5f-4973-b7ae-bd130705739e Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from 'read, write, open' accesses on the file /run/blkid/blkid.tab-KDDoE7. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read write open access on the blkid.tab-KDDoE7 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:33:55 np0005463759.novalocal sudo[105924]: pam_unix(sudo:session): session closed for user root Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-KDDoE7. For complete SELinux messages run: sealert -l 59de3957-9665-44c1-81ee-1f992fea3a09 Sep 30 23:33:55 np0005463759.novalocal systemd[1]: session-c100.scope: Deactivated successfully. Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-KDDoE7. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-KDDoE7 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 7315428d-661c-4ee3-a2bf-279d2905caa0 Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 3595cdd8-9087-4ec1-b0c7-db51cb42c932 Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:33:55 np0005463759.novalocal sudo[105933]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29 tr2rMhvP7n8Qg2986JFx e3SNTBVxTo94GfN9 iqn.1994-05.com.redhat:e8763877e0f9 Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l 5bac364c-3174-4dad-a4c5-0068b4af575c Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 2186c9ee-256b-44a5-a104-aba77d550395 Sep 30 23:33:55 np0005463759.novalocal systemd[1]: Started Session c101 of User root. Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). For complete SELinux messages run: sealert -l ed79ec23-2bed-4760-80c4-24180755fb4d Sep 30 23:33:55 np0005463759.novalocal sudo[105933]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:33:55 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from unlink access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:33:55 np0005463759.novalocal sudo[105933]: pam_unix(sudo:session): session closed for user root Sep 30 23:33:55 np0005463759.novalocal systemd[1]: session-c101.scope: Deactivated successfully. Sep 30 23:33:55 np0005463759.novalocal sudo[105938]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Sep 30 23:33:55 np0005463759.novalocal systemd[1]: Started Session c102 of User root. Sep 30 23:33:55 np0005463759.novalocal sudo[105938]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:33:56 np0005463759.novalocal sudo[105938]: pam_unix(sudo:session): session closed for user root Sep 30 23:33:56 np0005463759.novalocal systemd[1]: session-c102.scope: Deactivated successfully. Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 68adcfc5-43ec-40cc-902e-b1f995a405f8 Sep 30 23:33:56 np0005463759.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Sep 30 23:33:56 np0005463759.novalocal iscsid[83869]: iscsid: Connection3:0 to [target: iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29, portal: ::1,3260] through [iface: default] is operational now Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l da7dd66e-7faa-42fd-92d9-720ccdc29de4 Sep 30 23:33:56 np0005463759.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Sep 30 23:33:56 np0005463759.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Sep 30 23:33:56 np0005463759.novalocal kernel: scsi 2:0:0:0: alua: device naa.600140531332dff0123418bb99182376 port group 0 rel port 1 Sep 30 23:33:56 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Sep 30 23:33:56 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Sep 30 23:33:56 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Sep 30 23:33:56 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Sep 30 23:33:56 np0005463759.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Sep 30 23:33:56 np0005463759.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Sep 30 23:33:56 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Sep 30 23:33:56 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Sep 30 23:33:56 np0005463759.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Sep 30 23:33:56 np0005463759.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Sep 30 23:33:56 np0005463759.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:56 np0005463759.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Sep 30 23:33:56 np0005463759.novalocal kernel: GPT:229375 != 2097151 Sep 30 23:33:56 np0005463759.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Sep 30 23:33:56 np0005463759.novalocal kernel: GPT:229375 != 2097151 Sep 30 23:33:56 np0005463759.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Sep 30 23:33:56 np0005463759.novalocal kernel: sda: sda1 sda15 Sep 30 23:33:56 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 646beed4-88ff-466c-8a9e-b445068010a7 Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 7869df62-01da-440e-b5c8-9bea0427369d Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 8140d595-8e3f-4d5f-965d-5e80f8500ec2 Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 31b06990-2e65-4b38-976e-9edcd322510e Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 5ccb5141-5bba-4aa2-9795-445150e3cc5e Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l d9a63156-dcd5-4777-8e42-13192fa4522b Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 0dad90c3-a224-48d6-80dd-ec2e35760506 Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 5a451f8c-50ab-4c93-a39f-9037908da70d Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 1873e10b-8c0e-47a0-97e1-79da517e188d Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 5250d74d-ec40-459b-afc3-4b94308ebfc0 Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 039a50f3-bff5-45df-9aa6-1867fd78e6a9 Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29/::1,3260. For complete SELinux messages run: sealert -l aa841228-eeeb-446d-92d1-f74667383d1e Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29/::1,3260. For complete SELinux messages run: sealert -l 9d48f760-6bcd-4191-a608-77ebf9b3d54a Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:56 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l d004ae25-306f-4132-91d1-a215bb3afc76 Sep 30 23:33:57 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:57 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29. For complete SELinux messages run: sealert -l 5ccb5141-5bba-4aa2-9795-445150e3cc5e Sep 30 23:33:57 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:57 np0005463759.novalocal sudo[105991]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context os_brick.privileged.default --privsep_sock_path /tmp/tmp2inbj1bm/privsep.sock Sep 30 23:33:57 np0005463759.novalocal systemd[1]: Started Session c103 of User root. Sep 30 23:33:57 np0005463759.novalocal sudo[105991]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Sep 30 23:33:57 np0005463759.novalocal setroubleshoot[105874]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Sep 30 23:33:57 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l e3b6064d-bf0a-44cf-810f-872c1c118ec8 Sep 30 23:33:57 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Sep 30 23:33:57 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 0dd7f59f-ffab-475a-8de4-090bd48a01e4 Sep 30 23:33:57 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Sep 30 23:33:57 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l cb245f10-87ac-463d-888c-082df616fb86 Sep 30 23:33:57 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Sep 30 23:33:57 np0005463759.novalocal sudo[105997]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Sep 30 23:33:57 np0005463759.novalocal systemd[1]: Started Session c104 of User root. Sep 30 23:33:57 np0005463759.novalocal sudo[105997]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Sep 30 23:33:57 np0005463759.novalocal setroubleshoot[105874]: failed to retrieve rpm info for path '/dev/sda': Sep 30 23:33:58 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l ab9dcf13-2124-489d-932d-8c317adc82db Sep 30 23:33:58 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:33:58 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l e4cd6b17-5e92-4db8-85bc-e76cb667469f Sep 30 23:33:58 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Sep 30 23:33:58 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 11f232c5-0e4a-45a4-9918-3f0ce16b6224 Sep 30 23:33:58 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Sep 30 23:33:58 np0005463759.novalocal sudo[105997]: pam_unix(sudo:session): session closed for user root Sep 30 23:33:58 np0005463759.novalocal systemd[1]: session-c104.scope: Deactivated successfully. Sep 30 23:33:58 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l d5662977-5214-4908-9a90-5b62a166b2fc Sep 30 23:33:58 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Sep 30 23:33:58 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 69cb4831-33ea-460d-a1b0-1b98825b5013 Sep 30 23:33:58 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Sep 30 23:33:58 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 6ea6b9ae-8662-4328-8db2-40473d074542 Sep 30 23:33:58 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Sep 30 23:33:58 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 0451345a-6fb6-4dc8-a12b-9fa97b69a6d7 Sep 30 23:33:58 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Sep 30 23:33:58 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 944abb7f-6abd-4763-9953-7f99bd756a8f Sep 30 23:33:58 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Sep 30 23:33:58 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 576dcadc-f36e-402a-90af-04162b864cde Sep 30 23:33:58 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:33:58 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 7ff0f317-843f-4f45-9d09-c35bfbe4940b Sep 30 23:33:58 np0005463759.novalocal sudo[105991]: pam_unix(sudo:session): session closed for user root Sep 30 23:33:58 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:33:58 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 2f10addc-fd64-4754-839e-f6e74c8ef93e Sep 30 23:33:58 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:33:58 np0005463759.novalocal sudo[106020]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-0bb2fbf6-125c-4d11-90a4-5b0441684e06 Sep 30 23:33:58 np0005463759.novalocal systemd[1]: Started Session c105 of User root. Sep 30 23:33:58 np0005463759.novalocal sudo[106020]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:33:59 np0005463759.novalocal sudo[106023]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Sep 30 23:33:59 np0005463759.novalocal systemd[1]: Started Session c106 of User root. Sep 30 23:33:59 np0005463759.novalocal sudo[106023]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Sep 30 23:33:59 np0005463759.novalocal sudo[106023]: pam_unix(sudo:session): session closed for user root Sep 30 23:33:59 np0005463759.novalocal systemd[1]: session-c106.scope: Deactivated successfully. Sep 30 23:33:59 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 68adcfc5-43ec-40cc-902e-b1f995a405f8 Sep 30 23:33:59 np0005463759.novalocal sudo[106020]: pam_unix(sudo:session): session closed for user root Sep 30 23:33:59 np0005463759.novalocal systemd[1]: session-c105.scope: Deactivated successfully. Sep 30 23:33:59 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Sep 30 23:33:59 np0005463759.novalocal sudo[106042]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-0bb2fbf6-125c-4d11-90a4-5b0441684e06 iqn.2010-10.org.openstack:volume-0bb2fbf6-125c-4d11-90a4-5b0441684e06 QHtw7xx7QgCd5NNpHMba 3gCqy4B7vEPgFJnF False -p3260 -a::1 Sep 30 23:33:59 np0005463759.novalocal kernel: scsi 2:0:0:0: alua: Detached Sep 30 23:33:59 np0005463759.novalocal systemd[1]: Started Session c107 of User root. Sep 30 23:33:59 np0005463759.novalocal sudo[106042]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:33:59 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:59 np0005463759.novalocal iscsid[83869]: iscsid: Connection3:0 to [target: iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29, portal: ::1,3260] through [iface: default] is shutdown. Sep 30 23:33:59 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l 5ccb5141-5bba-4aa2-9795-445150e3cc5e Sep 30 23:33:59 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:59 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29/::1,3260. For complete SELinux messages run: sealert -l 9d48f760-6bcd-4191-a608-77ebf9b3d54a Sep 30 23:33:59 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:59 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l da7dd66e-7faa-42fd-92d9-720ccdc29de4 Sep 30 23:33:59 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:59 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 646beed4-88ff-466c-8a9e-b445068010a7 Sep 30 23:33:59 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:59 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 7869df62-01da-440e-b5c8-9bea0427369d Sep 30 23:33:59 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:59 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 8140d595-8e3f-4d5f-965d-5e80f8500ec2 Sep 30 23:33:59 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:59 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 31b06990-2e65-4b38-976e-9edcd322510e Sep 30 23:33:59 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:59 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l d004ae25-306f-4132-91d1-a215bb3afc76 Sep 30 23:33:59 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:59 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29/::1,3260. For complete SELinux messages run: sealert -l 4dc656fc-2daa-47c2-9a22-9b53f5d4d105 Sep 30 23:33:59 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:59 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29/::1,3260. For complete SELinux messages run: sealert -l 9d48f760-6bcd-4191-a608-77ebf9b3d54a Sep 30 23:33:59 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:59 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l d9a63156-dcd5-4777-8e42-13192fa4522b Sep 30 23:33:59 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:33:59 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 0dad90c3-a224-48d6-80dd-ec2e35760506 Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from using the sys_admin capability. For complete SELinux messages run: sealert -l bb3110f7-4547-4a06-8346-167d195fb168 Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from using the sys_admin capability. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should have the sys_admin capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 5c3a8a45-c9de-4bf4-ac8e-9d75a069bb74 Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Sep 30 23:34:00 np0005463759.novalocal sudo[106042]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:00 np0005463759.novalocal systemd[1]: session-c107.scope: Deactivated successfully. Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Sep 30 23:34:00 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 6bc8fc5d-399a-4847-9ea8-6b27bf971339 Sep 30 23:34:00 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:34:00 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 9605bfdd-d76a-472b-8588-e3f5c2368e63 Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Sep 30 23:34:00 np0005463759.novalocal sudo[106079]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l cb245f10-87ac-463d-888c-082df616fb86 Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l da7dd66e-7faa-42fd-92d9-720ccdc29de4 Sep 30 23:34:00 np0005463759.novalocal systemd[1]: Started Session c108 of User root. Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:34:00 np0005463759.novalocal sudo[106079]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 646beed4-88ff-466c-8a9e-b445068010a7 Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 31b06990-2e65-4b38-976e-9edcd322510e Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 0b914733-4a19-4ac4-a34d-2497fadaf82f Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 0dad90c3-a224-48d6-80dd-ec2e35760506 Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29. For complete SELinux messages run: sealert -l 5a451f8c-50ab-4c93-a39f-9037908da70d Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29 default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29 ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l e743175e-23c0-4be8-be6b-013beb4a9bd8 Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l e8d9a82c-6546-49b8-879e-4128f30a56ad Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29. For complete SELinux messages run: sealert -l 42b343e1-8d38-4d7c-a30e-0b64bfdf527d Sep 30 23:34:00 np0005463759.novalocal setroubleshoot[105874]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:34:00 np0005463759.novalocal sudo[106079]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:00 np0005463759.novalocal systemd[1]: session-c108.scope: Deactivated successfully. Sep 30 23:34:00 np0005463759.novalocal sudo[106085]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Sep 30 23:34:00 np0005463759.novalocal systemd[1]: Started Session c109 of User root. Sep 30 23:34:00 np0005463759.novalocal sudo[106085]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:34:01 np0005463759.novalocal sudo[106085]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:01 np0005463759.novalocal systemd[1]: session-c109.scope: Deactivated successfully. Sep 30 23:34:01 np0005463759.novalocal sudo[106090]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29 iqn.1994-05.com.redhat:e8763877e0f9 Sep 30 23:34:01 np0005463759.novalocal systemd[1]: Started Session c110 of User root. Sep 30 23:34:01 np0005463759.novalocal sudo[106090]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:34:01 np0005463759.novalocal sudo[106090]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:01 np0005463759.novalocal systemd[1]: session-c110.scope: Deactivated successfully. Sep 30 23:34:01 np0005463759.novalocal sudo[106095]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Sep 30 23:34:01 np0005463759.novalocal systemd[1]: Started Session c111 of User root. Sep 30 23:34:01 np0005463759.novalocal sudo[106095]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:34:02 np0005463759.novalocal sudo[106095]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:02 np0005463759.novalocal systemd[1]: session-c111.scope: Deactivated successfully. Sep 30 23:34:02 np0005463759.novalocal sudo[106100]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Sep 30 23:34:02 np0005463759.novalocal systemd[1]: Started Session c112 of User root. Sep 30 23:34:02 np0005463759.novalocal sudo[106100]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:34:02 np0005463759.novalocal sudo[106100]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:02 np0005463759.novalocal systemd[1]: session-c112.scope: Deactivated successfully. Sep 30 23:34:03 np0005463759.novalocal sudo[106105]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29 Sep 30 23:34:03 np0005463759.novalocal systemd[1]: Started Session c113 of User root. Sep 30 23:34:03 np0005463759.novalocal sudo[106105]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:34:03 np0005463759.novalocal sudo[106105]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:03 np0005463759.novalocal systemd[1]: session-c113.scope: Deactivated successfully. Sep 30 23:34:03 np0005463759.novalocal sudo[106110]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Sep 30 23:34:03 np0005463759.novalocal systemd[1]: Started Session c114 of User root. Sep 30 23:34:03 np0005463759.novalocal sudo[106110]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:34:04 np0005463759.novalocal sudo[106110]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:04 np0005463759.novalocal systemd[1]: session-c114.scope: Deactivated successfully. Sep 30 23:34:04 np0005463759.novalocal sudo[106117]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-0bb2fbf6-125c-4d11-90a4-5b0441684e06 QHtw7xx7QgCd5NNpHMba 3gCqy4B7vEPgFJnF iqn.1994-05.com.redhat:e8763877e0f9 Sep 30 23:34:04 np0005463759.novalocal systemd[1]: Started Session c115 of User root. Sep 30 23:34:04 np0005463759.novalocal sudo[106117]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:34:04 np0005463759.novalocal sudo[106123]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context nova.privsep.sys_admin_pctxt --privsep_sock_path /tmp/tmpo766fjr_/privsep.sock Sep 30 23:34:04 np0005463759.novalocal systemd[1]: Started Session c116 of User root. Sep 30 23:34:04 np0005463759.novalocal sudo[106123]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Sep 30 23:34:04 np0005463759.novalocal sudo[106117]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:04 np0005463759.novalocal systemd[1]: session-c115.scope: Deactivated successfully. Sep 30 23:34:04 np0005463759.novalocal sudo[106129]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Sep 30 23:34:04 np0005463759.novalocal systemd[1]: Started Session c117 of User root. Sep 30 23:34:04 np0005463759.novalocal sudo[106129]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:34:05 np0005463759.novalocal sudo[106123]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:05 np0005463759.novalocal sudo[106129]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:05 np0005463759.novalocal systemd[1]: session-c117.scope: Deactivated successfully. Sep 30 23:34:06 np0005463759.novalocal sudo[106151]: nova : PWD=/ ; USER=root ; COMMAND=/usr/bin/nova-rootwrap /etc/nova/rootwrap.conf privsep-helper --config-file /etc/nova/nova.conf --config-file /etc/nova/nova-compute.conf --privsep_context vif_plug_ovs.privsep.vif_plug --privsep_sock_path /tmp/tmpormuphcr/privsep.sock Sep 30 23:34:06 np0005463759.novalocal systemd[1]: Started Session c118 of User root. Sep 30 23:34:06 np0005463759.novalocal sudo[106151]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=162) Sep 30 23:34:07 np0005463759.novalocal sudo[106151]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:07 np0005463759.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Sep 30 23:34:07 np0005463759.novalocal iscsid[83869]: iscsid: Connection4:0 to [target: iqn.2010-10.org.openstack:volume-0bb2fbf6-125c-4d11-90a4-5b0441684e06, portal: ::1,3260] through [iface: default] is operational now Sep 30 23:34:07 np0005463759.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Sep 30 23:34:07 np0005463759.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Sep 30 23:34:07 np0005463759.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405b0b9a039b9f04c00936ba03db port group 0 rel port 2 Sep 30 23:34:07 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Sep 30 23:34:07 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Sep 30 23:34:07 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Sep 30 23:34:07 np0005463759.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Sep 30 23:34:07 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Sep 30 23:34:07 np0005463759.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Sep 30 23:34:07 np0005463759.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Sep 30 23:34:07 np0005463759.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Sep 30 23:34:07 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Sep 30 23:34:07 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Sep 30 23:34:07 np0005463759.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Sep 30 23:34:07 np0005463759.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Sep 30 23:34:07 np0005463759.novalocal kernel: GPT:229375 != 2097151 Sep 30 23:34:07 np0005463759.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Sep 30 23:34:07 np0005463759.novalocal kernel: GPT:229375 != 2097151 Sep 30 23:34:07 np0005463759.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Sep 30 23:34:07 np0005463759.novalocal kernel: sda: sda1 sda15 Sep 30 23:34:07 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Sep 30 23:34:08 np0005463759.novalocal kernel: tun: Universal TUN/TAP device driver, 1.6 Sep 30 23:34:08 np0005463759.novalocal kernel: tap86c418e8-c3: entered promiscuous mode Sep 30 23:34:08 np0005463759.novalocal systemd-udevd[106188]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:34:08 np0005463759.novalocal NetworkManager[858]: [1759289648.6339] manager: (tap86c418e8-c3): new Tun device (/org/freedesktop/NetworkManager/Devices/9) Sep 30 23:34:08 np0005463759.novalocal NetworkManager[858]: [1759289648.6689] device (tap86c418e8-c3): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Sep 30 23:34:08 np0005463759.novalocal virtqemud[103209]: Domain id=1 name='instance-00000001' uuid=7af42586-249c-432c-8479-a327dae37b13 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Sep 30 23:34:08 np0005463759.novalocal virtqemud[103209]: Domain id=1 name='instance-00000001' uuid=7af42586-249c-432c-8479-a327dae37b13 is tainted: deprecated-config (CPU model 'qemu64') Sep 30 23:34:08 np0005463759.novalocal NetworkManager[858]: [1759289648.6700] device (tap86c418e8-c3): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Sep 30 23:34:08 np0005463759.novalocal systemd-machined[100508]: New machine qemu-1-instance-00000001. Sep 30 23:34:08 np0005463759.novalocal systemd[1]: Started Virtual Machine qemu-1-instance-00000001. Sep 30 23:34:08 np0005463759.novalocal systemd[1]: Listening on libvirt secret daemon admin socket. Sep 30 23:34:08 np0005463759.novalocal systemd[1]: Listening on libvirt secret daemon read-only socket. Sep 30 23:34:08 np0005463759.novalocal systemd[1]: Starting libvirt secret daemon... Sep 30 23:34:08 np0005463759.novalocal systemd[1]: Started libvirt secret daemon. Sep 30 23:34:08 np0005463759.novalocal sudo[106234]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /etc/neutron/plugins/ml2/ovn_agent.ini --config-dir /etc/neutron/conf.d/neutron-ovn-agent --privsep_context neutron.privileged.link_cmd --privsep_sock_path /tmp/tmpq2qt2dq9/privsep.sock Sep 30 23:34:08 np0005463759.novalocal systemd[1]: Started Session c119 of User root. Sep 30 23:34:08 np0005463759.novalocal sudo[106234]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Sep 30 23:34:09 np0005463759.novalocal sshd-session[106203]: Invalid user test from 218.51.148.194 port 55248 Sep 30 23:34:09 np0005463759.novalocal sudo[106234]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:09 np0005463759.novalocal sshd-session[106203]: Received disconnect from 218.51.148.194 port 55248:11: Bye Bye [preauth] Sep 30 23:34:09 np0005463759.novalocal sshd-session[106203]: Disconnected from invalid user test 218.51.148.194 port 55248 [preauth] Sep 30 23:34:10 np0005463759.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service: Deactivated successfully. Sep 30 23:34:10 np0005463759.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@9.service: Consumed 1.215s CPU time. Sep 30 23:34:10 np0005463759.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Sep 30 23:34:10 np0005463759.novalocal systemd[1]: setroubleshootd.service: Consumed 3.767s CPU time. Sep 30 23:34:10 np0005463759.novalocal NetworkManager[858]: [1759289650.9188] manager: (tapce2d3236-f0): new Veth device (/org/freedesktop/NetworkManager/Devices/10) Sep 30 23:34:10 np0005463759.novalocal systemd-udevd[106285]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:34:10 np0005463759.novalocal kernel: tap4b083568-9d: entered promiscuous mode Sep 30 23:34:10 np0005463759.novalocal NetworkManager[858]: [1759289650.9752] manager: (tap4b083568-9d): new Tun device (/org/freedesktop/NetworkManager/Devices/11) Sep 30 23:34:10 np0005463759.novalocal systemd-udevd[106284]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:34:11 np0005463759.novalocal NetworkManager[858]: [1759289651.0219] device (tap4b083568-9d): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Sep 30 23:34:11 np0005463759.novalocal NetworkManager[858]: [1759289651.0241] device (tap4b083568-9d): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Sep 30 23:34:11 np0005463759.novalocal virtqemud[103209]: Domain id=2 name='instance-00000002' uuid=d18d2d69-607c-45ee-8f12-9b488d60765e is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Sep 30 23:34:11 np0005463759.novalocal virtqemud[103209]: Domain id=2 name='instance-00000002' uuid=d18d2d69-607c-45ee-8f12-9b488d60765e is tainted: deprecated-config (CPU model 'qemu64') Sep 30 23:34:11 np0005463759.novalocal NetworkManager[858]: [1759289651.0346] device (tapce2d3236-f0): carrier: link connected Sep 30 23:34:11 np0005463759.novalocal systemd-machined[100508]: New machine qemu-2-instance-00000002. Sep 30 23:34:11 np0005463759.novalocal systemd[1]: Started Virtual Machine qemu-2-instance-00000002. Sep 30 23:34:11 np0005463759.novalocal kernel: tapce2d3236-f0: entered promiscuous mode Sep 30 23:34:11 np0005463759.novalocal sudo[106329]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:34:11 np0005463759.novalocal systemd[1]: Started Session c120 of User root. Sep 30 23:34:11 np0005463759.novalocal sudo[106329]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:34:11 np0005463759.novalocal sudo[106333]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-ce2d3236-fade-4edf-b835-74f4ebefe85e env PROCESS_TAG=haproxy-ce2d3236-fade-4edf-b835-74f4ebefe85e haproxy -f /var/lib/neutron/ovn-metadata-proxy/ce2d3236-fade-4edf-b835-74f4ebefe85e.conf Sep 30 23:34:11 np0005463759.novalocal systemd[1]: Started Session c121 of User root. Sep 30 23:34:11 np0005463759.novalocal sudo[106333]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Sep 30 23:34:11 np0005463759.novalocal sudo[106329]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:11 np0005463759.novalocal systemd[1]: session-c120.scope: Deactivated successfully. Sep 30 23:34:11 np0005463759.novalocal sudo[106347]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:34:11 np0005463759.novalocal sudo[106333]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:11 np0005463759.novalocal systemd[1]: Started Session c122 of User root. Sep 30 23:34:11 np0005463759.novalocal sudo[106347]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:34:11 np0005463759.novalocal NetworkManager[858]: [1759289651.8666] manager: (tapc5f5cbdf-a0): new Veth device (/org/freedesktop/NetworkManager/Devices/12) Sep 30 23:34:11 np0005463759.novalocal systemd-udevd[106303]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:34:11 np0005463759.novalocal NetworkManager[858]: [1759289651.9339] device (tapc5f5cbdf-a0): carrier: link connected Sep 30 23:34:12 np0005463759.novalocal sudo[106347]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:12 np0005463759.novalocal systemd[1]: session-c122.scope: Deactivated successfully. Sep 30 23:34:12 np0005463759.novalocal sudo[106370]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:34:12 np0005463759.novalocal kernel: tapc5f5cbdf-a0: entered promiscuous mode Sep 30 23:34:12 np0005463759.novalocal systemd[1]: Started Session c123 of User root. Sep 30 23:34:12 np0005463759.novalocal sudo[106370]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:34:12 np0005463759.novalocal sudo[106375]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-c5f5cbdf-a3d8-4a30-ab1b-74aec1a73a2c env PROCESS_TAG=haproxy-c5f5cbdf-a3d8-4a30-ab1b-74aec1a73a2c haproxy -f /var/lib/neutron/ovn-metadata-proxy/c5f5cbdf-a3d8-4a30-ab1b-74aec1a73a2c.conf Sep 30 23:34:12 np0005463759.novalocal systemd[1]: Started Session c124 of User root. Sep 30 23:34:12 np0005463759.novalocal sudo[106375]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Sep 30 23:34:12 np0005463759.novalocal sudo[106370]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:12 np0005463759.novalocal systemd[1]: session-c123.scope: Deactivated successfully. Sep 30 23:34:12 np0005463759.novalocal sudo[106379]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:34:12 np0005463759.novalocal systemd[1]: Started Session c125 of User root. Sep 30 23:34:12 np0005463759.novalocal sudo[106379]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:34:12 np0005463759.novalocal sudo[106375]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:12 np0005463759.novalocal sudo[106379]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:12 np0005463759.novalocal systemd[1]: session-c125.scope: Deactivated successfully. Sep 30 23:34:24 np0005463759.novalocal kernel: tap4b083568-9d (unregistering): left promiscuous mode Sep 30 23:34:24 np0005463759.novalocal NetworkManager[858]: [1759289664.1532] device (tap4b083568-9d): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Sep 30 23:34:24 np0005463759.novalocal systemd[1]: session-c124.scope: Deactivated successfully. Sep 30 23:34:24 np0005463759.novalocal kernel: tapc5f5cbdf-a0: left promiscuous mode Sep 30 23:34:24 np0005463759.novalocal systemd[1]: machine-qemu\x2d2\x2dinstance\x2d00000002.scope: Deactivated successfully. Sep 30 23:34:24 np0005463759.novalocal systemd[1]: machine-qemu\x2d2\x2dinstance\x2d00000002.scope: Consumed 12.697s CPU time. Sep 30 23:34:24 np0005463759.novalocal systemd-machined[100508]: Machine qemu-2-instance-00000002 terminated. Sep 30 23:34:24 np0005463759.novalocal systemd[1]: run-netns-ovnmeta\x2dc5f5cbdf\x2da3d8\x2d4a30\x2dab1b\x2d74aec1a73a2c.mount: Deactivated successfully. Sep 30 23:34:24 np0005463759.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Sep 30 23:34:24 np0005463759.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Sep 30 23:34:24 np0005463759.novalocal kernel: GPT:229375 != 2097151 Sep 30 23:34:24 np0005463759.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Sep 30 23:34:24 np0005463759.novalocal kernel: GPT:229375 != 2097151 Sep 30 23:34:24 np0005463759.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Sep 30 23:34:24 np0005463759.novalocal kernel: sda: sda1 sda15 Sep 30 23:34:24 np0005463759.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Sep 30 23:34:24 np0005463759.novalocal kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Sep 30 23:34:24 np0005463759.novalocal kernel: GPT:229375 != 2097151 Sep 30 23:34:24 np0005463759.novalocal kernel: GPT:Alternate GPT header not at the end of the disk. Sep 30 23:34:24 np0005463759.novalocal kernel: GPT:229375 != 2097151 Sep 30 23:34:24 np0005463759.novalocal kernel: GPT: Use GNU Parted to correct GPT errors. Sep 30 23:34:24 np0005463759.novalocal kernel: sda: sda1 sda15 Sep 30 23:34:25 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Sep 30 23:34:25 np0005463759.novalocal kernel: scsi 2:0:0:0: alua: Detached Sep 30 23:34:25 np0005463759.novalocal iscsid[83869]: iscsid: Connection4:0 to [target: iqn.2010-10.org.openstack:volume-0bb2fbf6-125c-4d11-90a4-5b0441684e06, portal: ::1,3260] through [iface: default] is shutdown. Sep 30 23:34:27 np0005463759.novalocal sudo[106542]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-0bb2fbf6-125c-4d11-90a4-5b0441684e06 iqn.1994-05.com.redhat:e8763877e0f9 Sep 30 23:34:27 np0005463759.novalocal systemd[1]: Started Session c126 of User root. Sep 30 23:34:27 np0005463759.novalocal sudo[106542]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:34:27 np0005463759.novalocal sudo[106542]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:27 np0005463759.novalocal systemd[1]: session-c126.scope: Deactivated successfully. Sep 30 23:34:27 np0005463759.novalocal sudo[106547]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Sep 30 23:34:27 np0005463759.novalocal systemd[1]: Started Session c127 of User root. Sep 30 23:34:28 np0005463759.novalocal sudo[106547]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:34:28 np0005463759.novalocal sudo[106547]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:28 np0005463759.novalocal systemd[1]: session-c127.scope: Deactivated successfully. Sep 30 23:34:28 np0005463759.novalocal sudo[106552]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Sep 30 23:34:28 np0005463759.novalocal systemd[1]: Started Session c128 of User root. Sep 30 23:34:28 np0005463759.novalocal sudo[106552]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:34:29 np0005463759.novalocal sudo[106552]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:29 np0005463759.novalocal systemd[1]: session-c128.scope: Deactivated successfully. Sep 30 23:34:29 np0005463759.novalocal sudo[106557]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-0bb2fbf6-125c-4d11-90a4-5b0441684e06 Sep 30 23:34:29 np0005463759.novalocal systemd[1]: Started Session c129 of User root. Sep 30 23:34:29 np0005463759.novalocal sudo[106557]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:34:29 np0005463759.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Sep 30 23:34:29 np0005463759.novalocal sudo[106557]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:29 np0005463759.novalocal systemd[1]: session-c129.scope: Deactivated successfully. Sep 30 23:34:29 np0005463759.novalocal sudo[106563]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Sep 30 23:34:29 np0005463759.novalocal systemd[1]: Started Session c130 of User root. Sep 30 23:34:29 np0005463759.novalocal sudo[106563]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:34:30 np0005463759.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Sep 30 23:34:30 np0005463759.novalocal sudo[106563]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:30 np0005463759.novalocal systemd[1]: session-c130.scope: Deactivated successfully. Sep 30 23:34:30 np0005463759.novalocal sudo[106568]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Sep 30 23:34:30 np0005463759.novalocal systemd[1]: Started Session c131 of User root. Sep 30 23:34:30 np0005463759.novalocal sudo[106568]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:34:30 np0005463759.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service. Sep 30 23:34:30 np0005463759.novalocal sudo[106568]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:30 np0005463759.novalocal systemd[1]: session-c131.scope: Deactivated successfully. Sep 30 23:34:31 np0005463759.novalocal sudo[106583]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-0bb2fbf6-125c-4d11-90a4-5b0441684e06 Sep 30 23:34:31 np0005463759.novalocal systemd[1]: Started Session c132 of User root. Sep 30 23:34:31 np0005463759.novalocal sudo[106583]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:34:31 np0005463759.novalocal sudo[106583]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:31 np0005463759.novalocal systemd[1]: session-c132.scope: Deactivated successfully. Sep 30 23:34:31 np0005463759.novalocal sudo[106589]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-0bb2fbf6-125c-4d11-90a4-5b0441684e06 Sep 30 23:34:31 np0005463759.novalocal systemd[1]: Started Session c133 of User root. Sep 30 23:34:31 np0005463759.novalocal sudo[106589]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:34:31 np0005463759.novalocal setroubleshoot[106562]: SELinux is preventing /usr/sbin/httpd from read access on the file a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. For complete SELinux messages run: sealert -l cf496c8c-af69-48aa-ba6e-0f5c11cd28f1 Sep 30 23:34:31 np0005463759.novalocal setroubleshoot[106562]: SELinux is preventing /usr/sbin/httpd from read access on the file a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:34:31 np0005463759.novalocal sudo[106589]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:31 np0005463759.novalocal systemd[1]: session-c133.scope: Deactivated successfully. Sep 30 23:34:31 np0005463759.novalocal sudo[106595]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-0bb2fbf6-125c-4d11-90a4-5b0441684e06 Sep 30 23:34:31 np0005463759.novalocal systemd[1]: Started Session c134 of User root. Sep 30 23:34:31 np0005463759.novalocal sudo[106595]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:34:31 np0005463759.novalocal haproxy-metadata-proxy-ce2d3236-fade-4edf-b835-74f4ebefe85e[106340]: 10.100.0.9:59002 [30/Sep/2025:23:34:28.833] listener listener/metadata 0/0/0/3083/3083 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Sep 30 23:34:31 np0005463759.novalocal setroubleshoot[106562]: failed to retrieve rpm info for path '/var/lib/nova/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d': Sep 30 23:34:32 np0005463759.novalocal setroubleshoot[106562]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. For complete SELinux messages run: sealert -l 12fa2924-3215-42a6-9bb9-206d7e528973 Sep 30 23:34:32 np0005463759.novalocal setroubleshoot[106562]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed open access on the a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:34:32 np0005463759.novalocal setroubleshoot[106562]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. For complete SELinux messages run: sealert -l 9c1d857b-6311-4f4d-9988-ec0bcd1b4833 Sep 30 23:34:32 np0005463759.novalocal setroubleshoot[106562]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:34:32 np0005463759.novalocal setroubleshoot[106562]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. For complete SELinux messages run: sealert -l 424cd235-43f1-453c-be23-da36364a5d33 Sep 30 23:34:32 np0005463759.novalocal setroubleshoot[106562]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:34:32 np0005463759.novalocal lvm[106604]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:34:32 np0005463759.novalocal lvm[106604]: VG cinder-volumes finished Sep 30 23:34:32 np0005463759.novalocal sudo[106595]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:32 np0005463759.novalocal systemd[1]: session-c134.scope: Deactivated successfully. Sep 30 23:34:32 np0005463759.novalocal sudo[106607]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:34:32 np0005463759.novalocal systemd[1]: Started Session c135 of User root. Sep 30 23:34:32 np0005463759.novalocal sudo[106607]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:34:32 np0005463759.novalocal sshd-session[106605]: Invalid user ftpuser3 from 192.227.153.63 port 48746 Sep 30 23:34:32 np0005463759.novalocal sshd-session[106605]: Received disconnect from 192.227.153.63 port 48746:11: Bye Bye [preauth] Sep 30 23:34:32 np0005463759.novalocal sshd-session[106605]: Disconnected from invalid user ftpuser3 192.227.153.63 port 48746 [preauth] Sep 30 23:34:32 np0005463759.novalocal setroubleshoot[106562]: SELinux is preventing /usr/sbin/httpd from read access on the file a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. For complete SELinux messages run: sealert -l cf496c8c-af69-48aa-ba6e-0f5c11cd28f1 Sep 30 23:34:32 np0005463759.novalocal setroubleshoot[106562]: SELinux is preventing /usr/sbin/httpd from read access on the file a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed read access on the a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:34:32 np0005463759.novalocal setroubleshoot[106562]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. For complete SELinux messages run: sealert -l 12fa2924-3215-42a6-9bb9-206d7e528973 Sep 30 23:34:32 np0005463759.novalocal setroubleshoot[106562]: SELinux is preventing /usr/sbin/httpd from open access on the file /var/lib/nova/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed open access on the a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:34:32 np0005463759.novalocal setroubleshoot[106562]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. For complete SELinux messages run: sealert -l 9c1d857b-6311-4f4d-9988-ec0bcd1b4833 Sep 30 23:34:32 np0005463759.novalocal setroubleshoot[106562]: SELinux is preventing /usr/sbin/httpd from getattr access on the file /var/lib/nova/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:34:32 np0005463759.novalocal sudo[106607]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:32 np0005463759.novalocal systemd[1]: session-c135.scope: Deactivated successfully. Sep 30 23:34:32 np0005463759.novalocal setroubleshoot[106562]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. For complete SELinux messages run: sealert -l 424cd235-43f1-453c-be23-da36364a5d33 Sep 30 23:34:32 np0005463759.novalocal sudo[106612]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:34:32 np0005463759.novalocal setroubleshoot[106562]: SELinux is preventing /usr/sbin/httpd from ioctl access on the file /var/lib/nova/.cache/python-entrypoints/a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed ioctl access on the a51b3041dbe176930f64c84bdf53ff7f5a8ba4d4e86bb02cf11c5829bdcccf6d file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:34:32 np0005463759.novalocal systemd[1]: Started Session c136 of User root. Sep 30 23:34:32 np0005463759.novalocal sudo[106612]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:34:33 np0005463759.novalocal sudo[106612]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:33 np0005463759.novalocal systemd[1]: session-c136.scope: Deactivated successfully. Sep 30 23:34:33 np0005463759.novalocal sudo[106616]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:34:33 np0005463759.novalocal systemd[1]: Started Session c137 of User root. Sep 30 23:34:33 np0005463759.novalocal sudo[106616]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:34:33 np0005463759.novalocal sudo[106616]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:33 np0005463759.novalocal systemd[1]: session-c137.scope: Deactivated successfully. Sep 30 23:34:33 np0005463759.novalocal sudo[106622]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:34:33 np0005463759.novalocal systemd[1]: Started Session c138 of User root. Sep 30 23:34:33 np0005463759.novalocal sudo[106622]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:34:34 np0005463759.novalocal sudo[106622]: pam_unix(sudo:session): session closed for user root Sep 30 23:34:34 np0005463759.novalocal systemd[1]: session-c138.scope: Deactivated successfully. Sep 30 23:34:34 np0005463759.novalocal haproxy-metadata-proxy-ce2d3236-fade-4edf-b835-74f4ebefe85e[106340]: 10.100.0.9:59004 [30/Sep/2025:23:34:32.016] listener listener/metadata 0/0/0/2379/2379 200 148 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Sep 30 23:34:34 np0005463759.novalocal haproxy-metadata-proxy-ce2d3236-fade-4edf-b835-74f4ebefe85e[106340]: 10.100.0.9:39670 [30/Sep/2025:23:34:34.451] listener listener/metadata 0/0/0/24/24 200 325 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Sep 30 23:34:34 np0005463759.novalocal haproxy-metadata-proxy-ce2d3236-fade-4edf-b835-74f4ebefe85e[106340]: 10.100.0.9:39674 [30/Sep/2025:23:34:34.565] listener listener/metadata 0/0/0/20/20 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Sep 30 23:34:34 np0005463759.novalocal haproxy-metadata-proxy-ce2d3236-fade-4edf-b835-74f4ebefe85e[106340]: 10.100.0.9:39678 [30/Sep/2025:23:34:34.649] listener listener/metadata 0/0/0/16/16 200 120 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Sep 30 23:34:34 np0005463759.novalocal haproxy-metadata-proxy-ce2d3236-fade-4edf-b835-74f4ebefe85e[106340]: 10.100.0.9:39682 [30/Sep/2025:23:34:34.718] listener listener/metadata 0/0/0/16/16 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Sep 30 23:34:34 np0005463759.novalocal haproxy-metadata-proxy-ce2d3236-fade-4edf-b835-74f4ebefe85e[106340]: 10.100.0.9:39694 [30/Sep/2025:23:34:34.780] listener listener/metadata 0/0/0/22/22 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Sep 30 23:34:34 np0005463759.novalocal haproxy-metadata-proxy-ce2d3236-fade-4edf-b835-74f4ebefe85e[106340]: 10.100.0.9:39706 [30/Sep/2025:23:34:34.850] listener listener/metadata 0/0/0/19/19 200 131 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Sep 30 23:34:34 np0005463759.novalocal haproxy-metadata-proxy-ce2d3236-fade-4edf-b835-74f4ebefe85e[106340]: 10.100.0.9:39712 [30/Sep/2025:23:34:34.913] listener listener/metadata 0/0/0/15/15 200 184 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Sep 30 23:34:34 np0005463759.novalocal haproxy-metadata-proxy-ce2d3236-fade-4edf-b835-74f4ebefe85e[106340]: 10.100.0.9:39724 [30/Sep/2025:23:34:34.971] listener listener/metadata 0/0/0/16/16 200 184 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Sep 30 23:34:35 np0005463759.novalocal haproxy-metadata-proxy-ce2d3236-fade-4edf-b835-74f4ebefe85e[106340]: 10.100.0.9:39728 [30/Sep/2025:23:34:35.022] listener listener/metadata 0/0/0/15/15 200 215 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Sep 30 23:34:35 np0005463759.novalocal haproxy-metadata-proxy-ce2d3236-fade-4edf-b835-74f4ebefe85e[106340]: 10.100.0.9:39736 [30/Sep/2025:23:34:35.072] listener listener/metadata 0/0/0/15/15 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Sep 30 23:34:35 np0005463759.novalocal haproxy-metadata-proxy-ce2d3236-fade-4edf-b835-74f4ebefe85e[106340]: 10.100.0.9:39750 [30/Sep/2025:23:34:35.113] listener listener/metadata 0/0/0/18/18 200 122 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Sep 30 23:34:35 np0005463759.novalocal haproxy-metadata-proxy-ce2d3236-fade-4edf-b835-74f4ebefe85e[106340]: 10.100.0.9:39760 [30/Sep/2025:23:34:35.163] listener listener/metadata 0/0/0/18/18 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Sep 30 23:34:35 np0005463759.novalocal haproxy-metadata-proxy-ce2d3236-fade-4edf-b835-74f4ebefe85e[106340]: 10.100.0.9:39770 [30/Sep/2025:23:34:35.217] listener listener/metadata 0/0/0/18/18 200 184 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Sep 30 23:34:35 np0005463759.novalocal haproxy-metadata-proxy-ce2d3236-fade-4edf-b835-74f4ebefe85e[106340]: 10.100.0.9:39786 [30/Sep/2025:23:34:35.269] listener listener/metadata 0/0/0/18/18 200 123 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Sep 30 23:34:42 np0005463759.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service: Deactivated successfully. Sep 30 23:34:42 np0005463759.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@10.service: Consumed 1.170s CPU time. Sep 30 23:34:43 np0005463759.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Sep 30 23:34:43 np0005463759.novalocal systemd[1]: setroubleshootd.service: Consumed 1.581s CPU time. Sep 30 23:34:49 np0005463759.novalocal sshd-session[106639]: Invalid user produccion from 154.92.109.196 port 2594 Sep 30 23:34:49 np0005463759.novalocal sshd-session[106639]: Received disconnect from 154.92.109.196 port 2594:11: Bye Bye [preauth] Sep 30 23:34:49 np0005463759.novalocal sshd-session[106639]: Disconnected from invalid user produccion 154.92.109.196 port 2594 [preauth] Sep 30 23:34:53 np0005463759.novalocal kernel: tapce2a5212-39: entered promiscuous mode Sep 30 23:34:53 np0005463759.novalocal NetworkManager[858]: [1759289693.8309] manager: (tapce2a5212-39): new Tun device (/org/freedesktop/NetworkManager/Devices/13) Sep 30 23:34:53 np0005463759.novalocal virtqemud[103209]: Domain id=3 name='instance-00000003' uuid=3b01a20b-244d-40ac-9be2-b065d16e6ea1 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Sep 30 23:34:53 np0005463759.novalocal virtqemud[103209]: Domain id=3 name='instance-00000003' uuid=3b01a20b-244d-40ac-9be2-b065d16e6ea1 is tainted: deprecated-config (CPU model 'qemu64') Sep 30 23:34:53 np0005463759.novalocal systemd-machined[100508]: New machine qemu-3-instance-00000003. Sep 30 23:34:53 np0005463759.novalocal systemd-udevd[106678]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:34:53 np0005463759.novalocal systemd[1]: Started Virtual Machine qemu-3-instance-00000003. Sep 30 23:34:53 np0005463759.novalocal NetworkManager[858]: [1759289693.9284] device (tapce2a5212-39): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Sep 30 23:34:53 np0005463759.novalocal NetworkManager[858]: [1759289693.9294] device (tapce2a5212-39): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Sep 30 23:34:53 np0005463759.novalocal NetworkManager[858]: [1759289693.9954] manager: (tap1f3884a0-c0): new Veth device (/org/freedesktop/NetworkManager/Devices/14) Sep 30 23:34:54 np0005463759.novalocal systemd-udevd[106681]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:34:54 np0005463759.novalocal NetworkManager[858]: [1759289694.0946] device (tap1f3884a0-c0): carrier: link connected Sep 30 23:34:54 np0005463759.novalocal kernel: tap1f3884a0-c0: entered promiscuous mode Sep 30 23:34:54 np0005463759.novalocal sudo[106722]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-1f3884a0-cf10-4b66-a19b-fa198997e411 env PROCESS_TAG=haproxy-1f3884a0-cf10-4b66-a19b-fa198997e411 haproxy -f /var/lib/neutron/ovn-metadata-proxy/1f3884a0-cf10-4b66-a19b-fa198997e411.conf Sep 30 23:34:54 np0005463759.novalocal systemd[1]: Started Session c139 of User root. Sep 30 23:34:54 np0005463759.novalocal sudo[106722]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Sep 30 23:34:54 np0005463759.novalocal sudo[106722]: pam_unix(sudo:session): session closed for user root Sep 30 23:35:01 np0005463759.novalocal kernel: tap86c418e8-c3 (unregistering): left promiscuous mode Sep 30 23:35:01 np0005463759.novalocal NetworkManager[858]: [1759289701.1772] device (tap86c418e8-c3): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Sep 30 23:35:01 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:35:01 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:35:01 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:35:01 np0005463759.novalocal systemd[1]: session-c121.scope: Deactivated successfully. Sep 30 23:35:01 np0005463759.novalocal systemd[1]: machine-qemu\x2d1\x2dinstance\x2d00000001.scope: Deactivated successfully. Sep 30 23:35:01 np0005463759.novalocal systemd[1]: machine-qemu\x2d1\x2dinstance\x2d00000001.scope: Consumed 21.796s CPU time. Sep 30 23:35:01 np0005463759.novalocal kernel: tapce2d3236-f0: left promiscuous mode Sep 30 23:35:01 np0005463759.novalocal systemd-machined[100508]: Machine qemu-1-instance-00000001 terminated. Sep 30 23:35:01 np0005463759.novalocal systemd[1]: run-netns-ovnmeta\x2dce2d3236\x2dfade\x2d4edf\x2db835\x2d74f4ebefe85e.mount: Deactivated successfully. Sep 30 23:35:06 np0005463759.novalocal kernel: tapce2a5212-39 (unregistering): left promiscuous mode Sep 30 23:35:06 np0005463759.novalocal NetworkManager[858]: [1759289706.5627] device (tapce2a5212-39): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Sep 30 23:35:06 np0005463759.novalocal systemd[1]: session-c139.scope: Deactivated successfully. Sep 30 23:35:06 np0005463759.novalocal systemd[1]: machine-qemu\x2d3\x2dinstance\x2d00000003.scope: Deactivated successfully. Sep 30 23:35:06 np0005463759.novalocal systemd[1]: machine-qemu\x2d3\x2dinstance\x2d00000003.scope: Consumed 12.699s CPU time. Sep 30 23:35:06 np0005463759.novalocal kernel: tap1f3884a0-c0: left promiscuous mode Sep 30 23:35:06 np0005463759.novalocal systemd-machined[100508]: Machine qemu-3-instance-00000003 terminated. Sep 30 23:35:06 np0005463759.novalocal systemd[1]: run-netns-ovnmeta\x2d1f3884a0\x2dcf10\x2d4b66\x2da19b\x2dfa198997e411.mount: Deactivated successfully. Sep 30 23:35:11 np0005463759.novalocal sudo[106830]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:35:11 np0005463759.novalocal systemd[1]: Started Session c140 of User root. Sep 30 23:35:11 np0005463759.novalocal sudo[106830]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:35:11 np0005463759.novalocal sudo[106830]: pam_unix(sudo:session): session closed for user root Sep 30 23:35:11 np0005463759.novalocal systemd[1]: session-c140.scope: Deactivated successfully. Sep 30 23:35:11 np0005463759.novalocal sudo[106834]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:35:11 np0005463759.novalocal systemd[1]: Started Session c141 of User root. Sep 30 23:35:11 np0005463759.novalocal sudo[106834]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:35:12 np0005463759.novalocal sudo[106834]: pam_unix(sudo:session): session closed for user root Sep 30 23:35:12 np0005463759.novalocal systemd[1]: session-c141.scope: Deactivated successfully. Sep 30 23:35:12 np0005463759.novalocal sudo[106838]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:35:12 np0005463759.novalocal systemd[1]: Started Session c142 of User root. Sep 30 23:35:12 np0005463759.novalocal sudo[106838]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:35:12 np0005463759.novalocal sudo[106838]: pam_unix(sudo:session): session closed for user root Sep 30 23:35:12 np0005463759.novalocal systemd[1]: session-c142.scope: Deactivated successfully. Sep 30 23:35:12 np0005463759.novalocal sudo[106843]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:35:12 np0005463759.novalocal systemd[1]: Started Session c143 of User root. Sep 30 23:35:12 np0005463759.novalocal sudo[106843]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:35:12 np0005463759.novalocal sudo[106843]: pam_unix(sudo:session): session closed for user root Sep 30 23:35:12 np0005463759.novalocal systemd[1]: session-c143.scope: Deactivated successfully. Sep 30 23:35:25 np0005463759.novalocal sshd-session[106890]: Invalid user produccion from 218.51.148.194 port 51032 Sep 30 23:35:26 np0005463759.novalocal sshd-session[106890]: Received disconnect from 218.51.148.194 port 51032:11: Bye Bye [preauth] Sep 30 23:35:26 np0005463759.novalocal sshd-session[106890]: Disconnected from invalid user produccion 218.51.148.194 port 51032 [preauth] Sep 30 23:35:31 np0005463759.novalocal kernel: tapf316c956-86: entered promiscuous mode Sep 30 23:35:31 np0005463759.novalocal NetworkManager[858]: [1759289731.1704] manager: (tapf316c956-86): new Tun device (/org/freedesktop/NetworkManager/Devices/15) Sep 30 23:35:31 np0005463759.novalocal virtqemud[103209]: Domain id=4 name='instance-00000004' uuid=d02000ea-4097-405e-8597-58532c04411f is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Sep 30 23:35:31 np0005463759.novalocal virtqemud[103209]: Domain id=4 name='instance-00000004' uuid=d02000ea-4097-405e-8597-58532c04411f is tainted: deprecated-config (CPU model 'qemu64') Sep 30 23:35:31 np0005463759.novalocal systemd-udevd[106926]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:35:31 np0005463759.novalocal systemd-machined[100508]: New machine qemu-4-instance-00000004. Sep 30 23:35:31 np0005463759.novalocal NetworkManager[858]: [1759289731.2533] device (tapf316c956-86): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Sep 30 23:35:31 np0005463759.novalocal NetworkManager[858]: [1759289731.2546] device (tapf316c956-86): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Sep 30 23:35:31 np0005463759.novalocal systemd[1]: Started Virtual Machine qemu-4-instance-00000004. Sep 30 23:35:31 np0005463759.novalocal NetworkManager[858]: [1759289731.3648] manager: (tap1fd3231a-b0): new Veth device (/org/freedesktop/NetworkManager/Devices/16) Sep 30 23:35:31 np0005463759.novalocal NetworkManager[858]: [1759289731.4485] device (tap1fd3231a-b0): carrier: link connected Sep 30 23:35:31 np0005463759.novalocal kernel: tap1fd3231a-b0: entered promiscuous mode Sep 30 23:35:31 np0005463759.novalocal sudo[106970]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-1fd3231a-b60a-4ec0-97eb-6ff3744ef3d7 env PROCESS_TAG=haproxy-1fd3231a-b60a-4ec0-97eb-6ff3744ef3d7 haproxy -f /var/lib/neutron/ovn-metadata-proxy/1fd3231a-b60a-4ec0-97eb-6ff3744ef3d7.conf Sep 30 23:35:31 np0005463759.novalocal systemd[1]: Started Session c144 of User root. Sep 30 23:35:31 np0005463759.novalocal sudo[106970]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Sep 30 23:35:32 np0005463759.novalocal sudo[106970]: pam_unix(sudo:session): session closed for user root Sep 30 23:35:35 np0005463759.novalocal sshd-session[107002]: Invalid user test from 192.227.153.63 port 48606 Sep 30 23:35:35 np0005463759.novalocal sshd-session[107002]: Received disconnect from 192.227.153.63 port 48606:11: Bye Bye [preauth] Sep 30 23:35:35 np0005463759.novalocal sshd-session[107002]: Disconnected from invalid user test 192.227.153.63 port 48606 [preauth] Sep 30 23:35:35 np0005463759.novalocal kernel: tapbd61ae7c-5b: entered promiscuous mode Sep 30 23:35:35 np0005463759.novalocal NetworkManager[858]: [1759289735.9994] manager: (tapbd61ae7c-5b): new Tun device (/org/freedesktop/NetworkManager/Devices/17) Sep 30 23:35:36 np0005463759.novalocal virtqemud[103209]: Domain id=5 name='instance-00000005' uuid=d6910bbb-23d3-44f4-bfb7-b5a0da7b1c21 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Sep 30 23:35:36 np0005463759.novalocal virtqemud[103209]: Domain id=5 name='instance-00000005' uuid=d6910bbb-23d3-44f4-bfb7-b5a0da7b1c21 is tainted: deprecated-config (CPU model 'qemu64') Sep 30 23:35:36 np0005463759.novalocal systemd-udevd[107016]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:35:36 np0005463759.novalocal NetworkManager[858]: [1759289736.0622] device (tapbd61ae7c-5b): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Sep 30 23:35:36 np0005463759.novalocal NetworkManager[858]: [1759289736.0627] device (tapbd61ae7c-5b): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Sep 30 23:35:36 np0005463759.novalocal systemd-machined[100508]: New machine qemu-5-instance-00000005. Sep 30 23:35:36 np0005463759.novalocal systemd[1]: Started Virtual Machine qemu-5-instance-00000005. Sep 30 23:35:36 np0005463759.novalocal NetworkManager[858]: [1759289736.1625] manager: (tapc8030c14-00): new Veth device (/org/freedesktop/NetworkManager/Devices/18) Sep 30 23:35:36 np0005463759.novalocal systemd-udevd[107022]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:35:36 np0005463759.novalocal NetworkManager[858]: [1759289736.2321] device (tapc8030c14-00): carrier: link connected Sep 30 23:35:36 np0005463759.novalocal kernel: tapc8030c14-00: entered promiscuous mode Sep 30 23:35:36 np0005463759.novalocal sudo[107065]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-c8030c14-0093-46e3-98f9-fb93f67edde9 env PROCESS_TAG=haproxy-c8030c14-0093-46e3-98f9-fb93f67edde9 haproxy -f /var/lib/neutron/ovn-metadata-proxy/c8030c14-0093-46e3-98f9-fb93f67edde9.conf Sep 30 23:35:36 np0005463759.novalocal systemd[1]: Started Session c145 of User root. Sep 30 23:35:36 np0005463759.novalocal sudo[107065]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Sep 30 23:35:36 np0005463759.novalocal sudo[107065]: pam_unix(sudo:session): session closed for user root Sep 30 23:35:42 np0005463759.novalocal kernel: tapf316c956-86 (unregistering): left promiscuous mode Sep 30 23:35:42 np0005463759.novalocal NetworkManager[858]: [1759289742.2854] device (tapf316c956-86): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Sep 30 23:35:42 np0005463759.novalocal systemd[1]: machine-qemu\x2d4\x2dinstance\x2d00000004.scope: Deactivated successfully. Sep 30 23:35:42 np0005463759.novalocal systemd[1]: machine-qemu\x2d4\x2dinstance\x2d00000004.scope: Consumed 10.939s CPU time. Sep 30 23:35:42 np0005463759.novalocal systemd-machined[100508]: Machine qemu-4-instance-00000004 terminated. Sep 30 23:35:42 np0005463759.novalocal systemd[1]: session-c144.scope: Deactivated successfully. Sep 30 23:35:42 np0005463759.novalocal kernel: tap1fd3231a-b0: left promiscuous mode Sep 30 23:35:42 np0005463759.novalocal systemd[1]: run-netns-ovnmeta\x2d1fd3231a\x2db60a\x2d4ec0\x2d97eb\x2d6ff3744ef3d7.mount: Deactivated successfully. Sep 30 23:35:42 np0005463759.novalocal kernel: tapf316c956-86: entered promiscuous mode Sep 30 23:35:42 np0005463759.novalocal systemd-udevd[107103]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:35:42 np0005463759.novalocal NetworkManager[858]: [1759289742.4962] manager: (tapf316c956-86): new Tun device (/org/freedesktop/NetworkManager/Devices/19) Sep 30 23:35:42 np0005463759.novalocal kernel: tapf316c956-86 (unregistering): left promiscuous mode Sep 30 23:35:42 np0005463759.novalocal NetworkManager[858]: [1759289742.6290] manager: (tap1fd3231a-b0): new Veth device (/org/freedesktop/NetworkManager/Devices/20) Sep 30 23:35:42 np0005463759.novalocal NetworkManager[858]: [1759289742.7022] device (tap1fd3231a-b0): carrier: link connected Sep 30 23:35:42 np0005463759.novalocal kernel: tap1fd3231a-b0: entered promiscuous mode Sep 30 23:35:43 np0005463759.novalocal sudo[107160]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-1fd3231a-b60a-4ec0-97eb-6ff3744ef3d7 env PROCESS_TAG=haproxy-1fd3231a-b60a-4ec0-97eb-6ff3744ef3d7 haproxy -f /var/lib/neutron/ovn-metadata-proxy/1fd3231a-b60a-4ec0-97eb-6ff3744ef3d7.conf Sep 30 23:35:43 np0005463759.novalocal systemd[1]: Started Session c146 of User root. Sep 30 23:35:43 np0005463759.novalocal sudo[107160]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Sep 30 23:35:43 np0005463759.novalocal sudo[107160]: pam_unix(sudo:session): session closed for user root Sep 30 23:35:43 np0005463759.novalocal systemd[1]: session-c146.scope: Deactivated successfully. Sep 30 23:35:43 np0005463759.novalocal kernel: tap1fd3231a-b0: left promiscuous mode Sep 30 23:35:43 np0005463759.novalocal systemd[1]: run-netns-ovnmeta\x2d1fd3231a\x2db60a\x2d4ec0\x2d97eb\x2d6ff3744ef3d7.mount: Deactivated successfully. Sep 30 23:35:49 np0005463759.novalocal kernel: tapbd61ae7c-5b (unregistering): left promiscuous mode Sep 30 23:35:49 np0005463759.novalocal NetworkManager[858]: [1759289749.1301] device (tapbd61ae7c-5b): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Sep 30 23:35:49 np0005463759.novalocal systemd[1]: machine-qemu\x2d5\x2dinstance\x2d00000005.scope: Deactivated successfully. Sep 30 23:35:49 np0005463759.novalocal systemd[1]: machine-qemu\x2d5\x2dinstance\x2d00000005.scope: Consumed 12.816s CPU time. Sep 30 23:35:49 np0005463759.novalocal systemd-machined[100508]: Machine qemu-5-instance-00000005 terminated. Sep 30 23:35:49 np0005463759.novalocal kernel: tapc8030c14-00: left promiscuous mode Sep 30 23:35:49 np0005463759.novalocal systemd[1]: run-netns-ovnmeta\x2dc8030c14\x2d0093\x2d46e3\x2d98f9\x2dfb93f67edde9.mount: Deactivated successfully. Sep 30 23:35:49 np0005463759.novalocal systemd[1]: session-c145.scope: Deactivated successfully. Sep 30 23:35:59 np0005463759.novalocal sshd-session[107235]: Invalid user minecraft from 154.92.109.196 port 29672 Sep 30 23:36:00 np0005463759.novalocal sshd-session[107235]: Received disconnect from 154.92.109.196 port 29672:11: Bye Bye [preauth] Sep 30 23:36:00 np0005463759.novalocal sshd-session[107235]: Disconnected from invalid user minecraft 154.92.109.196 port 29672 [preauth] Sep 30 23:36:08 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:36:08 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:36:08 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:36:11 np0005463759.novalocal sudo[107243]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:36:11 np0005463759.novalocal systemd[1]: Started Session c147 of User root. Sep 30 23:36:11 np0005463759.novalocal sudo[107243]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:36:11 np0005463759.novalocal sudo[107243]: pam_unix(sudo:session): session closed for user root Sep 30 23:36:11 np0005463759.novalocal systemd[1]: session-c147.scope: Deactivated successfully. Sep 30 23:36:11 np0005463759.novalocal sudo[107247]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:36:11 np0005463759.novalocal systemd[1]: Started Session c148 of User root. Sep 30 23:36:11 np0005463759.novalocal sudo[107247]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:36:12 np0005463759.novalocal sudo[107247]: pam_unix(sudo:session): session closed for user root Sep 30 23:36:12 np0005463759.novalocal systemd[1]: session-c148.scope: Deactivated successfully. Sep 30 23:36:12 np0005463759.novalocal sudo[107251]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:36:12 np0005463759.novalocal systemd[1]: Started Session c149 of User root. Sep 30 23:36:12 np0005463759.novalocal sudo[107251]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:36:12 np0005463759.novalocal sudo[107251]: pam_unix(sudo:session): session closed for user root Sep 30 23:36:12 np0005463759.novalocal systemd[1]: session-c149.scope: Deactivated successfully. Sep 30 23:36:12 np0005463759.novalocal sudo[107255]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:36:12 np0005463759.novalocal systemd[1]: Started Session c150 of User root. Sep 30 23:36:12 np0005463759.novalocal sudo[107255]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:36:12 np0005463759.novalocal sudo[107255]: pam_unix(sudo:session): session closed for user root Sep 30 23:36:12 np0005463759.novalocal systemd[1]: session-c150.scope: Deactivated successfully. Sep 30 23:36:18 np0005463759.novalocal kernel: tap84c32698-67: entered promiscuous mode Sep 30 23:36:18 np0005463759.novalocal NetworkManager[858]: [1759289778.2053] manager: (tap84c32698-67): new Tun device (/org/freedesktop/NetworkManager/Devices/21) Sep 30 23:36:18 np0005463759.novalocal virtqemud[103209]: Domain id=6 name='instance-00000006' uuid=88765485-3125-427d-8933-21d0fba84612 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Sep 30 23:36:18 np0005463759.novalocal virtqemud[103209]: Domain id=6 name='instance-00000006' uuid=88765485-3125-427d-8933-21d0fba84612 is tainted: deprecated-config (CPU model 'qemu64') Sep 30 23:36:18 np0005463759.novalocal systemd-machined[100508]: New machine qemu-6-instance-00000006. Sep 30 23:36:18 np0005463759.novalocal systemd[1]: Started Virtual Machine qemu-6-instance-00000006. Sep 30 23:36:18 np0005463759.novalocal systemd-udevd[107334]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:36:18 np0005463759.novalocal NetworkManager[858]: [1759289778.3404] device (tap84c32698-67): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Sep 30 23:36:18 np0005463759.novalocal NetworkManager[858]: [1759289778.3412] device (tap84c32698-67): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Sep 30 23:36:18 np0005463759.novalocal NetworkManager[858]: [1759289778.3472] manager: (tapa58f1d82-00): new Veth device (/org/freedesktop/NetworkManager/Devices/22) Sep 30 23:36:18 np0005463759.novalocal NetworkManager[858]: [1759289778.4179] device (tapa58f1d82-00): carrier: link connected Sep 30 23:36:18 np0005463759.novalocal kernel: tapa58f1d82-00: entered promiscuous mode Sep 30 23:36:18 np0005463759.novalocal sudo[107375]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-a58f1d82-0d13-478b-b325-89f31ff7c46b env PROCESS_TAG=haproxy-a58f1d82-0d13-478b-b325-89f31ff7c46b haproxy -f /var/lib/neutron/ovn-metadata-proxy/a58f1d82-0d13-478b-b325-89f31ff7c46b.conf Sep 30 23:36:18 np0005463759.novalocal systemd[1]: Started Session c151 of User root. Sep 30 23:36:18 np0005463759.novalocal sudo[107375]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Sep 30 23:36:18 np0005463759.novalocal sudo[107375]: pam_unix(sudo:session): session closed for user root Sep 30 23:36:21 np0005463759.novalocal sshd-session[107388]: Invalid user user from 185.156.73.233 port 26634 Sep 30 23:36:21 np0005463759.novalocal sshd-session[107388]: Connection closed by invalid user user 185.156.73.233 port 26634 [preauth] Sep 30 23:36:36 np0005463759.novalocal sshd-session[107423]: Received disconnect from 192.227.153.63 port 48302:11: Bye Bye [preauth] Sep 30 23:36:36 np0005463759.novalocal sshd-session[107423]: Disconnected from authenticating user root 192.227.153.63 port 48302 [preauth] Sep 30 23:36:39 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107380]: 10.100.0.14:37218 [30/Sep/2025:23:36:39.040] listener listener/metadata 0/0/0/128/128 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Sep 30 23:36:39 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107380]: 10.100.0.14:37226 [30/Sep/2025:23:36:39.218] listener listener/metadata 0/0/0/14/14 200 148 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Sep 30 23:36:39 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107380]: 10.100.0.14:37236 [30/Sep/2025:23:36:39.257] listener listener/metadata 0/0/0/23/23 200 325 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Sep 30 23:36:39 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107380]: 10.100.0.14:37248 [30/Sep/2025:23:36:39.316] listener listener/metadata 0/0/0/11/11 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Sep 30 23:36:39 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107380]: 10.100.0.14:37262 [30/Sep/2025:23:36:39.389] listener listener/metadata 0/0/0/14/14 200 120 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Sep 30 23:36:39 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107380]: 10.100.0.14:37270 [30/Sep/2025:23:36:39.467] listener listener/metadata 0/0/0/16/16 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Sep 30 23:36:39 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107380]: 10.100.0.14:37274 [30/Sep/2025:23:36:39.517] listener listener/metadata 0/0/0/15/15 200 131 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Sep 30 23:36:39 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107380]: 10.100.0.14:37278 [30/Sep/2025:23:36:39.579] listener listener/metadata 0/0/0/14/14 200 132 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Sep 30 23:36:39 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107380]: 10.100.0.14:37284 [30/Sep/2025:23:36:39.629] listener listener/metadata 0/0/0/14/14 200 177 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Sep 30 23:36:39 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107380]: 10.100.0.14:37300 [30/Sep/2025:23:36:39.678] listener listener/metadata 0/0/0/10/10 200 177 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Sep 30 23:36:39 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107380]: 10.100.0.14:37302 [30/Sep/2025:23:36:39.721] listener listener/metadata 0/0/0/11/11 200 215 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Sep 30 23:36:39 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107380]: 10.100.0.14:37316 [30/Sep/2025:23:36:39.763] listener listener/metadata 0/0/0/14/14 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Sep 30 23:36:39 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107380]: 10.100.0.14:37318 [30/Sep/2025:23:36:39.802] listener listener/metadata 0/0/0/10/10 200 122 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Sep 30 23:36:39 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107380]: 10.100.0.14:37328 [30/Sep/2025:23:36:39.845] listener listener/metadata 0/0/0/12/12 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Sep 30 23:36:39 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107380]: 10.100.0.14:37344 [30/Sep/2025:23:36:39.908] listener listener/metadata 0/0/0/11/11 200 177 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Sep 30 23:36:39 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107380]: 10.100.0.14:37348 [30/Sep/2025:23:36:39.962] listener listener/metadata 0/0/0/11/11 200 123 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Sep 30 23:36:41 np0005463759.novalocal sshd-session[107425]: Invalid user superadmin from 218.51.148.194 port 46796 Sep 30 23:36:41 np0005463759.novalocal sshd-session[107425]: Received disconnect from 218.51.148.194 port 46796:11: Bye Bye [preauth] Sep 30 23:36:41 np0005463759.novalocal sshd-session[107425]: Disconnected from invalid user superadmin 218.51.148.194 port 46796 [preauth] Sep 30 23:36:52 np0005463759.novalocal kernel: tap84c32698-67 (unregistering): left promiscuous mode Sep 30 23:36:52 np0005463759.novalocal NetworkManager[858]: [1759289812.5286] device (tap84c32698-67): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Sep 30 23:36:52 np0005463759.novalocal systemd[1]: machine-qemu\x2d6\x2dinstance\x2d00000006.scope: Deactivated successfully. Sep 30 23:36:52 np0005463759.novalocal systemd[1]: machine-qemu\x2d6\x2dinstance\x2d00000006.scope: Consumed 19.859s CPU time. Sep 30 23:36:52 np0005463759.novalocal systemd-machined[100508]: Machine qemu-6-instance-00000006 terminated. Sep 30 23:36:52 np0005463759.novalocal kernel: tapa58f1d82-00: left promiscuous mode Sep 30 23:36:52 np0005463759.novalocal systemd[1]: run-netns-ovnmeta\x2da58f1d82\x2d0d13\x2d478b\x2db325\x2d89f31ff7c46b.mount: Deactivated successfully. Sep 30 23:36:52 np0005463759.novalocal systemd[1]: session-c151.scope: Deactivated successfully. Sep 30 23:36:55 np0005463759.novalocal kernel: tap84c32698-67: entered promiscuous mode Sep 30 23:36:55 np0005463759.novalocal NetworkManager[858]: [1759289815.8298] manager: (tap84c32698-67): new Tun device (/org/freedesktop/NetworkManager/Devices/23) Sep 30 23:36:55 np0005463759.novalocal virtqemud[103209]: Domain id=7 name='instance-00000006' uuid=88765485-3125-427d-8933-21d0fba84612 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Sep 30 23:36:55 np0005463759.novalocal virtqemud[103209]: Domain id=7 name='instance-00000006' uuid=88765485-3125-427d-8933-21d0fba84612 is tainted: deprecated-config (CPU model 'qemu64') Sep 30 23:36:55 np0005463759.novalocal systemd-machined[100508]: New machine qemu-7-instance-00000006. Sep 30 23:36:55 np0005463759.novalocal systemd[1]: Started Virtual Machine qemu-7-instance-00000006. Sep 30 23:36:55 np0005463759.novalocal systemd-udevd[107506]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:36:55 np0005463759.novalocal NetworkManager[858]: [1759289815.9242] device (tap84c32698-67): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Sep 30 23:36:55 np0005463759.novalocal NetworkManager[858]: [1759289815.9251] device (tap84c32698-67): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Sep 30 23:36:55 np0005463759.novalocal systemd-udevd[107509]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:36:55 np0005463759.novalocal NetworkManager[858]: [1759289815.9713] manager: (tapa58f1d82-00): new Veth device (/org/freedesktop/NetworkManager/Devices/24) Sep 30 23:36:56 np0005463759.novalocal NetworkManager[858]: [1759289816.0404] device (tapa58f1d82-00): carrier: link connected Sep 30 23:36:56 np0005463759.novalocal kernel: tapa58f1d82-00: entered promiscuous mode Sep 30 23:36:56 np0005463759.novalocal sudo[107550]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-a58f1d82-0d13-478b-b325-89f31ff7c46b env PROCESS_TAG=haproxy-a58f1d82-0d13-478b-b325-89f31ff7c46b haproxy -f /var/lib/neutron/ovn-metadata-proxy/a58f1d82-0d13-478b-b325-89f31ff7c46b.conf Sep 30 23:36:56 np0005463759.novalocal systemd[1]: Started Session c152 of User root. Sep 30 23:36:56 np0005463759.novalocal sudo[107550]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Sep 30 23:36:56 np0005463759.novalocal sudo[107550]: pam_unix(sudo:session): session closed for user root Sep 30 23:37:08 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:37:08 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:37:08 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:37:09 np0005463759.novalocal sshd-session[107578]: Invalid user user from 154.92.109.196 port 48831 Sep 30 23:37:10 np0005463759.novalocal sshd-session[107578]: Received disconnect from 154.92.109.196 port 48831:11: Bye Bye [preauth] Sep 30 23:37:10 np0005463759.novalocal sshd-session[107578]: Disconnected from invalid user user 154.92.109.196 port 48831 [preauth] Sep 30 23:37:11 np0005463759.novalocal sudo[107583]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:37:11 np0005463759.novalocal systemd[1]: Started Session c153 of User root. Sep 30 23:37:11 np0005463759.novalocal sudo[107583]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:37:11 np0005463759.novalocal sudo[107583]: pam_unix(sudo:session): session closed for user root Sep 30 23:37:11 np0005463759.novalocal systemd[1]: session-c153.scope: Deactivated successfully. Sep 30 23:37:11 np0005463759.novalocal sudo[107587]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:37:11 np0005463759.novalocal systemd[1]: Started Session c154 of User root. Sep 30 23:37:11 np0005463759.novalocal sudo[107587]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:37:12 np0005463759.novalocal sudo[107587]: pam_unix(sudo:session): session closed for user root Sep 30 23:37:12 np0005463759.novalocal systemd[1]: session-c154.scope: Deactivated successfully. Sep 30 23:37:12 np0005463759.novalocal sudo[107591]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:37:12 np0005463759.novalocal systemd[1]: Started Session c155 of User root. Sep 30 23:37:12 np0005463759.novalocal sudo[107591]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:37:12 np0005463759.novalocal sudo[107591]: pam_unix(sudo:session): session closed for user root Sep 30 23:37:12 np0005463759.novalocal systemd[1]: session-c155.scope: Deactivated successfully. Sep 30 23:37:12 np0005463759.novalocal sudo[107595]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:37:12 np0005463759.novalocal systemd[1]: Started Session c156 of User root. Sep 30 23:37:12 np0005463759.novalocal sudo[107595]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:37:12 np0005463759.novalocal sudo[107595]: pam_unix(sudo:session): session closed for user root Sep 30 23:37:13 np0005463759.novalocal systemd[1]: session-c156.scope: Deactivated successfully. Sep 30 23:37:16 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107555]: 10.100.0.14:51124 [30/Sep/2025:23:37:16.367] listener listener/metadata 0/0/0/164/164 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Sep 30 23:37:16 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107555]: 10.100.0.14:51136 [30/Sep/2025:23:37:16.581] listener listener/metadata 0/0/0/10/10 200 148 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Sep 30 23:37:16 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107555]: 10.100.0.14:51138 [30/Sep/2025:23:37:16.618] listener listener/metadata 0/0/0/9/9 200 325 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Sep 30 23:37:16 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107555]: 10.100.0.14:51144 [30/Sep/2025:23:37:16.661] listener listener/metadata 0/0/0/10/10 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Sep 30 23:37:16 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107555]: 10.100.0.14:51156 [30/Sep/2025:23:37:16.704] listener listener/metadata 0/0/0/10/10 200 120 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Sep 30 23:37:16 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107555]: 10.100.0.14:51166 [30/Sep/2025:23:37:16.747] listener listener/metadata 0/0/0/12/12 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Sep 30 23:37:16 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107555]: 10.100.0.14:51182 [30/Sep/2025:23:37:16.793] listener listener/metadata 0/0/0/13/13 200 131 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Sep 30 23:37:16 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107555]: 10.100.0.14:51194 [30/Sep/2025:23:37:16.868] listener listener/metadata 0/0/0/10/10 200 132 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Sep 30 23:37:16 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107555]: 10.100.0.14:51202 [30/Sep/2025:23:37:16.945] listener listener/metadata 0/0/0/9/9 200 177 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Sep 30 23:37:17 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107555]: 10.100.0.14:51208 [30/Sep/2025:23:37:17.026] listener listener/metadata 0/0/0/14/14 200 177 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Sep 30 23:37:17 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107555]: 10.100.0.14:51214 [30/Sep/2025:23:37:17.086] listener listener/metadata 0/0/0/13/13 200 215 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Sep 30 23:37:17 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107555]: 10.100.0.14:51224 [30/Sep/2025:23:37:17.139] listener listener/metadata 0/0/0/13/13 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Sep 30 23:37:17 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107555]: 10.100.0.14:51228 [30/Sep/2025:23:37:17.189] listener listener/metadata 0/0/0/12/12 200 122 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Sep 30 23:37:17 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107555]: 10.100.0.14:51232 [30/Sep/2025:23:37:17.233] listener listener/metadata 0/0/0/14/14 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Sep 30 23:37:17 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107555]: 10.100.0.14:51244 [30/Sep/2025:23:37:17.292] listener listener/metadata 0/0/0/15/15 200 177 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Sep 30 23:37:17 np0005463759.novalocal haproxy-metadata-proxy-a58f1d82-0d13-478b-b325-89f31ff7c46b[107555]: 10.100.0.14:51256 [30/Sep/2025:23:37:17.355] listener listener/metadata 0/0/0/13/13 200 123 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Sep 30 23:37:26 np0005463759.novalocal kernel: tap84c32698-67 (unregistering): left promiscuous mode Sep 30 23:37:26 np0005463759.novalocal NetworkManager[858]: [1759289846.6989] device (tap84c32698-67): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Sep 30 23:37:26 np0005463759.novalocal systemd[1]: machine-qemu\x2d7\x2dinstance\x2d00000006.scope: Deactivated successfully. Sep 30 23:37:26 np0005463759.novalocal systemd[1]: machine-qemu\x2d7\x2dinstance\x2d00000006.scope: Consumed 20.629s CPU time. Sep 30 23:37:26 np0005463759.novalocal systemd-machined[100508]: Machine qemu-7-instance-00000006 terminated. Sep 30 23:37:26 np0005463759.novalocal kernel: tapa58f1d82-00: left promiscuous mode Sep 30 23:37:26 np0005463759.novalocal systemd[1]: session-c152.scope: Deactivated successfully. Sep 30 23:37:26 np0005463759.novalocal systemd[1]: run-netns-ovnmeta\x2da58f1d82\x2d0d13\x2d478b\x2db325\x2d89f31ff7c46b.mount: Deactivated successfully. Sep 30 23:37:34 np0005463759.novalocal sshd-session[107681]: Invalid user jack from 192.227.153.63 port 47586 Sep 30 23:37:34 np0005463759.novalocal sshd-session[107681]: Received disconnect from 192.227.153.63 port 47586:11: Bye Bye [preauth] Sep 30 23:37:34 np0005463759.novalocal sshd-session[107681]: Disconnected from invalid user jack 192.227.153.63 port 47586 [preauth] Sep 30 23:37:41 np0005463759.novalocal sudo[107687]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-8b94e0ef-992d-4b4e-9648-7c593a633867 cinder-volumes/cinder-volumes-pool Sep 30 23:37:41 np0005463759.novalocal systemd[1]: Started Session c157 of User root. Sep 30 23:37:41 np0005463759.novalocal sudo[107687]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:37:42 np0005463759.novalocal lvm[107698]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:37:42 np0005463759.novalocal lvm[107698]: VG cinder-volumes finished Sep 30 23:37:42 np0005463759.novalocal sudo[107687]: pam_unix(sudo:session): session closed for user root Sep 30 23:37:42 np0005463759.novalocal systemd[1]: session-c157.scope: Deactivated successfully. Sep 30 23:37:53 np0005463759.novalocal kernel: tapf91573cd-4a: entered promiscuous mode Sep 30 23:37:53 np0005463759.novalocal NetworkManager[858]: [1759289873.2167] manager: (tapf91573cd-4a): new Tun device (/org/freedesktop/NetworkManager/Devices/25) Sep 30 23:37:53 np0005463759.novalocal virtqemud[103209]: Domain id=8 name='instance-00000007' uuid=db0c0a2b-db7d-46cb-92f7-0153ad447bb3 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Sep 30 23:37:53 np0005463759.novalocal virtqemud[103209]: Domain id=8 name='instance-00000007' uuid=db0c0a2b-db7d-46cb-92f7-0153ad447bb3 is tainted: deprecated-config (CPU model 'qemu64') Sep 30 23:37:53 np0005463759.novalocal systemd-machined[100508]: New machine qemu-8-instance-00000007. Sep 30 23:37:53 np0005463759.novalocal systemd[1]: Started Virtual Machine qemu-8-instance-00000007. Sep 30 23:37:53 np0005463759.novalocal systemd-udevd[107739]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:37:53 np0005463759.novalocal NetworkManager[858]: [1759289873.3185] device (tapf91573cd-4a): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Sep 30 23:37:53 np0005463759.novalocal NetworkManager[858]: [1759289873.3193] device (tapf91573cd-4a): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Sep 30 23:37:53 np0005463759.novalocal NetworkManager[858]: [1759289873.3420] manager: (tap6f958372-40): new Veth device (/org/freedesktop/NetworkManager/Devices/26) Sep 30 23:37:53 np0005463759.novalocal NetworkManager[858]: [1759289873.4054] device (tap6f958372-40): carrier: link connected Sep 30 23:37:53 np0005463759.novalocal kernel: tap6f958372-40: entered promiscuous mode Sep 30 23:37:53 np0005463759.novalocal sudo[107786]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-6f958372-4875-4666-86c9-06a5cd0d74a3 env PROCESS_TAG=haproxy-6f958372-4875-4666-86c9-06a5cd0d74a3 haproxy -f /var/lib/neutron/ovn-metadata-proxy/6f958372-4875-4666-86c9-06a5cd0d74a3.conf Sep 30 23:37:53 np0005463759.novalocal systemd[1]: Started Session c158 of User root. Sep 30 23:37:53 np0005463759.novalocal sudo[107786]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Sep 30 23:37:53 np0005463759.novalocal sudo[107786]: pam_unix(sudo:session): session closed for user root Sep 30 23:37:53 np0005463759.novalocal sshd-session[107719]: Invalid user wikijs from 218.51.148.194 port 42560 Sep 30 23:37:54 np0005463759.novalocal sshd-session[107719]: Received disconnect from 218.51.148.194 port 42560:11: Bye Bye [preauth] Sep 30 23:37:54 np0005463759.novalocal sshd-session[107719]: Disconnected from invalid user wikijs 218.51.148.194 port 42560 [preauth] Sep 30 23:38:04 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:38:04 np0005463759.novalocal sudo[107829]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb cinder-volumes/cinder-volumes-pool Sep 30 23:38:04 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:38:04 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:38:04 np0005463759.novalocal systemd[1]: Started Session c159 of User root. Sep 30 23:38:04 np0005463759.novalocal sudo[107829]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:05 np0005463759.novalocal lvm[107842]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:38:05 np0005463759.novalocal lvm[107842]: VG cinder-volumes finished Sep 30 23:38:05 np0005463759.novalocal sudo[107829]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:05 np0005463759.novalocal systemd[1]: session-c159.scope: Deactivated successfully. Sep 30 23:38:05 np0005463759.novalocal kernel: tapf91573cd-4a (unregistering): left promiscuous mode Sep 30 23:38:05 np0005463759.novalocal NetworkManager[858]: [1759289885.7756] device (tapf91573cd-4a): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Sep 30 23:38:05 np0005463759.novalocal systemd[1]: machine-qemu\x2d8\x2dinstance\x2d00000007.scope: Deactivated successfully. Sep 30 23:38:05 np0005463759.novalocal systemd[1]: machine-qemu\x2d8\x2dinstance\x2d00000007.scope: Consumed 12.497s CPU time. Sep 30 23:38:05 np0005463759.novalocal systemd-machined[100508]: Machine qemu-8-instance-00000007 terminated. Sep 30 23:38:05 np0005463759.novalocal kernel: tap6f958372-40: left promiscuous mode Sep 30 23:38:05 np0005463759.novalocal systemd[1]: run-netns-ovnmeta\x2d6f958372\x2d4875\x2d4666\x2d86c9\x2d06a5cd0d74a3.mount: Deactivated successfully. Sep 30 23:38:05 np0005463759.novalocal systemd[1]: session-c158.scope: Deactivated successfully. Sep 30 23:38:06 np0005463759.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Sep 30 23:38:06 np0005463759.novalocal sudo[107880]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb Sep 30 23:38:06 np0005463759.novalocal systemd[1]: Started Session c160 of User root. Sep 30 23:38:06 np0005463759.novalocal sudo[107880]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:06 np0005463759.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Sep 30 23:38:06 np0005463759.novalocal sudo[107880]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:06 np0005463759.novalocal systemd[1]: session-c160.scope: Deactivated successfully. Sep 30 23:38:06 np0005463759.novalocal sudo[107884]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb mmcTwdtgDmGbBYE5DWA4 dWsei45zrAvJ3BGA False -p3260 -a::1 Sep 30 23:38:06 np0005463759.novalocal systemd[1]: Started Session c161 of User root. Sep 30 23:38:06 np0005463759.novalocal sudo[107884]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:07 np0005463759.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service. Sep 30 23:38:07 np0005463759.novalocal sudo[107884]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:07 np0005463759.novalocal systemd[1]: session-c161.scope: Deactivated successfully. Sep 30 23:38:07 np0005463759.novalocal sudo[107903]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Sep 30 23:38:07 np0005463759.novalocal systemd[1]: Started Session c162 of User root. Sep 30 23:38:07 np0005463759.novalocal sudo[107903]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:07 np0005463759.novalocal sudo[107903]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:07 np0005463759.novalocal systemd[1]: session-c162.scope: Deactivated successfully. Sep 30 23:38:07 np0005463759.novalocal sudo[107910]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Sep 30 23:38:07 np0005463759.novalocal systemd[1]: Started Session c163 of User root. Sep 30 23:38:08 np0005463759.novalocal sudo[107910]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:08 np0005463759.novalocal sudo[107910]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:08 np0005463759.novalocal systemd[1]: session-c163.scope: Deactivated successfully. Sep 30 23:38:08 np0005463759.novalocal sudo[107915]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb mmcTwdtgDmGbBYE5DWA4 dWsei45zrAvJ3BGA iqn.1994-05.com.redhat:e8763877e0f9 Sep 30 23:38:08 np0005463759.novalocal systemd[1]: Started Session c164 of User root. Sep 30 23:38:08 np0005463759.novalocal sudo[107915]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:08 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 7b3d8721-4d61-4ee9-a083-ada5acc66240 Sep 30 23:38:08 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:08 np0005463759.novalocal setroubleshoot[107877]: failed to retrieve rpm info for path '/run/blkid/blkid.tab': Sep 30 23:38:08 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l a4db7173-1592-4b0d-ad46-0ce96c160c31 Sep 30 23:38:08 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: failed to retrieve rpm info for path '/dev/vda1': Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l ab9dcf13-2124-489d-932d-8c317adc82db Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 576dcadc-f36e-402a-90af-04162b864cde Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 7ff0f317-843f-4f45-9d09-c35bfbe4940b Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 2f10addc-fd64-4754-839e-f6e74c8ef93e Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l c7c1b233-1624-4e89-95ce-3c1292ff7a1d Sep 30 23:38:09 np0005463759.novalocal sudo[107915]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:09 np0005463759.novalocal systemd[1]: session-c164.scope: Deactivated successfully. Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l c7473d8a-67f3-4228-ab79-ac13908ec575 Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l c00febc7-297b-43e2-8c02-3195ff3a5046 Sep 30 23:38:09 np0005463759.novalocal sudo[107924]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l e288ade7-3ed9-4286-ae93-ce6c5bb87f12 Sep 30 23:38:09 np0005463759.novalocal systemd[1]: Started Session c165 of User root. Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:09 np0005463759.novalocal sudo[107924]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-fWrmVj. For complete SELinux messages run: sealert -l 59de3957-9665-44c1-81ee-1f992fea3a09 Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-fWrmVj. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-fWrmVj file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 7315428d-661c-4ee3-a2bf-279d2905caa0 Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 3595cdd8-9087-4ec1-b0c7-db51cb42c932 Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from 'read, write' accesses on the file /(null). For complete SELinux messages run: sealert -l d28a2db7-2756-45bf-a580-a3cdaaf64472 Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from 'read, write' accesses on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed read write access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l a81647e4-046a-4763-af2e-4b8abe6cb9f4 Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 2186c9ee-256b-44a5-a104-aba77d550395 Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:09 np0005463759.novalocal sudo[107924]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:09 np0005463759.novalocal systemd[1]: session-c165.scope: Deactivated successfully. Sep 30 23:38:09 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 68adcfc5-43ec-40cc-902e-b1f995a405f8 Sep 30 23:38:09 np0005463759.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Sep 30 23:38:09 np0005463759.novalocal iscsid[83869]: iscsid: Connection5:0 to [target: iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb, portal: ::1,3260] through [iface: default] is operational now Sep 30 23:38:10 np0005463759.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Sep 30 23:38:10 np0005463759.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Sep 30 23:38:10 np0005463759.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405044c3dd854424c7cbc5bba723 port group 0 rel port 1 Sep 30 23:38:10 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Sep 30 23:38:10 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Sep 30 23:38:10 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Sep 30 23:38:10 np0005463759.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Sep 30 23:38:10 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Sep 30 23:38:10 np0005463759.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Sep 30 23:38:10 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Sep 30 23:38:10 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Sep 30 23:38:10 np0005463759.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Sep 30 23:38:10 np0005463759.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Sep 30 23:38:10 np0005463759.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:10 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l da7dd66e-7faa-42fd-92d9-720ccdc29de4 Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 646beed4-88ff-466c-8a9e-b445068010a7 Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 7869df62-01da-440e-b5c8-9bea0427369d Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 8140d595-8e3f-4d5f-965d-5e80f8500ec2 Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 31b06990-2e65-4b38-976e-9edcd322510e Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 5ccb5141-5bba-4aa2-9795-445150e3cc5e Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l d9a63156-dcd5-4777-8e42-13192fa4522b Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 0dad90c3-a224-48d6-80dd-ec2e35760506 Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 5a451f8c-50ab-4c93-a39f-9037908da70d Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 1873e10b-8c0e-47a0-97e1-79da517e188d Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 5250d74d-ec40-459b-afc3-4b94308ebfc0 Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 039a50f3-bff5-45df-9aa6-1867fd78e6a9 Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb/::1,3260. For complete SELinux messages run: sealert -l aa841228-eeeb-446d-92d1-f74667383d1e Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb/::1,3260. For complete SELinux messages run: sealert -l 9d48f760-6bcd-4191-a608-77ebf9b3d54a Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l d004ae25-306f-4132-91d1-a215bb3afc76 Sep 30 23:38:10 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:11 np0005463759.novalocal sudo[107977]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Sep 30 23:38:11 np0005463759.novalocal systemd[1]: Started Session c166 of User root. Sep 30 23:38:11 np0005463759.novalocal sudo[107977]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: failed to retrieve rpm info for path '/sys/class/scsi_host/host2/scan': Sep 30 23:38:11 np0005463759.novalocal sudo[107982]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l e3b6064d-bf0a-44cf-810f-872c1c118ec8 Sep 30 23:38:11 np0005463759.novalocal systemd[1]: Started Session c167 of User root. Sep 30 23:38:11 np0005463759.novalocal sudo[107982]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 0dd7f59f-ffab-475a-8de4-090bd48a01e4 Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l cb245f10-87ac-463d-888c-082df616fb86 Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Sep 30 23:38:11 np0005463759.novalocal sudo[107977]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:11 np0005463759.novalocal systemd[1]: session-c166.scope: Deactivated successfully. Sep 30 23:38:11 np0005463759.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: failed to retrieve rpm info for path '/dev/sda': Sep 30 23:38:11 np0005463759.novalocal sudo[107991]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l ab9dcf13-2124-489d-932d-8c317adc82db Sep 30 23:38:11 np0005463759.novalocal systemd[1]: Started Session c168 of User root. Sep 30 23:38:11 np0005463759.novalocal sudo[107991]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l e4cd6b17-5e92-4db8-85bc-e76cb667469f Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 11f232c5-0e4a-45a4-9918-3f0ce16b6224 Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Sep 30 23:38:11 np0005463759.novalocal sudo[107982]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:11 np0005463759.novalocal systemd[1]: session-c167.scope: Deactivated successfully. Sep 30 23:38:11 np0005463759.novalocal sudo[108005]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l d5662977-5214-4908-9a90-5b62a166b2fc Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 69cb4831-33ea-460d-a1b0-1b98825b5013 Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 6ea6b9ae-8662-4328-8db2-40473d074542 Sep 30 23:38:11 np0005463759.novalocal systemd[1]: Started Session c169 of User root. Sep 30 23:38:11 np0005463759.novalocal sudo[108005]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 0451345a-6fb6-4dc8-a12b-9fa97b69a6d7 Sep 30 23:38:11 np0005463759.novalocal sudo[107991]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:11 np0005463759.novalocal systemd[1]: session-c168.scope: Deactivated successfully. Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 11f232c5-0e4a-45a4-9918-3f0ce16b6224 Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l d5662977-5214-4908-9a90-5b62a166b2fc Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 69cb4831-33ea-460d-a1b0-1b98825b5013 Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Sep 30 23:38:11 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 6ea6b9ae-8662-4328-8db2-40473d074542 Sep 30 23:38:11 np0005463759.novalocal kernel: scsi 2:0:0:0: alua: Detached Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Sep 30 23:38:11 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 0451345a-6fb6-4dc8-a12b-9fa97b69a6d7 Sep 30 23:38:12 np0005463759.novalocal iscsid[83869]: iscsid: Connection5:0 to [target: iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb, portal: ::1,3260] through [iface: default] is shutdown. Sep 30 23:38:12 np0005463759.novalocal sudo[108005]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:12 np0005463759.novalocal systemd[1]: session-c169.scope: Deactivated successfully. Sep 30 23:38:12 np0005463759.novalocal sudo[108046]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Sep 30 23:38:12 np0005463759.novalocal systemd[1]: Started Session c170 of User root. Sep 30 23:38:12 np0005463759.novalocal sudo[108046]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l e4cd6b17-5e92-4db8-85bc-e76cb667469f Sep 30 23:38:12 np0005463759.novalocal sudo[108048]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb iqn.1994-05.com.redhat:e8763877e0f9 Sep 30 23:38:12 np0005463759.novalocal systemd[1]: Started Session c171 of User root. Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Sep 30 23:38:12 np0005463759.novalocal sudo[108048]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 944abb7f-6abd-4763-9953-7f99bd756a8f Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. For complete SELinux messages run: sealert -l 3f73efce-8f8e-4bc9-aece-a10f95415239 Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/httpd from write access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed write access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 7ff0f317-843f-4f45-9d09-c35bfbe4940b Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 2f10addc-fd64-4754-839e-f6e74c8ef93e Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 68adcfc5-43ec-40cc-902e-b1f995a405f8 Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l 5ccb5141-5bba-4aa2-9795-445150e3cc5e Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb/::1,3260. For complete SELinux messages run: sealert -l 9d48f760-6bcd-4191-a608-77ebf9b3d54a Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l da7dd66e-7faa-42fd-92d9-720ccdc29de4 Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 646beed4-88ff-466c-8a9e-b445068010a7 Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 7869df62-01da-440e-b5c8-9bea0427369d Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 8140d595-8e3f-4d5f-965d-5e80f8500ec2 Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 31b06990-2e65-4b38-976e-9edcd322510e Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l d004ae25-306f-4132-91d1-a215bb3afc76 Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb/::1,3260. For complete SELinux messages run: sealert -l 4dc656fc-2daa-47c2-9a22-9b53f5d4d105 Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l d9a63156-dcd5-4777-8e42-13192fa4522b Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 0dad90c3-a224-48d6-80dd-ec2e35760506 Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:12 np0005463759.novalocal sudo[108046]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:12 np0005463759.novalocal systemd[1]: session-c170.scope: Deactivated successfully. Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 5c3a8a45-c9de-4bf4-ac8e-9d75a069bb74 Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Sep 30 23:38:12 np0005463759.novalocal sudo[108062]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:38:12 np0005463759.novalocal systemd[1]: Started Session c172 of User root. Sep 30 23:38:12 np0005463759.novalocal sudo[108062]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: failed to retrieve rpm info for path '/proc/sys/fs/nr_open': Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 6bc8fc5d-399a-4847-9ea8-6b27bf971339 Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 9605bfdd-d76a-472b-8588-e3f5c2368e63 Sep 30 23:38:12 np0005463759.novalocal sudo[108048]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:12 np0005463759.novalocal systemd[1]: session-c171.scope: Deactivated successfully. Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 576dcadc-f36e-402a-90af-04162b864cde Sep 30 23:38:12 np0005463759.novalocal sudo[108067]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l cb245f10-87ac-463d-888c-082df616fb86 Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Sep 30 23:38:12 np0005463759.novalocal systemd[1]: Started Session c173 of User root. Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 0b914733-4a19-4ac4-a34d-2497fadaf82f Sep 30 23:38:12 np0005463759.novalocal sudo[108067]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb/::1,3260. For complete SELinux messages run: sealert -l 9d48f760-6bcd-4191-a608-77ebf9b3d54a Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l d004ae25-306f-4132-91d1-a215bb3afc76 Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb/::1,3260. For complete SELinux messages run: sealert -l 4dc656fc-2daa-47c2-9a22-9b53f5d4d105 Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb. For complete SELinux messages run: sealert -l 5a451f8c-50ab-4c93-a39f-9037908da70d Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l e743175e-23c0-4be8-be6b-013beb4a9bd8 Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l e8d9a82c-6546-49b8-879e-4128f30a56ad Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb. For complete SELinux messages run: sealert -l 42b343e1-8d38-4d7c-a30e-0b64bfdf527d Sep 30 23:38:12 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:12 np0005463759.novalocal sudo[108062]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:12 np0005463759.novalocal systemd[1]: session-c172.scope: Deactivated successfully. Sep 30 23:38:13 np0005463759.novalocal sudo[108067]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:13 np0005463759.novalocal systemd[1]: session-c173.scope: Deactivated successfully. Sep 30 23:38:13 np0005463759.novalocal sudo[108074]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Sep 30 23:38:13 np0005463759.novalocal systemd[1]: Started Session c174 of User root. Sep 30 23:38:13 np0005463759.novalocal sudo[108074]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:13 np0005463759.novalocal sudo[108074]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:13 np0005463759.novalocal systemd[1]: session-c174.scope: Deactivated successfully. Sep 30 23:38:13 np0005463759.novalocal sudo[108079]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb Sep 30 23:38:13 np0005463759.novalocal systemd[1]: Started Session c175 of User root. Sep 30 23:38:13 np0005463759.novalocal sudo[108079]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:14 np0005463759.novalocal sudo[108079]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:14 np0005463759.novalocal systemd[1]: session-c175.scope: Deactivated successfully. Sep 30 23:38:14 np0005463759.novalocal sudo[108086]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Sep 30 23:38:14 np0005463759.novalocal systemd[1]: Started Session c176 of User root. Sep 30 23:38:14 np0005463759.novalocal sudo[108086]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:14 np0005463759.novalocal sudo[108086]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:15 np0005463759.novalocal systemd[1]: session-c176.scope: Deactivated successfully. Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. For complete SELinux messages run: sealert -l 9898e1af-fb86-4095-8aac-8cccb3ec096e Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from read access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. For complete SELinux messages run: sealert -l a4db7173-1592-4b0d-ad46-0ce96c160c31 Sep 30 23:38:15 np0005463759.novalocal sudo[108105]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -K cinder-volumes/volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb Sep 30 23:38:15 np0005463759.novalocal systemd[1]: Started Session c177 of User root. Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from open access on the file /run/blkid/blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:15 np0005463759.novalocal sudo[108105]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l ab9dcf13-2124-489d-932d-8c317adc82db Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. For complete SELinux messages run: sealert -l 576dcadc-f36e-402a-90af-04162b864cde Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 7ff0f317-843f-4f45-9d09-c35bfbe4940b Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:15 np0005463759.novalocal sudo[108110]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-8b94e0ef-992d-4b4e-9648-7c593a633867 Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. For complete SELinux messages run: sealert -l 2f10addc-fd64-4754-839e-f6e74c8ef93e Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/vda1. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the vda1 blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. For complete SELinux messages run: sealert -l c7c1b233-1624-4e89-95ce-3c1292ff7a1d Sep 30 23:38:15 np0005463759.novalocal systemd[1]: Started Session c178 of User root. Sep 30 23:38:15 np0005463759.novalocal sudo[108110]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from write access on the file blkid.tab. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed write access on the blkid.tab file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). For complete SELinux messages run: sealert -l c7473d8a-67f3-4228-ab79-ac13908ec575 Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). For complete SELinux messages run: sealert -l c00febc7-297b-43e2-8c02-3195ff3a5046 Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). For complete SELinux messages run: sealert -l e288ade7-3ed9-4286-ae93-ce6c5bb87f12 Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-IcOY6P. For complete SELinux messages run: sealert -l 59de3957-9665-44c1-81ee-1f992fea3a09 Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from setattr access on the file blkid.tab-IcOY6P. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed setattr access on the blkid.tab-IcOY6P file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. For complete SELinux messages run: sealert -l 7315428d-661c-4ee3-a2bf-279d2905caa0 Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from remove_name access on the directory blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed remove_name access on the blkid.tab.old directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. For complete SELinux messages run: sealert -l 3595cdd8-9087-4ec1-b0c7-db51cb42c932 Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from unlink access on the file blkid.tab.old. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed unlink access on the blkid.tab.old file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). For complete SELinux messages run: sealert -l a81647e4-046a-4763-af2e-4b8abe6cb9f4 Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). For complete SELinux messages run: sealert -l 2186c9ee-256b-44a5-a104-aba77d550395 Sep 30 23:38:15 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from rename access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that blkid should be allowed rename access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:16 np0005463759.novalocal sudo[108105]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:16 np0005463759.novalocal systemd[1]: session-c177.scope: Deactivated successfully. Sep 30 23:38:16 np0005463759.novalocal sudo[108114]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool create /dev/cinder-volumes/volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb mmcTwdtgDmGbBYE5DWA4 dWsei45zrAvJ3BGA False -p3260 -a::1 Sep 30 23:38:16 np0005463759.novalocal systemd[1]: Started Session c179 of User root. Sep 30 23:38:16 np0005463759.novalocal sudo[108114]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:16 np0005463759.novalocal sudo[108110]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:16 np0005463759.novalocal systemd[1]: session-c178.scope: Deactivated successfully. Sep 30 23:38:16 np0005463759.novalocal sudo[108118]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-8b94e0ef-992d-4b4e-9648-7c593a633867 Sep 30 23:38:16 np0005463759.novalocal systemd[1]: Started Session c180 of User root. Sep 30 23:38:16 np0005463759.novalocal sudo[108118]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:16 np0005463759.novalocal sudo[108118]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:16 np0005463759.novalocal systemd[1]: session-c180.scope: Deactivated successfully. Sep 30 23:38:16 np0005463759.novalocal sudo[108114]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:16 np0005463759.novalocal systemd[1]: session-c179.scope: Deactivated successfully. Sep 30 23:38:16 np0005463759.novalocal sudo[108161]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-8b94e0ef-992d-4b4e-9648-7c593a633867 Sep 30 23:38:16 np0005463759.novalocal systemd[1]: Started Session c181 of User root. Sep 30 23:38:16 np0005463759.novalocal sudo[108163]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Sep 30 23:38:16 np0005463759.novalocal sudo[108161]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:16 np0005463759.novalocal systemd[1]: Started Session c182 of User root. Sep 30 23:38:16 np0005463759.novalocal sudo[108163]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:17 np0005463759.novalocal lvm[108172]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:38:17 np0005463759.novalocal lvm[108172]: VG cinder-volumes finished Sep 30 23:38:17 np0005463759.novalocal sudo[108161]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:17 np0005463759.novalocal systemd[1]: session-c181.scope: Deactivated successfully. Sep 30 23:38:17 np0005463759.novalocal sudo[108163]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:17 np0005463759.novalocal systemd[1]: session-c182.scope: Deactivated successfully. Sep 30 23:38:17 np0005463759.novalocal sudo[108174]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Sep 30 23:38:17 np0005463759.novalocal systemd[1]: Started Session c183 of User root. Sep 30 23:38:17 np0005463759.novalocal sudo[108174]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:17 np0005463759.novalocal sudo[108176]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:38:17 np0005463759.novalocal systemd[1]: Started Session c184 of User root. Sep 30 23:38:17 np0005463759.novalocal sudo[108176]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:17 np0005463759.novalocal sudo[108176]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:17 np0005463759.novalocal systemd[1]: session-c184.scope: Deactivated successfully. Sep 30 23:38:17 np0005463759.novalocal sudo[108182]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:38:17 np0005463759.novalocal systemd[1]: Started Session c185 of User root. Sep 30 23:38:17 np0005463759.novalocal sudo[108182]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:17 np0005463759.novalocal sudo[108174]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:17 np0005463759.novalocal systemd[1]: session-c183.scope: Deactivated successfully. Sep 30 23:38:17 np0005463759.novalocal sudo[108186]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool add-initiator iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb mmcTwdtgDmGbBYE5DWA4 dWsei45zrAvJ3BGA iqn.1994-05.com.redhat:e8763877e0f9 Sep 30 23:38:17 np0005463759.novalocal systemd[1]: Started Session c186 of User root. Sep 30 23:38:17 np0005463759.novalocal sudo[108186]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:18 np0005463759.novalocal sudo[108182]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:18 np0005463759.novalocal systemd[1]: session-c185.scope: Deactivated successfully. Sep 30 23:38:18 np0005463759.novalocal sudo[108190]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:38:18 np0005463759.novalocal systemd[1]: Started Session c187 of User root. Sep 30 23:38:18 np0005463759.novalocal sudo[108190]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:18 np0005463759.novalocal sudo[108190]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:18 np0005463759.novalocal systemd[1]: session-c187.scope: Deactivated successfully. Sep 30 23:38:18 np0005463759.novalocal sudo[108197]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:38:18 np0005463759.novalocal sudo[108186]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:18 np0005463759.novalocal systemd[1]: Started Session c188 of User root. Sep 30 23:38:18 np0005463759.novalocal systemd[1]: session-c186.scope: Deactivated successfully. Sep 30 23:38:18 np0005463759.novalocal sudo[108197]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:18 np0005463759.novalocal sudo[108199]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Sep 30 23:38:18 np0005463759.novalocal systemd[1]: Started Session c189 of User root. Sep 30 23:38:18 np0005463759.novalocal sudo[108199]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:18 np0005463759.novalocal sudo[108197]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:18 np0005463759.novalocal systemd[1]: session-c188.scope: Deactivated successfully. Sep 30 23:38:19 np0005463759.novalocal sudo[108199]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:19 np0005463759.novalocal systemd[1]: session-c189.scope: Deactivated successfully. Sep 30 23:38:19 np0005463759.novalocal sshd-session[108091]: Invalid user test from 154.92.109.196 port 40422 Sep 30 23:38:19 np0005463759.novalocal sshd-session[108091]: Received disconnect from 154.92.109.196 port 40422:11: Bye Bye [preauth] Sep 30 23:38:19 np0005463759.novalocal sshd-session[108091]: Disconnected from invalid user test 154.92.109.196 port 40422 [preauth] Sep 30 23:38:19 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 68adcfc5-43ec-40cc-902e-b1f995a405f8 Sep 30 23:38:19 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:19 np0005463759.novalocal kernel: scsi host2: iSCSI Initiator over TCP/IP Sep 30 23:38:19 np0005463759.novalocal iscsid[83869]: iscsid: Connection6:0 to [target: iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb, portal: ::1,3260] through [iface: default] is operational now Sep 30 23:38:19 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l da7dd66e-7faa-42fd-92d9-720ccdc29de4 Sep 30 23:38:19 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:19 np0005463759.novalocal kernel: scsi 2:0:0:0: Direct-Access LIO-ORG IBLOCK 4.0 PQ: 0 ANSI: 6 Sep 30 23:38:19 np0005463759.novalocal kernel: scsi 2:0:0:0: alua: supports implicit and explicit TPGS Sep 30 23:38:19 np0005463759.novalocal kernel: scsi 2:0:0:0: alua: device naa.6001405e419c6100eab456687197716b port group 0 rel port 1 Sep 30 23:38:19 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] 2097152 512-byte logical blocks: (1.07 GB/1.00 GiB) Sep 30 23:38:19 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Write Protect is off Sep 30 23:38:19 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Mode Sense: 43 00 10 08 Sep 30 23:38:19 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Write cache: enabled, read cache: enabled, supports DPO and FUA Sep 30 23:38:19 np0005463759.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Sep 30 23:38:19 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Preferred minimum I/O size 65536 bytes Sep 30 23:38:19 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Optimal transfer size 65536 bytes Sep 30 23:38:19 np0005463759.novalocal kernel: MODE SENSE: unimplemented page/subpage: 0x0a/0x05 Sep 30 23:38:19 np0005463759.novalocal kernel: sd 2:0:0:0: Attached scsi generic sg1 type 0 Sep 30 23:38:19 np0005463759.novalocal kernel: sd 2:0:0:0: alua: transition timeout set to 60 seconds Sep 30 23:38:19 np0005463759.novalocal kernel: sd 2:0:0:0: alua: port group 00 state A non-preferred supports TOlUSNA Sep 30 23:38:19 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Attached SCSI disk Sep 30 23:38:19 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 646beed4-88ff-466c-8a9e-b445068010a7 Sep 30 23:38:19 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:19 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 7869df62-01da-440e-b5c8-9bea0427369d Sep 30 23:38:19 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:19 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 8140d595-8e3f-4d5f-965d-5e80f8500ec2 Sep 30 23:38:19 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:19 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 31b06990-2e65-4b38-976e-9edcd322510e Sep 30 23:38:19 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:19 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. For complete SELinux messages run: sealert -l 5ccb5141-5bba-4aa2-9795-445150e3cc5e Sep 30 23:38:19 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory nodes. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the nodes directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:19 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l d9a63156-dcd5-4777-8e42-13192fa4522b Sep 30 23:38:19 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:19 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 0dad90c3-a224-48d6-80dd-ec2e35760506 Sep 30 23:38:19 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:19 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 5a451f8c-50ab-4c93-a39f-9037908da70d Sep 30 23:38:19 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:19 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 1873e10b-8c0e-47a0-97e1-79da517e188d Sep 30 23:38:20 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:20 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). For complete SELinux messages run: sealert -l 5250d74d-ec40-459b-afc3-4b94308ebfc0 Sep 30 23:38:20 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from create access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:20 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). For complete SELinux messages run: sealert -l 039a50f3-bff5-45df-9aa6-1867fd78e6a9 Sep 30 23:38:20 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from create access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed create access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:20 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb/::1,3260. For complete SELinux messages run: sealert -l aa841228-eeeb-446d-92d1-f74667383d1e Sep 30 23:38:20 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from 'write, open' accesses on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:20 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb/::1,3260. For complete SELinux messages run: sealert -l 9d48f760-6bcd-4191-a608-77ebf9b3d54a Sep 30 23:38:20 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:20 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l d004ae25-306f-4132-91d1-a215bb3afc76 Sep 30 23:38:20 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:20 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l e3b6064d-bf0a-44cf-810f-872c1c118ec8 Sep 30 23:38:20 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/tee from add_name access on the directory /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed add_name access on the scan directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Sep 30 23:38:20 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l 0dd7f59f-ffab-475a-8de4-090bd48a01e4 Sep 30 23:38:20 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/tee from create access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed create access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Sep 30 23:38:20 np0005463759.novalocal sudo[108249]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 161 /dev/sda Sep 30 23:38:20 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. For complete SELinux messages run: sealert -l cb245f10-87ac-463d-888c-082df616fb86 Sep 30 23:38:21 np0005463759.novalocal systemd[1]: Started Session c190 of User root. Sep 30 23:38:21 np0005463759.novalocal sudo[108249]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/tee from append access on the file /sys/class/scsi_host/host2/scan. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the scan file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l ab9dcf13-2124-489d-932d-8c317adc82db Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from getattr access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed getattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l e4cd6b17-5e92-4db8-85bc-e76cb667469f Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. For complete SELinux messages run: sealert -l 11f232c5-0e4a-45a4-9918-3f0ce16b6224 Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/unix_chkpwd from read access on the file shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed read access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. For complete SELinux messages run: sealert -l d5662977-5214-4908-9a90-5b62a166b2fc Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/unix_chkpwd from open access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed open access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. For complete SELinux messages run: sealert -l 69cb4831-33ea-460d-a1b0-1b98825b5013 Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/unix_chkpwd from getattr access on the file /etc/shadow. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that unix_chkpwd should be allowed getattr access on the shadow file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'unix_chkpwd' --raw | audit2allow -M my-unixchkpwd # semodule -X 300 -i my-unixchkpwd.pp Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. For complete SELinux messages run: sealert -l 6ea6b9ae-8662-4328-8db2-40473d074542 Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/sudo from nlmsg_relay access on the netlink_audit_socket labeled httpd_t. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should be allowed nlmsg_relay access on netlink_audit_socket labeled httpd_t by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. For complete SELinux messages run: sealert -l 0451345a-6fb6-4dc8-a12b-9fa97b69a6d7 Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/sudo from using the audit_write capability. ***** Plugin catchall_boolean (89.3 confidence) suggests ****************** If you want to allow httpd to mod auth pam Then you must tell SELinux about this by enabling the 'httpd_mod_auth_pam' boolean. Do setsebool -P httpd_mod_auth_pam 1 ***** Plugin catchall (11.6 confidence) suggests ************************** If you believe that sudo should have the audit_write capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. For complete SELinux messages run: sealert -l e4cd6b17-5e92-4db8-85bc-e76cb667469f Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/sudo from using the sys_resource capability. ***** Plugin sys_resource (37.5 confidence) suggests ********************** If you do not want processes to require capabilities to use up all the system resources on your system; Then you need to diagnose why your system is running out of system resources and fix the problem. According to /usr/include/linux/capability.h, sys_resource is required to: /* Override resource limits. Set resource limits. */ /* Override quota limits. */ /* Override reserved space on ext2 filesystem */ /* Modify data journaling mode on ext3 filesystem (uses journaling resources) */ /* NOTE: ext2 honors fsuid when checking for resource overrides, so you can override using fsuid too */ /* Override size restrictions on IPC message queues */ /* Allow more than 64hz interrupts from the real-time clock */ /* Override max number of consoles on console allocation */ /* Override max number of keymaps */ Do fix the cause of the SYS_RESOURCE on your system. ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to run stickshift Then you must tell SELinux about this by enabling the 'httpd_run_stickshift' boolean. Do setsebool -P httpd_run_stickshift 1 ***** Plugin catchall_boolean (30.1 confidence) suggests ****************** If you want to allow httpd to setrlimit Then you must tell SELinux about this by enabling the 'httpd_setrlimit' boolean. Do setsebool -P httpd_setrlimit 1 ***** Plugin catchall (4.20 confidence) suggests ************************** If you believe that sudo should have the sys_resource capability by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'sudo' --raw | audit2allow -M my-sudo # semodule -X 300 -i my-sudo.pp Sep 30 23:38:21 np0005463759.novalocal sudo[108249]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:21 np0005463759.novalocal systemd[1]: session-c190.scope: Deactivated successfully. Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. For complete SELinux messages run: sealert -l 944abb7f-6abd-4763-9953-7f99bd756a8f Sep 30 23:38:21 np0005463759.novalocal sudo[108255]: glance : PWD=/var/lib/glance ; USER=root ; COMMAND=/usr/bin/glance-rootwrap /etc/glance/rootwrap.conf chown 0 /dev/sda Sep 30 23:38:21 np0005463759.novalocal systemd[1]: Started Session c191 of User root. Sep 30 23:38:21 np0005463759.novalocal sudo[108255]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=161) Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/chown from setattr access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that chown should be allowed setattr access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'chown' --raw | audit2allow -M my-chown # semodule -X 300 -i my-chown.pp Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. For complete SELinux messages run: sealert -l 576dcadc-f36e-402a-90af-04162b864cde Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from read access on the blk_file sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed read access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 7ff0f317-843f-4f45-9d09-c35bfbe4940b Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from open access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed open access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. For complete SELinux messages run: sealert -l 2f10addc-fd64-4754-839e-f6e74c8ef93e Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/blkid from ioctl access on the blk_file /dev/sda. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that blkid should be allowed ioctl access on the sda blk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'blkid' --raw | audit2allow -M my-blkid # semodule -X 300 -i my-blkid.pp Sep 30 23:38:21 np0005463759.novalocal sudo[108255]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:21 np0005463759.novalocal systemd[1]: session-c191.scope: Deactivated successfully. Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. For complete SELinux messages run: sealert -l 68adcfc5-43ec-40cc-902e-b1f995a405f8 Sep 30 23:38:21 np0005463759.novalocal kernel: sd 2:0:0:0: [sda] Synchronizing SCSI cache Sep 30 23:38:21 np0005463759.novalocal kernel: scsi 2:0:0:0: alua: Detached Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from 'read, open' accesses on the file /usr/sbin/iscsiadm. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read open access on the iscsiadm file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. For complete SELinux messages run: sealert -l 5ccb5141-5bba-4aa2-9795-445150e3cc5e Sep 30 23:38:21 np0005463759.novalocal iscsid[83869]: iscsid: Connection6:0 to [target: iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb, portal: ::1,3260] through [iface: default] is shutdown. Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from read access on the directory send_targets. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the send_targets directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:21 np0005463759.novalocal sudo[108300]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete-initiator iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb iqn.1994-05.com.redhat:e8763877e0f9 Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb/::1,3260. For complete SELinux messages run: sealert -l 9d48f760-6bcd-4191-a608-77ebf9b3d54a Sep 30 23:38:21 np0005463759.novalocal systemd[1]: Started Session c192 of User root. Sep 30 23:38:21 np0005463759.novalocal sudo[108300]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from getattr access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed getattr access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:21 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. For complete SELinux messages run: sealert -l da7dd66e-7faa-42fd-92d9-720ccdc29de4 Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from 'read, write' accesses on the file lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read write access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. For complete SELinux messages run: sealert -l 646beed4-88ff-466c-8a9e-b445068010a7 Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /run/lock/iscsi/lock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the lock file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). For complete SELinux messages run: sealert -l 7869df62-01da-440e-b5c8-9bea0427369d Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). For complete SELinux messages run: sealert -l 8140d595-8e3f-4d5f-965d-5e80f8500ec2 Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from add_name access on the directory /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed add_name access on the (null) directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). For complete SELinux messages run: sealert -l 31b06990-2e65-4b38-976e-9edcd322510e Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from link access on the file /(null). ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. /(null) default label should be etc_runtime_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v /(null) ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed link access on the (null) file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. For complete SELinux messages run: sealert -l d004ae25-306f-4132-91d1-a215bb3afc76 Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from read access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed read access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb/::1,3260. For complete SELinux messages run: sealert -l 4dc656fc-2daa-47c2-9a22-9b53f5d4d105 Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from open access on the file /var/lib/iscsi/nodes/iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb/::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed open access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. For complete SELinux messages run: sealert -l d9a63156-dcd5-4777-8e42-13192fa4522b Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the lock.write directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. For complete SELinux messages run: sealert -l 0dad90c3-a224-48d6-80dd-ec2e35760506 Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file lock.write. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the lock.write file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. For complete SELinux messages run: sealert -l 5c3a8a45-c9de-4bf4-ac8e-9d75a069bb74 Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/multipathd from read access on the file nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed read access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 6bc8fc5d-399a-4847-9ea8-6b27bf971339 Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/multipathd from open access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed open access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. For complete SELinux messages run: sealert -l 9605bfdd-d76a-472b-8588-e3f5c2368e63 Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/multipathd from getattr access on the file /proc/sys/fs/nr_open. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that multipathd should be allowed getattr access on the nr_open file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'multipathd' --raw | audit2allow -M my-multipathd # semodule -X 300 -i my-multipathd.pp Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/tee from append access on the file delete. For complete SELinux messages run: sealert -l cb245f10-87ac-463d-888c-082df616fb86 Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/tee from append access on the file delete. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that tee should be allowed append access on the delete file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'tee' --raw | audit2allow -M my-tee # semodule -X 300 -i my-tee.pp Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/python3.9 from remove_name access on the directory scsi-1LIO-ORG_IBLOCK:e419c610-0eab-4566-8719-7716b1a650b0. For complete SELinux messages run: sealert -l 92f90d59-ea7c-4892-b0d8-0f8b542e5377 Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/python3.9 from remove_name access on the directory scsi-1LIO-ORG_IBLOCK:e419c610-0eab-4566-8719-7716b1a650b0. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed remove_name access on the scsi-1LIO-ORG_IBLOCK:e419c610-0eab-4566-8719-7716b1a650b0 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'privsep-helper' --raw | audit2allow -M my-privsephelper # semodule -X 300 -i my-privsephelper.pp Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/python3.9 from unlink access on the lnk_file scsi-1LIO-ORG_IBLOCK:e419c610-0eab-4566-8719-7716b1a650b0. For complete SELinux messages run: sealert -l a1e578bb-d072-4fbf-b139-d7698c55f2ed Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/bin/python3.9 from unlink access on the lnk_file scsi-1LIO-ORG_IBLOCK:e419c610-0eab-4566-8719-7716b1a650b0. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that python3.9 should be allowed unlink access on the scsi-1LIO-ORG_IBLOCK:e419c610-0eab-4566-8719-7716b1a650b0 lnk_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'privsep-helper' --raw | audit2allow -M my-privsephelper # semodule -X 300 -i my-privsephelper.pp Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. For complete SELinux messages run: sealert -l 0b914733-4a19-4ac4-a34d-2497fadaf82f Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from write access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb. For complete SELinux messages run: sealert -l 5a451f8c-50ab-4c93-a39f-9037908da70d Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from write access on the directory iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb. ***** Plugin restorecon (99.5 confidence) suggests ************************ If you want to fix the label. iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb default label should be default_t. Then you can run restorecon. The access attempt may have been stopped due to insufficient permissions to access a parent directory in which case try to change the following command accordingly. Do # /sbin/restorecon -v iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb ***** Plugin catchall (1.49 confidence) suggests ************************** If you believe that iscsiadm should be allowed write access on the iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. For complete SELinux messages run: sealert -l e743175e-23c0-4be8-be6b-013beb4a9bd8 Sep 30 23:38:22 np0005463759.novalocal sudo[108312]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-79765d6c-ca86-44be-b9cc-2f6f4557cc12 cinder-volumes/cinder-volumes-pool Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from remove_name access on the directory ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed remove_name access on the ::1,3260 directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. For complete SELinux messages run: sealert -l e8d9a82c-6546-49b8-879e-4128f30a56ad Sep 30 23:38:22 np0005463759.novalocal sudo[108300]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from unlink access on the file ::1,3260. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed unlink access on the ::1,3260 file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb. For complete SELinux messages run: sealert -l 42b343e1-8d38-4d7c-a30e-0b64bfdf527d Sep 30 23:38:22 np0005463759.novalocal systemd[1]: Started Session c193 of User root. Sep 30 23:38:22 np0005463759.novalocal setroubleshoot[107877]: SELinux is preventing /usr/sbin/iscsiadm from rmdir access on the directory iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that iscsiadm should be allowed rmdir access on the iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb directory by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'iscsiadm' --raw | audit2allow -M my-iscsiadm # semodule -X 300 -i my-iscsiadm.pp Sep 30 23:38:22 np0005463759.novalocal systemd[1]: session-c192.scope: Deactivated successfully. Sep 30 23:38:22 np0005463759.novalocal sudo[108312]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:22 np0005463759.novalocal sudo[108314]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Sep 30 23:38:22 np0005463759.novalocal systemd[1]: Started Session c194 of User root. Sep 30 23:38:22 np0005463759.novalocal sudo[108314]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:22 np0005463759.novalocal lvm[108325]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:38:22 np0005463759.novalocal lvm[108325]: VG cinder-volumes finished Sep 30 23:38:22 np0005463759.novalocal sudo[108312]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:22 np0005463759.novalocal systemd[1]: session-c193.scope: Deactivated successfully. Sep 30 23:38:22 np0005463759.novalocal sudo[108314]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:22 np0005463759.novalocal systemd[1]: session-c194.scope: Deactivated successfully. Sep 30 23:38:22 np0005463759.novalocal sudo[108327]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Sep 30 23:38:22 np0005463759.novalocal systemd[1]: Started Session c195 of User root. Sep 30 23:38:22 np0005463759.novalocal sudo[108327]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:23 np0005463759.novalocal sudo[108327]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:23 np0005463759.novalocal systemd[1]: session-c195.scope: Deactivated successfully. Sep 30 23:38:23 np0005463759.novalocal sudo[108332]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool delete iqn.2010-10.org.openstack:volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb Sep 30 23:38:23 np0005463759.novalocal systemd[1]: Started Session c196 of User root. Sep 30 23:38:23 np0005463759.novalocal sudo[108332]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:23 np0005463759.novalocal sudo[108336]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-029afcb3-6e7c-41cf-af26-b382f8161bf3 cinder-volumes/cinder-volumes-pool Sep 30 23:38:23 np0005463759.novalocal systemd[1]: Started Session c197 of User root. Sep 30 23:38:23 np0005463759.novalocal sudo[108336]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:24 np0005463759.novalocal sudo[108332]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:24 np0005463759.novalocal systemd[1]: session-c196.scope: Deactivated successfully. Sep 30 23:38:24 np0005463759.novalocal sudo[108342]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool save Sep 30 23:38:24 np0005463759.novalocal systemd[1]: Started Session c198 of User root. Sep 30 23:38:24 np0005463759.novalocal sudo[108342]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:24 np0005463759.novalocal lvm[108351]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:38:24 np0005463759.novalocal lvm[108351]: VG cinder-volumes finished Sep 30 23:38:24 np0005463759.novalocal sudo[108336]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:24 np0005463759.novalocal systemd[1]: session-c197.scope: Deactivated successfully. Sep 30 23:38:24 np0005463759.novalocal sudo[108342]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:24 np0005463759.novalocal systemd[1]: session-c198.scope: Deactivated successfully. Sep 30 23:38:25 np0005463759.novalocal sudo[108354]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-029afcb3-6e7c-41cf-af26-b382f8161bf3 Sep 30 23:38:25 np0005463759.novalocal systemd[1]: Started Session c199 of User root. Sep 30 23:38:25 np0005463759.novalocal sudo[108354]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:25 np0005463759.novalocal sudo[108354]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:25 np0005463759.novalocal systemd[1]: session-c199.scope: Deactivated successfully. Sep 30 23:38:25 np0005463759.novalocal sudo[108358]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-029afcb3-6e7c-41cf-af26-b382f8161bf3 Sep 30 23:38:25 np0005463759.novalocal systemd[1]: Started Session c200 of User root. Sep 30 23:38:25 np0005463759.novalocal sudo[108358]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:25 np0005463759.novalocal sudo[108358]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:25 np0005463759.novalocal systemd[1]: session-c200.scope: Deactivated successfully. Sep 30 23:38:25 np0005463759.novalocal sudo[108362]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-029afcb3-6e7c-41cf-af26-b382f8161bf3 Sep 30 23:38:25 np0005463759.novalocal systemd[1]: Started Session c201 of User root. Sep 30 23:38:25 np0005463759.novalocal sudo[108362]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:26 np0005463759.novalocal lvm[108369]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:38:26 np0005463759.novalocal lvm[108369]: VG cinder-volumes finished Sep 30 23:38:26 np0005463759.novalocal sudo[108362]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:26 np0005463759.novalocal systemd[1]: session-c201.scope: Deactivated successfully. Sep 30 23:38:26 np0005463759.novalocal sudo[108370]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:38:26 np0005463759.novalocal systemd[1]: Started Session c202 of User root. Sep 30 23:38:26 np0005463759.novalocal sudo[108370]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:26 np0005463759.novalocal sudo[108370]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:26 np0005463759.novalocal systemd[1]: session-c202.scope: Deactivated successfully. Sep 30 23:38:26 np0005463759.novalocal sudo[108375]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:38:26 np0005463759.novalocal systemd[1]: Started Session c203 of User root. Sep 30 23:38:26 np0005463759.novalocal sudo[108375]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:27 np0005463759.novalocal sudo[108379]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-79765d6c-ca86-44be-b9cc-2f6f4557cc12 Sep 30 23:38:27 np0005463759.novalocal sudo[108375]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:27 np0005463759.novalocal systemd[1]: Started Session c204 of User root. Sep 30 23:38:27 np0005463759.novalocal systemd[1]: session-c203.scope: Deactivated successfully. Sep 30 23:38:27 np0005463759.novalocal sudo[108379]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:27 np0005463759.novalocal sudo[108381]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:38:27 np0005463759.novalocal systemd[1]: Started Session c205 of User root. Sep 30 23:38:27 np0005463759.novalocal sudo[108381]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:27 np0005463759.novalocal sudo[108384]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf cinder-rtstool get-targets Sep 30 23:38:27 np0005463759.novalocal systemd[1]: Started Session c206 of User root. Sep 30 23:38:27 np0005463759.novalocal sudo[108384]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:27 np0005463759.novalocal sudo[108379]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:27 np0005463759.novalocal systemd[1]: session-c204.scope: Deactivated successfully. Sep 30 23:38:27 np0005463759.novalocal sudo[108391]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-79765d6c-ca86-44be-b9cc-2f6f4557cc12 Sep 30 23:38:27 np0005463759.novalocal sudo[108381]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:27 np0005463759.novalocal systemd[1]: Started Session c207 of User root. Sep 30 23:38:27 np0005463759.novalocal systemd[1]: session-c205.scope: Deactivated successfully. Sep 30 23:38:27 np0005463759.novalocal sudo[108391]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:27 np0005463759.novalocal sudo[108394]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:38:27 np0005463759.novalocal systemd[1]: Started Session c208 of User root. Sep 30 23:38:27 np0005463759.novalocal sudo[108394]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:27 np0005463759.novalocal sudo[108384]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:27 np0005463759.novalocal systemd[1]: session-c206.scope: Deactivated successfully. Sep 30 23:38:28 np0005463759.novalocal sudo[108399]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb Sep 30 23:38:28 np0005463759.novalocal sudo[108391]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:28 np0005463759.novalocal systemd[1]: Started Session c209 of User root. Sep 30 23:38:28 np0005463759.novalocal systemd[1]: session-c207.scope: Deactivated successfully. Sep 30 23:38:28 np0005463759.novalocal sudo[108399]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:28 np0005463759.novalocal sudo[108402]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-79765d6c-ca86-44be-b9cc-2f6f4557cc12 Sep 30 23:38:28 np0005463759.novalocal systemd[1]: Started Session c210 of User root. Sep 30 23:38:28 np0005463759.novalocal sudo[108402]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:28 np0005463759.novalocal sudo[108394]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:28 np0005463759.novalocal systemd[1]: session-c208.scope: Deactivated successfully. Sep 30 23:38:28 np0005463759.novalocal sudo[108399]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:28 np0005463759.novalocal systemd[1]: session-c209.scope: Deactivated successfully. Sep 30 23:38:28 np0005463759.novalocal sudo[108407]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb Sep 30 23:38:28 np0005463759.novalocal systemd[1]: Started Session c211 of User root. Sep 30 23:38:28 np0005463759.novalocal sudo[108407]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:28 np0005463759.novalocal lvm[108412]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:38:28 np0005463759.novalocal lvm[108412]: VG cinder-volumes finished Sep 30 23:38:28 np0005463759.novalocal sudo[108402]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:28 np0005463759.novalocal systemd[1]: session-c210.scope: Deactivated successfully. Sep 30 23:38:28 np0005463759.novalocal sudo[108413]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:38:28 np0005463759.novalocal systemd[1]: Started Session c212 of User root. Sep 30 23:38:28 np0005463759.novalocal sudo[108413]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:28 np0005463759.novalocal sudo[108407]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:28 np0005463759.novalocal systemd[1]: session-c211.scope: Deactivated successfully. Sep 30 23:38:28 np0005463759.novalocal sudo[108417]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-0d0d41a6-d3f3-4b48-bb21-748ac3af03cb Sep 30 23:38:28 np0005463759.novalocal systemd[1]: Started Session c213 of User root. Sep 30 23:38:28 np0005463759.novalocal sudo[108417]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:29 np0005463759.novalocal sudo[108413]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:29 np0005463759.novalocal systemd[1]: session-c212.scope: Deactivated successfully. Sep 30 23:38:29 np0005463759.novalocal sudo[108421]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:38:29 np0005463759.novalocal systemd[1]: Started Session c214 of User root. Sep 30 23:38:29 np0005463759.novalocal sudo[108421]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:29 np0005463759.novalocal lvm[108426]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:38:29 np0005463759.novalocal lvm[108426]: VG cinder-volumes finished Sep 30 23:38:29 np0005463759.novalocal sudo[108417]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:29 np0005463759.novalocal systemd[1]: session-c213.scope: Deactivated successfully. Sep 30 23:38:29 np0005463759.novalocal sudo[108428]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:38:29 np0005463759.novalocal systemd[1]: Started Session c215 of User root. Sep 30 23:38:29 np0005463759.novalocal sudo[108428]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:29 np0005463759.novalocal sudo[108421]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:29 np0005463759.novalocal systemd[1]: session-c214.scope: Deactivated successfully. Sep 30 23:38:29 np0005463759.novalocal sudo[108431]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:38:29 np0005463759.novalocal systemd[1]: Started Session c216 of User root. Sep 30 23:38:29 np0005463759.novalocal sudo[108431]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:29 np0005463759.novalocal sudo[108431]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:29 np0005463759.novalocal systemd[1]: session-c216.scope: Deactivated successfully. Sep 30 23:38:29 np0005463759.novalocal sudo[108428]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:29 np0005463759.novalocal systemd[1]: session-c215.scope: Deactivated successfully. Sep 30 23:38:29 np0005463759.novalocal sudo[108436]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:38:29 np0005463759.novalocal systemd[1]: Started Session c217 of User root. Sep 30 23:38:29 np0005463759.novalocal sudo[108437]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:38:29 np0005463759.novalocal sudo[108436]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:29 np0005463759.novalocal systemd[1]: Started Session c218 of User root. Sep 30 23:38:29 np0005463759.novalocal sudo[108437]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:29 np0005463759.novalocal sudo[108442]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29 Sep 30 23:38:29 np0005463759.novalocal systemd[1]: Started Session c219 of User root. Sep 30 23:38:29 np0005463759.novalocal sudo[108442]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:30 np0005463759.novalocal sudo[108436]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:30 np0005463759.novalocal systemd[1]: session-c217.scope: Deactivated successfully. Sep 30 23:38:30 np0005463759.novalocal sudo[108437]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:30 np0005463759.novalocal systemd[1]: session-c218.scope: Deactivated successfully. Sep 30 23:38:30 np0005463759.novalocal sudo[108448]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:38:30 np0005463759.novalocal systemd[1]: Started Session c220 of User root. Sep 30 23:38:30 np0005463759.novalocal sudo[108448]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:30 np0005463759.novalocal sudo[108442]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:30 np0005463759.novalocal systemd[1]: session-c219.scope: Deactivated successfully. Sep 30 23:38:30 np0005463759.novalocal sudo[108451]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate --name volume-645269bb-2ebe-4854-8e56-7d9549d54794 --snapshot cinder-volumes/volume-3df09f43-9f1e-4537-8dd1-c4c47f8a5a29 Sep 30 23:38:30 np0005463759.novalocal systemd[1]: Started Session c221 of User root. Sep 30 23:38:30 np0005463759.novalocal sudo[108451]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:30 np0005463759.novalocal sudo[108448]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:30 np0005463759.novalocal systemd[1]: session-c220.scope: Deactivated successfully. Sep 30 23:38:30 np0005463759.novalocal sudo[108455]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:38:30 np0005463759.novalocal systemd[1]: Started Session c222 of User root. Sep 30 23:38:30 np0005463759.novalocal sudo[108455]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:30 np0005463759.novalocal dmeventd[99059]: No longer monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Sep 30 23:38:30 np0005463759.novalocal dmeventd[99059]: Monitoring thin pool cinder--volumes-cinder--volumes--pool-tpool. Sep 30 23:38:30 np0005463759.novalocal lvm[108465]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:38:30 np0005463759.novalocal lvm[108465]: VG cinder-volumes finished Sep 30 23:38:30 np0005463759.novalocal sudo[108451]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:30 np0005463759.novalocal systemd[1]: session-c221.scope: Deactivated successfully. Sep 30 23:38:30 np0005463759.novalocal sudo[108466]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvchange -a y --yes -k n cinder-volumes/volume-645269bb-2ebe-4854-8e56-7d9549d54794 Sep 30 23:38:30 np0005463759.novalocal systemd[1]: Started Session c223 of User root. Sep 30 23:38:30 np0005463759.novalocal sudo[108466]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:31 np0005463759.novalocal sudo[108455]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:31 np0005463759.novalocal systemd[1]: session-c222.scope: Deactivated successfully. Sep 30 23:38:31 np0005463759.novalocal lvm[108472]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:38:31 np0005463759.novalocal lvm[108472]: VG cinder-volumes finished Sep 30 23:38:31 np0005463759.novalocal sudo[108466]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:31 np0005463759.novalocal systemd[1]: session-c223.scope: Deactivated successfully. Sep 30 23:38:32 np0005463759.novalocal sudo[108479]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-13d5692b-39ab-4e8f-bbea-bb73dc460f4c cinder-volumes/cinder-volumes-pool Sep 30 23:38:32 np0005463759.novalocal systemd[1]: Started Session c224 of User root. Sep 30 23:38:32 np0005463759.novalocal sudo[108479]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:32 np0005463759.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service: Deactivated successfully. Sep 30 23:38:32 np0005463759.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@11.service: Consumed 1.419s CPU time. Sep 30 23:38:32 np0005463759.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Sep 30 23:38:32 np0005463759.novalocal systemd[1]: setroubleshootd.service: Consumed 6.326s CPU time. Sep 30 23:38:32 np0005463759.novalocal lvm[108488]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:38:32 np0005463759.novalocal lvm[108488]: VG cinder-volumes finished Sep 30 23:38:32 np0005463759.novalocal sudo[108479]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:32 np0005463759.novalocal systemd[1]: session-c224.scope: Deactivated successfully. Sep 30 23:38:33 np0005463759.novalocal sshd-session[108489]: Received disconnect from 192.227.153.63 port 47070:11: Bye Bye [preauth] Sep 30 23:38:33 np0005463759.novalocal sshd-session[108489]: Disconnected from authenticating user root 192.227.153.63 port 47070 [preauth] Sep 30 23:38:33 np0005463759.novalocal sudo[108491]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-13d5692b-39ab-4e8f-bbea-bb73dc460f4c Sep 30 23:38:33 np0005463759.novalocal systemd[1]: Started Session c225 of User root. Sep 30 23:38:33 np0005463759.novalocal sudo[108491]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:33 np0005463759.novalocal sudo[108491]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:33 np0005463759.novalocal systemd[1]: session-c225.scope: Deactivated successfully. Sep 30 23:38:33 np0005463759.novalocal sudo[108495]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-13d5692b-39ab-4e8f-bbea-bb73dc460f4c Sep 30 23:38:33 np0005463759.novalocal systemd[1]: Started Session c226 of User root. Sep 30 23:38:34 np0005463759.novalocal sudo[108495]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:34 np0005463759.novalocal sudo[108495]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:34 np0005463759.novalocal systemd[1]: session-c226.scope: Deactivated successfully. Sep 30 23:38:34 np0005463759.novalocal sudo[108501]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-13d5692b-39ab-4e8f-bbea-bb73dc460f4c Sep 30 23:38:34 np0005463759.novalocal systemd[1]: Started Session c227 of User root. Sep 30 23:38:34 np0005463759.novalocal sudo[108501]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:34 np0005463759.novalocal lvm[108508]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:38:34 np0005463759.novalocal lvm[108508]: VG cinder-volumes finished Sep 30 23:38:34 np0005463759.novalocal sudo[108501]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:34 np0005463759.novalocal systemd[1]: session-c227.scope: Deactivated successfully. Sep 30 23:38:35 np0005463759.novalocal sudo[108509]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:38:35 np0005463759.novalocal systemd[1]: Started Session c228 of User root. Sep 30 23:38:35 np0005463759.novalocal sudo[108509]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:35 np0005463759.novalocal sudo[108509]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:35 np0005463759.novalocal systemd[1]: session-c228.scope: Deactivated successfully. Sep 30 23:38:35 np0005463759.novalocal sudo[108513]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:38:35 np0005463759.novalocal systemd[1]: Started Session c229 of User root. Sep 30 23:38:35 np0005463759.novalocal sudo[108513]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:35 np0005463759.novalocal sudo[108516]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-645269bb-2ebe-4854-8e56-7d9549d54794 Sep 30 23:38:35 np0005463759.novalocal systemd[1]: Started Session c230 of User root. Sep 30 23:38:35 np0005463759.novalocal sudo[108516]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:35 np0005463759.novalocal sudo[108513]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:35 np0005463759.novalocal systemd[1]: session-c229.scope: Deactivated successfully. Sep 30 23:38:35 np0005463759.novalocal sudo[108520]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:38:35 np0005463759.novalocal systemd[1]: Started Session c231 of User root. Sep 30 23:38:35 np0005463759.novalocal sudo[108520]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:36 np0005463759.novalocal sudo[108516]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:36 np0005463759.novalocal systemd[1]: session-c230.scope: Deactivated successfully. Sep 30 23:38:36 np0005463759.novalocal sudo[108524]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-645269bb-2ebe-4854-8e56-7d9549d54794 Sep 30 23:38:36 np0005463759.novalocal systemd[1]: Started Session c232 of User root. Sep 30 23:38:36 np0005463759.novalocal sudo[108524]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:36 np0005463759.novalocal sudo[108520]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:36 np0005463759.novalocal systemd[1]: session-c231.scope: Deactivated successfully. Sep 30 23:38:36 np0005463759.novalocal sudo[108528]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:38:36 np0005463759.novalocal systemd[1]: Started Session c233 of User root. Sep 30 23:38:36 np0005463759.novalocal sudo[108528]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:36 np0005463759.novalocal sudo[108524]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:36 np0005463759.novalocal systemd[1]: session-c232.scope: Deactivated successfully. Sep 30 23:38:36 np0005463759.novalocal sudo[108532]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-645269bb-2ebe-4854-8e56-7d9549d54794 Sep 30 23:38:36 np0005463759.novalocal systemd[1]: Started Session c234 of User root. Sep 30 23:38:36 np0005463759.novalocal sudo[108532]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:36 np0005463759.novalocal sudo[108528]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:36 np0005463759.novalocal systemd[1]: session-c233.scope: Deactivated successfully. Sep 30 23:38:36 np0005463759.novalocal lvm[108538]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:38:36 np0005463759.novalocal lvm[108538]: VG cinder-volumes finished Sep 30 23:38:37 np0005463759.novalocal sudo[108532]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:37 np0005463759.novalocal systemd[1]: session-c234.scope: Deactivated successfully. Sep 30 23:38:37 np0005463759.novalocal sudo[108539]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:38:37 np0005463759.novalocal systemd[1]: Started Session c235 of User root. Sep 30 23:38:37 np0005463759.novalocal sudo[108539]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:37 np0005463759.novalocal sudo[108539]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:37 np0005463759.novalocal systemd[1]: session-c235.scope: Deactivated successfully. Sep 30 23:38:37 np0005463759.novalocal sudo[108543]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:38:37 np0005463759.novalocal systemd[1]: Started Session c236 of User root. Sep 30 23:38:37 np0005463759.novalocal sudo[108543]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:37 np0005463759.novalocal sudo[108543]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:37 np0005463759.novalocal systemd[1]: session-c236.scope: Deactivated successfully. Sep 30 23:38:38 np0005463759.novalocal sudo[108547]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:38:38 np0005463759.novalocal systemd[1]: Started Session c237 of User root. Sep 30 23:38:38 np0005463759.novalocal sudo[108547]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:38 np0005463759.novalocal sudo[108547]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:38 np0005463759.novalocal systemd[1]: session-c237.scope: Deactivated successfully. Sep 30 23:38:38 np0005463759.novalocal sudo[108551]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:38:38 np0005463759.novalocal systemd[1]: Started Session c238 of User root. Sep 30 23:38:38 np0005463759.novalocal sudo[108551]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:38 np0005463759.novalocal sudo[108551]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:38 np0005463759.novalocal systemd[1]: session-c238.scope: Deactivated successfully. Sep 30 23:38:41 np0005463759.novalocal sudo[108556]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-423f5483-f5d4-4f22-a75e-964eb6038b8f cinder-volumes/cinder-volumes-pool Sep 30 23:38:41 np0005463759.novalocal systemd[1]: Started Session c239 of User root. Sep 30 23:38:41 np0005463759.novalocal sudo[108556]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:41 np0005463759.novalocal lvm[108567]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:38:41 np0005463759.novalocal lvm[108567]: VG cinder-volumes finished Sep 30 23:38:41 np0005463759.novalocal sudo[108556]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:41 np0005463759.novalocal systemd[1]: session-c239.scope: Deactivated successfully. Sep 30 23:38:42 np0005463759.novalocal sudo[108570]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-826a8f5a-fac5-41da-b648-f2749d4e7692 cinder-volumes/cinder-volumes-pool Sep 30 23:38:42 np0005463759.novalocal systemd[1]: Started Session c240 of User root. Sep 30 23:38:42 np0005463759.novalocal sudo[108570]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:42 np0005463759.novalocal lvm[108579]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:38:42 np0005463759.novalocal lvm[108579]: VG cinder-volumes finished Sep 30 23:38:42 np0005463759.novalocal sudo[108570]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:42 np0005463759.novalocal systemd[1]: session-c240.scope: Deactivated successfully. Sep 30 23:38:43 np0005463759.novalocal sudo[108580]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvcreate -T -V 1g -n volume-2723c5f9-c69a-45b1-a706-7515dd34af04 cinder-volumes/cinder-volumes-pool Sep 30 23:38:43 np0005463759.novalocal systemd[1]: Started Session c241 of User root. Sep 30 23:38:43 np0005463759.novalocal sudo[108580]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:44 np0005463759.novalocal lvm[108591]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:38:44 np0005463759.novalocal lvm[108591]: VG cinder-volumes finished Sep 30 23:38:44 np0005463759.novalocal sudo[108580]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:44 np0005463759.novalocal systemd[1]: session-c241.scope: Deactivated successfully. Sep 30 23:38:45 np0005463759.novalocal sudo[108592]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-2723c5f9-c69a-45b1-a706-7515dd34af04 Sep 30 23:38:45 np0005463759.novalocal systemd[1]: Started Session c242 of User root. Sep 30 23:38:45 np0005463759.novalocal sudo[108592]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:45 np0005463759.novalocal sudo[108592]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:45 np0005463759.novalocal systemd[1]: session-c242.scope: Deactivated successfully. Sep 30 23:38:45 np0005463759.novalocal sudo[108597]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-2723c5f9-c69a-45b1-a706-7515dd34af04 Sep 30 23:38:45 np0005463759.novalocal systemd[1]: Started Session c243 of User root. Sep 30 23:38:45 np0005463759.novalocal sudo[108597]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:45 np0005463759.novalocal sudo[108597]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:45 np0005463759.novalocal systemd[1]: session-c243.scope: Deactivated successfully. Sep 30 23:38:45 np0005463759.novalocal sudo[108601]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-2723c5f9-c69a-45b1-a706-7515dd34af04 Sep 30 23:38:46 np0005463759.novalocal systemd[1]: Started Session c244 of User root. Sep 30 23:38:46 np0005463759.novalocal sudo[108601]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:46 np0005463759.novalocal lvm[108608]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:38:46 np0005463759.novalocal lvm[108608]: VG cinder-volumes finished Sep 30 23:38:46 np0005463759.novalocal sudo[108601]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:46 np0005463759.novalocal systemd[1]: session-c244.scope: Deactivated successfully. Sep 30 23:38:46 np0005463759.novalocal sudo[108609]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:38:46 np0005463759.novalocal systemd[1]: Started Session c245 of User root. Sep 30 23:38:46 np0005463759.novalocal sudo[108609]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:46 np0005463759.novalocal sudo[108609]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:46 np0005463759.novalocal systemd[1]: session-c245.scope: Deactivated successfully. Sep 30 23:38:46 np0005463759.novalocal sudo[108613]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:38:46 np0005463759.novalocal systemd[1]: Started Session c246 of User root. Sep 30 23:38:47 np0005463759.novalocal sudo[108613]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:47 np0005463759.novalocal sudo[108613]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:47 np0005463759.novalocal systemd[1]: session-c246.scope: Deactivated successfully. Sep 30 23:38:47 np0005463759.novalocal sudo[108617]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:38:47 np0005463759.novalocal systemd[1]: Started Session c247 of User root. Sep 30 23:38:47 np0005463759.novalocal sudo[108617]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:47 np0005463759.novalocal sudo[108620]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-826a8f5a-fac5-41da-b648-f2749d4e7692 Sep 30 23:38:47 np0005463759.novalocal systemd[1]: Started Session c248 of User root. Sep 30 23:38:47 np0005463759.novalocal sudo[108620]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:47 np0005463759.novalocal sudo[108617]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:47 np0005463759.novalocal systemd[1]: session-c247.scope: Deactivated successfully. Sep 30 23:38:47 np0005463759.novalocal sudo[108625]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:38:47 np0005463759.novalocal sudo[108620]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:47 np0005463759.novalocal systemd[1]: Started Session c249 of User root. Sep 30 23:38:47 np0005463759.novalocal systemd[1]: session-c248.scope: Deactivated successfully. Sep 30 23:38:47 np0005463759.novalocal sudo[108625]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:47 np0005463759.novalocal sudo[108627]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-826a8f5a-fac5-41da-b648-f2749d4e7692 Sep 30 23:38:47 np0005463759.novalocal systemd[1]: Started Session c250 of User root. Sep 30 23:38:47 np0005463759.novalocal sudo[108627]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:48 np0005463759.novalocal sudo[108625]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:48 np0005463759.novalocal systemd[1]: session-c249.scope: Deactivated successfully. Sep 30 23:38:48 np0005463759.novalocal sudo[108627]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:48 np0005463759.novalocal systemd[1]: session-c250.scope: Deactivated successfully. Sep 30 23:38:48 np0005463759.novalocal sudo[108633]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-826a8f5a-fac5-41da-b648-f2749d4e7692 Sep 30 23:38:48 np0005463759.novalocal systemd[1]: Started Session c251 of User root. Sep 30 23:38:48 np0005463759.novalocal sudo[108633]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:48 np0005463759.novalocal lvm[108638]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:38:48 np0005463759.novalocal lvm[108638]: VG cinder-volumes finished Sep 30 23:38:48 np0005463759.novalocal sudo[108633]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:48 np0005463759.novalocal systemd[1]: session-c251.scope: Deactivated successfully. Sep 30 23:38:48 np0005463759.novalocal sudo[108639]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:38:48 np0005463759.novalocal systemd[1]: Started Session c252 of User root. Sep 30 23:38:48 np0005463759.novalocal sudo[108639]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:49 np0005463759.novalocal sudo[108639]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:49 np0005463759.novalocal systemd[1]: session-c252.scope: Deactivated successfully. Sep 30 23:38:49 np0005463759.novalocal sudo[108643]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:38:49 np0005463759.novalocal systemd[1]: Started Session c253 of User root. Sep 30 23:38:49 np0005463759.novalocal sudo[108643]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:49 np0005463759.novalocal sudo[108643]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:49 np0005463759.novalocal systemd[1]: session-c253.scope: Deactivated successfully. Sep 30 23:38:49 np0005463759.novalocal sudo[108650]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:38:49 np0005463759.novalocal systemd[1]: Started Session c254 of User root. Sep 30 23:38:49 np0005463759.novalocal sudo[108650]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:49 np0005463759.novalocal sudo[108654]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes/volume-423f5483-f5d4-4f22-a75e-964eb6038b8f Sep 30 23:38:49 np0005463759.novalocal systemd[1]: Started Session c255 of User root. Sep 30 23:38:49 np0005463759.novalocal sudo[108654]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:50 np0005463759.novalocal sudo[108650]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:50 np0005463759.novalocal systemd[1]: session-c254.scope: Deactivated successfully. Sep 30 23:38:50 np0005463759.novalocal sudo[108659]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:38:50 np0005463759.novalocal systemd[1]: Started Session c256 of User root. Sep 30 23:38:50 np0005463759.novalocal sudo[108659]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:50 np0005463759.novalocal sudo[108654]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:50 np0005463759.novalocal systemd[1]: session-c255.scope: Deactivated successfully. Sep 30 23:38:50 np0005463759.novalocal sudo[108662]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvdisplay --noheading -C -o Attr --readonly cinder-volumes/volume-423f5483-f5d4-4f22-a75e-964eb6038b8f Sep 30 23:38:50 np0005463759.novalocal systemd[1]: Started Session c257 of User root. Sep 30 23:38:50 np0005463759.novalocal sudo[108662]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:50 np0005463759.novalocal sudo[108659]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:50 np0005463759.novalocal systemd[1]: session-c256.scope: Deactivated successfully. Sep 30 23:38:50 np0005463759.novalocal sudo[108662]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:50 np0005463759.novalocal systemd[1]: session-c257.scope: Deactivated successfully. Sep 30 23:38:50 np0005463759.novalocal sudo[108667]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf lvremove --config 'activation { retry_deactivation = 1} ' -f cinder-volumes/volume-423f5483-f5d4-4f22-a75e-964eb6038b8f Sep 30 23:38:50 np0005463759.novalocal systemd[1]: Started Session c258 of User root. Sep 30 23:38:50 np0005463759.novalocal sudo[108667]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:51 np0005463759.novalocal lvm[108674]: PV /dev/loop2 online, VG cinder-volumes is complete. Sep 30 23:38:51 np0005463759.novalocal lvm[108674]: VG cinder-volumes finished Sep 30 23:38:51 np0005463759.novalocal sudo[108667]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:51 np0005463759.novalocal systemd[1]: session-c258.scope: Deactivated successfully. Sep 30 23:38:51 np0005463759.novalocal sudo[108675]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:38:51 np0005463759.novalocal systemd[1]: Started Session c259 of User root. Sep 30 23:38:51 np0005463759.novalocal sudo[108675]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:51 np0005463759.novalocal sudo[108675]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:51 np0005463759.novalocal systemd[1]: session-c259.scope: Deactivated successfully. Sep 30 23:38:51 np0005463759.novalocal sudo[108680]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:38:51 np0005463759.novalocal systemd[1]: Started Session c260 of User root. Sep 30 23:38:51 np0005463759.novalocal sudo[108680]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:52 np0005463759.novalocal sudo[108680]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:52 np0005463759.novalocal systemd[1]: session-c260.scope: Deactivated successfully. Sep 30 23:38:52 np0005463759.novalocal sudo[108684]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:38:52 np0005463759.novalocal systemd[1]: Started Session c261 of User root. Sep 30 23:38:52 np0005463759.novalocal sudo[108684]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:52 np0005463759.novalocal sudo[108684]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:52 np0005463759.novalocal systemd[1]: session-c261.scope: Deactivated successfully. Sep 30 23:38:52 np0005463759.novalocal sudo[108688]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:38:52 np0005463759.novalocal systemd[1]: Started Session c262 of User root. Sep 30 23:38:52 np0005463759.novalocal sudo[108688]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:38:53 np0005463759.novalocal sudo[108688]: pam_unix(sudo:session): session closed for user root Sep 30 23:38:53 np0005463759.novalocal systemd[1]: session-c262.scope: Deactivated successfully. Sep 30 23:39:08 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:39:08 np0005463759.novalocal sshd-session[108697]: Invalid user u1 from 218.51.148.194 port 38332 Sep 30 23:39:08 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:39:08 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:39:08 np0005463759.novalocal sshd-session[108697]: Received disconnect from 218.51.148.194 port 38332:11: Bye Bye [preauth] Sep 30 23:39:08 np0005463759.novalocal sshd-session[108697]: Disconnected from invalid user u1 218.51.148.194 port 38332 [preauth] Sep 30 23:39:11 np0005463759.novalocal sudo[108718]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:39:11 np0005463759.novalocal systemd[1]: Started Session c263 of User root. Sep 30 23:39:11 np0005463759.novalocal sudo[108718]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:39:11 np0005463759.novalocal sudo[108718]: pam_unix(sudo:session): session closed for user root Sep 30 23:39:11 np0005463759.novalocal systemd[1]: session-c263.scope: Deactivated successfully. Sep 30 23:39:11 np0005463759.novalocal sudo[108725]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:39:11 np0005463759.novalocal systemd[1]: Started Session c264 of User root. Sep 30 23:39:11 np0005463759.novalocal sudo[108725]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:39:12 np0005463759.novalocal sudo[108725]: pam_unix(sudo:session): session closed for user root Sep 30 23:39:12 np0005463759.novalocal systemd[1]: session-c264.scope: Deactivated successfully. Sep 30 23:39:12 np0005463759.novalocal sudo[108729]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:39:12 np0005463759.novalocal systemd[1]: Started Session c265 of User root. Sep 30 23:39:12 np0005463759.novalocal sudo[108729]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:39:12 np0005463759.novalocal sudo[108729]: pam_unix(sudo:session): session closed for user root Sep 30 23:39:12 np0005463759.novalocal systemd[1]: session-c265.scope: Deactivated successfully. Sep 30 23:39:12 np0005463759.novalocal sudo[108733]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:39:12 np0005463759.novalocal systemd[1]: Started Session c266 of User root. Sep 30 23:39:12 np0005463759.novalocal sudo[108733]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:39:12 np0005463759.novalocal kernel: tape326e153-3e: entered promiscuous mode Sep 30 23:39:12 np0005463759.novalocal NetworkManager[858]: [1759289952.5592] manager: (tape326e153-3e): new Tun device (/org/freedesktop/NetworkManager/Devices/27) Sep 30 23:39:12 np0005463759.novalocal virtqemud[103209]: Domain id=9 name='instance-00000008' uuid=38f0056a-4275-4a90-b967-6526e98fc3f6 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Sep 30 23:39:12 np0005463759.novalocal virtqemud[103209]: Domain id=9 name='instance-00000008' uuid=38f0056a-4275-4a90-b967-6526e98fc3f6 is tainted: deprecated-config (CPU model 'qemu64') Sep 30 23:39:12 np0005463759.novalocal systemd-udevd[108752]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:39:12 np0005463759.novalocal systemd-machined[100508]: New machine qemu-9-instance-00000008. Sep 30 23:39:12 np0005463759.novalocal NetworkManager[858]: [1759289952.6311] device (tape326e153-3e): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Sep 30 23:39:12 np0005463759.novalocal systemd[1]: Started Virtual Machine qemu-9-instance-00000008. Sep 30 23:39:12 np0005463759.novalocal NetworkManager[858]: [1759289952.6325] device (tape326e153-3e): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Sep 30 23:39:12 np0005463759.novalocal NetworkManager[858]: [1759289952.7212] manager: (tap880d4740-a0): new Veth device (/org/freedesktop/NetworkManager/Devices/28) Sep 30 23:39:12 np0005463759.novalocal NetworkManager[858]: [1759289952.8067] device (tap880d4740-a0): carrier: link connected Sep 30 23:39:12 np0005463759.novalocal sudo[108733]: pam_unix(sudo:session): session closed for user root Sep 30 23:39:12 np0005463759.novalocal systemd[1]: session-c266.scope: Deactivated successfully. Sep 30 23:39:13 np0005463759.novalocal kernel: tap880d4740-a0: entered promiscuous mode Sep 30 23:39:13 np0005463759.novalocal sudo[108798]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-880d4740-a3d2-4d40-be91-939b1e98e5ae env PROCESS_TAG=haproxy-880d4740-a3d2-4d40-be91-939b1e98e5ae haproxy -f /var/lib/neutron/ovn-metadata-proxy/880d4740-a3d2-4d40-be91-939b1e98e5ae.conf Sep 30 23:39:13 np0005463759.novalocal systemd[1]: Started Session c267 of User root. Sep 30 23:39:13 np0005463759.novalocal sudo[108798]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Sep 30 23:39:13 np0005463759.novalocal sudo[108798]: pam_unix(sudo:session): session closed for user root Sep 30 23:39:23 np0005463759.novalocal sshd-session[108849]: Invalid user drew from 154.92.109.196 port 6699 Sep 30 23:39:23 np0005463759.novalocal sshd-session[108849]: Received disconnect from 154.92.109.196 port 6699:11: Bye Bye [preauth] Sep 30 23:39:23 np0005463759.novalocal sshd-session[108849]: Disconnected from invalid user drew 154.92.109.196 port 6699 [preauth] Sep 30 23:39:31 np0005463759.novalocal sshd-session[108885]: Invalid user tommy from 192.227.153.63 port 46728 Sep 30 23:39:31 np0005463759.novalocal sshd-session[108885]: Received disconnect from 192.227.153.63 port 46728:11: Bye Bye [preauth] Sep 30 23:39:31 np0005463759.novalocal sshd-session[108885]: Disconnected from invalid user tommy 192.227.153.63 port 46728 [preauth] Sep 30 23:39:34 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.6:48234 [30/Sep/2025:23:39:34.482] listener listener/metadata 0/0/0/335/335 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Sep 30 23:39:34 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.6:48242 [30/Sep/2025:23:39:34.882] listener listener/metadata 0/0/0/15/15 200 160 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Sep 30 23:39:34 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.6:48258 [30/Sep/2025:23:39:34.921] listener listener/metadata 0/0/0/9/9 200 325 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Sep 30 23:39:34 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.6:48262 [30/Sep/2025:23:39:34.977] listener listener/metadata 0/0/0/13/13 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Sep 30 23:39:35 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.6:48272 [30/Sep/2025:23:39:35.028] listener listener/metadata 0/0/0/16/16 200 120 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Sep 30 23:39:35 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.6:48288 [30/Sep/2025:23:39:35.081] listener listener/metadata 0/0/0/13/13 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Sep 30 23:39:35 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.6:48290 [30/Sep/2025:23:39:35.133] listener listener/metadata 0/0/0/16/16 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Sep 30 23:39:35 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.6:48296 [30/Sep/2025:23:39:35.205] listener listener/metadata 0/0/0/13/13 200 132 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Sep 30 23:39:35 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.6:48304 [30/Sep/2025:23:39:35.275] listener listener/metadata 0/0/0/15/15 200 174 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Sep 30 23:39:35 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.6:48310 [30/Sep/2025:23:39:35.338] listener listener/metadata 0/0/0/14/14 200 174 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Sep 30 23:39:35 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.6:48322 [30/Sep/2025:23:39:35.391] listener listener/metadata 0/0/0/20/20 404 281 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Sep 30 23:39:35 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.6:48330 [30/Sep/2025:23:39:35.452] listener listener/metadata 0/0/0/17/17 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Sep 30 23:39:35 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.6:48332 [30/Sep/2025:23:39:35.494] listener listener/metadata 0/0/0/18/18 200 122 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Sep 30 23:39:35 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.6:48348 [30/Sep/2025:23:39:35.540] listener listener/metadata 0/0/0/16/16 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Sep 30 23:39:35 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.6:48354 [30/Sep/2025:23:39:35.593] listener listener/metadata 0/0/0/16/16 200 174 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Sep 30 23:39:35 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.6:48368 [30/Sep/2025:23:39:35.643] listener listener/metadata 0/0/0/15/15 200 123 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Sep 30 23:39:55 np0005463759.novalocal kernel: tap8341a2a0-cc: entered promiscuous mode Sep 30 23:39:55 np0005463759.novalocal NetworkManager[858]: [1759289995.5354] manager: (tap8341a2a0-cc): new Tun device (/org/freedesktop/NetworkManager/Devices/29) Sep 30 23:39:55 np0005463759.novalocal virtqemud[103209]: Domain id=10 name='instance-00000009' uuid=ba10d4b9-4985-4f3b-8691-2f7b609d1389 is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Sep 30 23:39:55 np0005463759.novalocal virtqemud[103209]: Domain id=10 name='instance-00000009' uuid=ba10d4b9-4985-4f3b-8691-2f7b609d1389 is tainted: deprecated-config (CPU model 'qemu64') Sep 30 23:39:55 np0005463759.novalocal systemd-machined[100508]: New machine qemu-10-instance-00000009. Sep 30 23:39:55 np0005463759.novalocal systemd-udevd[108957]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:39:55 np0005463759.novalocal systemd[1]: Started Virtual Machine qemu-10-instance-00000009. Sep 30 23:39:55 np0005463759.novalocal NetworkManager[858]: [1759289995.6777] device (tap8341a2a0-cc): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Sep 30 23:39:55 np0005463759.novalocal NetworkManager[858]: [1759289995.6819] device (tap8341a2a0-cc): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Sep 30 23:40:08 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:40:08 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:40:08 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:40:11 np0005463759.novalocal sudo[109006]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:40:11 np0005463759.novalocal systemd[1]: Started Session c268 of User root. Sep 30 23:40:11 np0005463759.novalocal sudo[109006]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:40:11 np0005463759.novalocal sudo[109006]: pam_unix(sudo:session): session closed for user root Sep 30 23:40:11 np0005463759.novalocal systemd[1]: session-c268.scope: Deactivated successfully. Sep 30 23:40:11 np0005463759.novalocal sudo[109011]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:40:11 np0005463759.novalocal systemd[1]: Started Session c269 of User root. Sep 30 23:40:11 np0005463759.novalocal sudo[109011]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:40:12 np0005463759.novalocal sudo[109011]: pam_unix(sudo:session): session closed for user root Sep 30 23:40:12 np0005463759.novalocal systemd[1]: session-c269.scope: Deactivated successfully. Sep 30 23:40:12 np0005463759.novalocal sudo[109015]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:40:12 np0005463759.novalocal systemd[1]: Started Session c270 of User root. Sep 30 23:40:12 np0005463759.novalocal sudo[109015]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:40:12 np0005463759.novalocal sudo[109015]: pam_unix(sudo:session): session closed for user root Sep 30 23:40:12 np0005463759.novalocal systemd[1]: session-c270.scope: Deactivated successfully. Sep 30 23:40:12 np0005463759.novalocal sudo[109019]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:40:12 np0005463759.novalocal systemd[1]: Started Session c271 of User root. Sep 30 23:40:12 np0005463759.novalocal sudo[109019]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:40:13 np0005463759.novalocal sudo[109019]: pam_unix(sudo:session): session closed for user root Sep 30 23:40:13 np0005463759.novalocal systemd[1]: session-c271.scope: Deactivated successfully. Sep 30 23:40:15 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.9:47574 [30/Sep/2025:23:40:15.430] listener listener/metadata 0/0/0/152/152 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Sep 30 23:40:15 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.9:47588 [30/Sep/2025:23:40:15.670] listener listener/metadata 0/0/0/15/15 200 159 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys HTTP/1.1" Sep 30 23:40:15 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.9:47590 [30/Sep/2025:23:40:15.723] listener listener/metadata 0/0/0/25/25 200 325 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-keys/0/openssh-key HTTP/1.1" Sep 30 23:40:15 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.9:47596 [30/Sep/2025:23:40:15.798] listener listener/metadata 0/0/0/15/15 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-id HTTP/1.1" Sep 30 23:40:15 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.9:47598 [30/Sep/2025:23:40:15.860] listener listener/metadata 0/0/0/14/14 200 120 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/ami-launch-index HTTP/1.1" Sep 30 23:40:15 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.9:47608 [30/Sep/2025:23:40:15.909] listener listener/metadata 0/0/0/14/14 200 126 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/instance-type HTTP/1.1" Sep 30 23:40:15 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.9:47622 [30/Sep/2025:23:40:15.957] listener listener/metadata 0/0/0/15/15 200 130 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-ipv4 HTTP/1.1" Sep 30 23:40:16 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.9:47634 [30/Sep/2025:23:40:16.008] listener listener/metadata 0/0/0/14/14 200 132 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-ipv4 HTTP/1.1" Sep 30 23:40:16 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.9:47648 [30/Sep/2025:23:40:16.058] listener listener/metadata 0/0/0/14/14 200 174 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/hostname HTTP/1.1" Sep 30 23:40:16 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.9:47660 [30/Sep/2025:23:40:16.106] listener listener/metadata 0/0/0/17/17 200 174 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/local-hostname HTTP/1.1" Sep 30 23:40:16 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.9:47662 [30/Sep/2025:23:40:16.187] listener listener/metadata 0/0/0/17/17 404 281 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/user-data HTTP/1.1" Sep 30 23:40:16 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.9:47676 [30/Sep/2025:23:40:16.269] listener listener/metadata 0/0/0/17/17 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping HTTP/1.1" Sep 30 23:40:16 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.9:47692 [30/Sep/2025:23:40:16.323] listener listener/metadata 0/0/0/18/18 200 122 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/ami HTTP/1.1" Sep 30 23:40:16 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.9:47698 [30/Sep/2025:23:40:16.378] listener listener/metadata 0/0/0/18/18 200 127 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/block-device-mapping/root HTTP/1.1" Sep 30 23:40:16 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.9:47700 [30/Sep/2025:23:40:16.465] listener listener/metadata 0/0/0/16/16 200 174 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/public-hostname HTTP/1.1" Sep 30 23:40:16 np0005463759.novalocal haproxy-metadata-proxy-880d4740-a3d2-4d40-be91-939b1e98e5ae[108803]: 10.100.0.9:47712 [30/Sep/2025:23:40:16.547] listener listener/metadata 0/0/0/16/16 200 123 - - ---- 1/1/0/0/0 0/0 "GET /2009-04-04/meta-data/placement/availability-zone HTTP/1.1" Sep 30 23:40:18 np0005463759.novalocal kernel: tap7323d078-c3: entered promiscuous mode Sep 30 23:40:18 np0005463759.novalocal NetworkManager[858]: [1759290018.5466] manager: (tap7323d078-c3): new Tun device (/org/freedesktop/NetworkManager/Devices/30) Sep 30 23:40:18 np0005463759.novalocal virtqemud[103209]: Domain id=11 name='instance-0000000a' uuid=68784823-3dab-41b5-9263-015dc7eba5cf is tainted: deprecated-config (machine type 'pc-i440fx-rhel7.6.0') Sep 30 23:40:18 np0005463759.novalocal virtqemud[103209]: Domain id=11 name='instance-0000000a' uuid=68784823-3dab-41b5-9263-015dc7eba5cf is tainted: deprecated-config (CPU model 'qemu64') Sep 30 23:40:18 np0005463759.novalocal systemd-udevd[109099]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:40:18 np0005463759.novalocal systemd-machined[100508]: New machine qemu-11-instance-0000000a. Sep 30 23:40:18 np0005463759.novalocal systemd[1]: Started Virtual Machine qemu-11-instance-0000000a. Sep 30 23:40:18 np0005463759.novalocal NetworkManager[858]: [1759290018.6418] device (tap7323d078-c3): state change: unmanaged -> unavailable (reason 'connection-assumed', managed-type: 'external') Sep 30 23:40:18 np0005463759.novalocal NetworkManager[858]: [1759290018.6430] device (tap7323d078-c3): state change: unavailable -> disconnected (reason 'none', managed-type: 'external') Sep 30 23:40:18 np0005463759.novalocal systemd-udevd[109103]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:40:18 np0005463759.novalocal NetworkManager[858]: [1759290018.7176] manager: (tap2e3342fb-20): new Veth device (/org/freedesktop/NetworkManager/Devices/31) Sep 30 23:40:18 np0005463759.novalocal NetworkManager[858]: [1759290018.7879] device (tap2e3342fb-20): carrier: link connected Sep 30 23:40:19 np0005463759.novalocal kernel: tap2e3342fb-20: entered promiscuous mode Sep 30 23:40:19 np0005463759.novalocal sudo[109144]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf ip netns exec ovnmeta-2e3342fb-2054-4f58-937e-3af4e4876ef6 env PROCESS_TAG=haproxy-2e3342fb-2054-4f58-937e-3af4e4876ef6 haproxy -f /var/lib/neutron/ovn-metadata-proxy/2e3342fb-2054-4f58-937e-3af4e4876ef6.conf Sep 30 23:40:19 np0005463759.novalocal systemd[1]: Started Session c272 of User root. Sep 30 23:40:19 np0005463759.novalocal sudo[109144]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Sep 30 23:40:19 np0005463759.novalocal sudo[109144]: pam_unix(sudo:session): session closed for user root Sep 30 23:40:23 np0005463759.novalocal kernel: tap8341a2a0-cc (unregistering): left promiscuous mode Sep 30 23:40:23 np0005463759.novalocal NetworkManager[858]: [1759290023.3591] device (tap8341a2a0-cc): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Sep 30 23:40:23 np0005463759.novalocal systemd[1]: machine-qemu\x2d10\x2dinstance\x2d00000009.scope: Deactivated successfully. Sep 30 23:40:23 np0005463759.novalocal systemd[1]: machine-qemu\x2d10\x2dinstance\x2d00000009.scope: Consumed 19.657s CPU time. Sep 30 23:40:23 np0005463759.novalocal systemd-machined[100508]: Machine qemu-10-instance-00000009 terminated. Sep 30 23:40:23 np0005463759.novalocal kernel: tap8341a2a0-cc: entered promiscuous mode Sep 30 23:40:23 np0005463759.novalocal NetworkManager[858]: [1759290023.5623] manager: (tap8341a2a0-cc): new Tun device (/org/freedesktop/NetworkManager/Devices/32) Sep 30 23:40:23 np0005463759.novalocal systemd-udevd[109172]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:40:23 np0005463759.novalocal kernel: tap8341a2a0-cc (unregistering): left promiscuous mode Sep 30 23:40:23 np0005463759.novalocal sshd-session[109168]: Invalid user ceph from 218.51.148.194 port 34094 Sep 30 23:40:24 np0005463759.novalocal sshd-session[109168]: Received disconnect from 218.51.148.194 port 34094:11: Bye Bye [preauth] Sep 30 23:40:24 np0005463759.novalocal sshd-session[109168]: Disconnected from invalid user ceph 218.51.148.194 port 34094 [preauth] Sep 30 23:40:30 np0005463759.novalocal sshd-session[109242]: Invalid user ld from 192.227.153.63 port 46244 Sep 30 23:40:30 np0005463759.novalocal sshd-session[109242]: Received disconnect from 192.227.153.63 port 46244:11: Bye Bye [preauth] Sep 30 23:40:30 np0005463759.novalocal sshd-session[109242]: Disconnected from invalid user ld 192.227.153.63 port 46244 [preauth] Sep 30 23:40:31 np0005463759.novalocal sshd-session[109234]: Invalid user celery from 154.92.109.196 port 7518 Sep 30 23:40:31 np0005463759.novalocal sshd-session[109234]: Received disconnect from 154.92.109.196 port 7518:11: Bye Bye [preauth] Sep 30 23:40:31 np0005463759.novalocal sshd-session[109234]: Disconnected from invalid user celery 154.92.109.196 port 7518 [preauth] Sep 30 23:40:34 np0005463759.novalocal kernel: tape326e153-3e (unregistering): left promiscuous mode Sep 30 23:40:34 np0005463759.novalocal NetworkManager[858]: [1759290034.2594] device (tape326e153-3e): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Sep 30 23:40:34 np0005463759.novalocal systemd[1]: machine-qemu\x2d9\x2dinstance\x2d00000008.scope: Deactivated successfully. Sep 30 23:40:34 np0005463759.novalocal systemd[1]: machine-qemu\x2d9\x2dinstance\x2d00000008.scope: Consumed 24.359s CPU time. Sep 30 23:40:34 np0005463759.novalocal systemd-machined[100508]: Machine qemu-9-instance-00000008 terminated. Sep 30 23:40:34 np0005463759.novalocal systemd[1]: session-c267.scope: Deactivated successfully. Sep 30 23:40:34 np0005463759.novalocal kernel: tap880d4740-a0: left promiscuous mode Sep 30 23:40:34 np0005463759.novalocal systemd[1]: run-netns-ovnmeta\x2d880d4740\x2da3d2\x2d4d40\x2dbe91\x2d939b1e98e5ae.mount: Deactivated successfully. Sep 30 23:40:46 np0005463759.novalocal haproxy-metadata-proxy-2e3342fb-2054-4f58-937e-3af4e4876ef6[109149]: 10.100.0.13:39084 [30/Sep/2025:23:40:46.508] listener listener/metadata 0/0/0/137/137 200 132 - - ---- 1/1/0/0/0 0/0 "GET /latest/meta-data/public-ipv4 HTTP/1.1" Sep 30 23:40:47 np0005463759.novalocal haproxy-metadata-proxy-2e3342fb-2054-4f58-937e-3af4e4876ef6[109149]: 10.100.0.13:39090 [30/Sep/2025:23:40:46.898] listener listener/metadata 0/0/0/257/257 200 118 - - ---- 1/1/0/0/0 0/0 "POST /openstack/2013-10-17/password HTTP/1.1" Sep 30 23:40:50 np0005463759.novalocal kernel: tap7323d078-c3 (unregistering): left promiscuous mode Sep 30 23:40:50 np0005463759.novalocal NetworkManager[858]: [1759290050.4543] device (tap7323d078-c3): state change: disconnected -> unmanaged (reason 'unmanaged', managed-type: 'removed') Sep 30 23:40:50 np0005463759.novalocal systemd[1]: machine-qemu\x2d11\x2dinstance\x2d0000000a.scope: Deactivated successfully. Sep 30 23:40:50 np0005463759.novalocal systemd[1]: machine-qemu\x2d11\x2dinstance\x2d0000000a.scope: Consumed 20.122s CPU time. Sep 30 23:40:50 np0005463759.novalocal systemd-machined[100508]: Machine qemu-11-instance-0000000a terminated. Sep 30 23:40:50 np0005463759.novalocal kernel: tap2e3342fb-20: left promiscuous mode Sep 30 23:40:50 np0005463759.novalocal systemd[1]: session-c272.scope: Deactivated successfully. Sep 30 23:40:50 np0005463759.novalocal systemd[1]: run-netns-ovnmeta\x2d2e3342fb\x2d2054\x2d4f58\x2d937e\x2d3af4e4876ef6.mount: Deactivated successfully. Sep 30 23:40:50 np0005463759.novalocal systemd-udevd[109322]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:40:50 np0005463759.novalocal NetworkManager[858]: [1759290050.6761] manager: (tap7323d078-c3): new Tun device (/org/freedesktop/NetworkManager/Devices/33) Sep 30 23:41:04 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:41:04 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:41:04 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:41:11 np0005463759.novalocal sudo[109353]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:41:11 np0005463759.novalocal systemd[1]: Started Session c273 of User root. Sep 30 23:41:11 np0005463759.novalocal sudo[109353]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:41:11 np0005463759.novalocal sudo[109353]: pam_unix(sudo:session): session closed for user root Sep 30 23:41:11 np0005463759.novalocal systemd[1]: session-c273.scope: Deactivated successfully. Sep 30 23:41:11 np0005463759.novalocal sudo[109357]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:41:11 np0005463759.novalocal systemd[1]: Started Session c274 of User root. Sep 30 23:41:11 np0005463759.novalocal sudo[109357]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:41:12 np0005463759.novalocal sudo[109357]: pam_unix(sudo:session): session closed for user root Sep 30 23:41:12 np0005463759.novalocal systemd[1]: session-c274.scope: Deactivated successfully. Sep 30 23:41:12 np0005463759.novalocal sudo[109361]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:41:12 np0005463759.novalocal systemd[1]: Started Session c275 of User root. Sep 30 23:41:12 np0005463759.novalocal sudo[109361]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:41:12 np0005463759.novalocal sudo[109361]: pam_unix(sudo:session): session closed for user root Sep 30 23:41:12 np0005463759.novalocal systemd[1]: session-c275.scope: Deactivated successfully. Sep 30 23:41:12 np0005463759.novalocal sudo[109365]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:41:12 np0005463759.novalocal systemd[1]: Started Session c276 of User root. Sep 30 23:41:12 np0005463759.novalocal sudo[109365]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:41:12 np0005463759.novalocal sudo[109365]: pam_unix(sudo:session): session closed for user root Sep 30 23:41:12 np0005463759.novalocal systemd[1]: session-c276.scope: Deactivated successfully. Sep 30 23:41:13 np0005463759.novalocal sudo[109369]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.default --privsep_sock_path /tmp/tmpkxjyhq4v/privsep.sock Sep 30 23:41:13 np0005463759.novalocal systemd[1]: Started Session c277 of User root. Sep 30 23:41:13 np0005463759.novalocal sudo[109369]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Sep 30 23:41:14 np0005463759.novalocal sudo[109369]: pam_unix(sudo:session): session closed for user root Sep 30 23:41:16 np0005463759.novalocal sudo[109382]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf privsep-helper --config-file /usr/share/neutron/neutron-dist.conf --config-file /etc/neutron/neutron.conf --config-file /etc/neutron/ovn_vpn_agent.ini --privsep_context neutron.privileged.link_cmd --privsep_sock_path /tmp/tmpmyj5bum0/privsep.sock Sep 30 23:41:16 np0005463759.novalocal systemd[1]: Started Session c278 of User root. Sep 30 23:41:16 np0005463759.novalocal sudo[109382]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Sep 30 23:41:17 np0005463759.novalocal sudo[109382]: pam_unix(sudo:session): session closed for user root Sep 30 23:41:18 np0005463759.novalocal sudo[109429]: neutron : PWD=/ ; USER=root ; COMMAND=/usr/bin/neutron-rootwrap-daemon /etc/neutron/rootwrap.conf Sep 30 23:41:18 np0005463759.novalocal systemd[1]: Started Session c279 of User root. Sep 30 23:41:18 np0005463759.novalocal sudo[109429]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=981) Sep 30 23:41:18 np0005463759.novalocal kernel: vg6819babe-fa6: entered promiscuous mode Sep 30 23:41:18 np0005463759.novalocal NetworkManager[858]: [1759290078.5289] manager: (vg6819babe-fa6): 'openvswitch' plugin not available; creating generic device Sep 30 23:41:18 np0005463759.novalocal NetworkManager[858]: [1759290078.5306] manager: (vg6819babe-fa6): new Generic device (/org/freedesktop/NetworkManager/Devices/34) Sep 30 23:41:19 np0005463759.novalocal systemd[1]: Starting SETroubleshoot daemon for processing new SELinux denial logs... Sep 30 23:41:19 np0005463759.novalocal kernel: vr5361c83a-45c: entered promiscuous mode Sep 30 23:41:19 np0005463759.novalocal systemd-udevd[109446]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:41:19 np0005463759.novalocal NetworkManager[858]: [1759290079.5994] manager: (vr5361c83a-45c): 'openvswitch' plugin not available; creating generic device Sep 30 23:41:19 np0005463759.novalocal NetworkManager[858]: [1759290079.6010] manager: (vr5361c83a-45c): new Generic device (/org/freedesktop/NetworkManager/Devices/35) Sep 30 23:41:19 np0005463759.novalocal virtnodedevd[103319]: libvirt version: 10.10.0, package: 15.el9 (builder@centos.org, 2025-08-18-13:22:20, ) Sep 30 23:41:19 np0005463759.novalocal virtnodedevd[103319]: hostname: np0005463759.novalocal Sep 30 23:41:19 np0005463759.novalocal virtnodedevd[103319]: ethtool ioctl error on vr5361c83a-45c: No such device Sep 30 23:41:19 np0005463759.novalocal virtnodedevd[103319]: ethtool ioctl error on vr5361c83a-45c: No such device Sep 30 23:41:19 np0005463759.novalocal virtnodedevd[103319]: ethtool ioctl error on vr5361c83a-45c: No such device Sep 30 23:41:19 np0005463759.novalocal virtnodedevd[103319]: ethtool ioctl error on vr5361c83a-45c: No such device Sep 30 23:41:19 np0005463759.novalocal virtnodedevd[103319]: ethtool ioctl error on vr5361c83a-45c: No such device Sep 30 23:41:19 np0005463759.novalocal virtnodedevd[103319]: ethtool ioctl error on vr5361c83a-45c: No such device Sep 30 23:41:19 np0005463759.novalocal virtnodedevd[103319]: ethtool ioctl error on vr5361c83a-45c: No such device Sep 30 23:41:19 np0005463759.novalocal virtnodedevd[103319]: ethtool ioctl error on vr5361c83a-45c: No such device Sep 30 23:41:20 np0005463759.novalocal systemd[1]: Started SETroubleshoot daemon for processing new SELinux denial logs. Sep 30 23:41:20 np0005463759.novalocal systemd[1]: Started dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@12.service. Sep 30 23:41:22 np0005463759.novalocal kernel: IPv4 over IPsec tunneling driver Sep 30 23:41:22 np0005463759.novalocal NetworkManager[858]: [1759290082.1066] manager: (ip_vti0): new IPTunnel device (/org/freedesktop/NetworkManager/Devices/36) Sep 30 23:41:22 np0005463759.novalocal systemd-udevd[109590]: Network interface NamePolicy= disabled on kernel command line. Sep 30 23:41:22 np0005463759.novalocal kernel: IPsec XFRM device driver Sep 30 23:41:22 np0005463759.novalocal setroubleshoot[109467]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. For complete SELinux messages run: sealert -l b10768ba-0217-4c23-aa5e-74b408c6b083 Sep 30 23:41:22 np0005463759.novalocal setroubleshoot[109467]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the status.sock sock_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:41:24 np0005463759.novalocal setroubleshoot[109467]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. For complete SELinux messages run: sealert -l b10768ba-0217-4c23-aa5e-74b408c6b083 Sep 30 23:41:24 np0005463759.novalocal setroubleshoot[109467]: SELinux is preventing /usr/sbin/httpd from getattr access on the sock_file /run/octavia/status.sock. ***** Plugin catchall (100. confidence) suggests ************************** If you believe that httpd should be allowed getattr access on the status.sock sock_file by default. Then you should report this as a bug. You can generate a local policy module to allow this access. Do allow this access for now by executing: # ausearch -c 'httpd' --raw | audit2allow -M my-httpd # semodule -X 300 -i my-httpd.pp Sep 30 23:41:30 np0005463759.novalocal sshd-session[109826]: Received disconnect from 192.227.153.63 port 45964:11: Bye Bye [preauth] Sep 30 23:41:30 np0005463759.novalocal sshd-session[109826]: Disconnected from authenticating user root 192.227.153.63 port 45964 [preauth] Sep 30 23:41:34 np0005463759.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@12.service: Deactivated successfully. Sep 30 23:41:34 np0005463759.novalocal systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@12.service: Consumed 1.190s CPU time. Sep 30 23:41:34 np0005463759.novalocal systemd[1]: setroubleshootd.service: Deactivated successfully. Sep 30 23:41:34 np0005463759.novalocal systemd[1]: setroubleshootd.service: Consumed 1.327s CPU time. Sep 30 23:41:41 np0005463759.novalocal sshd-session[109881]: Received disconnect from 218.51.148.194 port 58084:11: Bye Bye [preauth] Sep 30 23:41:41 np0005463759.novalocal sshd-session[109881]: Disconnected from authenticating user root 218.51.148.194 port 58084 [preauth] Sep 30 23:41:43 np0005463759.novalocal kernel: vr5361c83a-45c: left promiscuous mode Sep 30 23:41:43 np0005463759.novalocal kernel: vg6819babe-fa6: left promiscuous mode Sep 30 23:41:43 np0005463759.novalocal systemd[1]: run-netns-qvpn\x2d16e156e3\x2d7668\x2d44ae\x2d8bf0\x2daf825cd2065a.mount: Deactivated successfully. Sep 30 23:41:49 np0005463759.novalocal sshd-session[109915]: Received disconnect from 154.92.109.196 port 26636:11: Bye Bye [preauth] Sep 30 23:41:49 np0005463759.novalocal sshd-session[109915]: Disconnected from authenticating user root 154.92.109.196 port 26636 [preauth] Sep 30 23:42:04 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:42:04 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:42:04 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:42:11 np0005463759.novalocal sudo[109938]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:42:11 np0005463759.novalocal systemd[1]: Started Session c280 of User root. Sep 30 23:42:11 np0005463759.novalocal sudo[109938]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:42:11 np0005463759.novalocal sudo[109938]: pam_unix(sudo:session): session closed for user root Sep 30 23:42:11 np0005463759.novalocal systemd[1]: session-c280.scope: Deactivated successfully. Sep 30 23:42:11 np0005463759.novalocal sudo[109942]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:42:11 np0005463759.novalocal systemd[1]: Started Session c281 of User root. Sep 30 23:42:11 np0005463759.novalocal sudo[109942]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:42:12 np0005463759.novalocal sudo[109942]: pam_unix(sudo:session): session closed for user root Sep 30 23:42:12 np0005463759.novalocal systemd[1]: session-c281.scope: Deactivated successfully. Sep 30 23:42:12 np0005463759.novalocal sudo[109946]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:42:12 np0005463759.novalocal systemd[1]: Started Session c282 of User root. Sep 30 23:42:12 np0005463759.novalocal sudo[109946]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:42:12 np0005463759.novalocal sudo[109946]: pam_unix(sudo:session): session closed for user root Sep 30 23:42:12 np0005463759.novalocal systemd[1]: session-c282.scope: Deactivated successfully. Sep 30 23:42:12 np0005463759.novalocal sudo[109950]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:42:12 np0005463759.novalocal systemd[1]: Started Session c283 of User root. Sep 30 23:42:12 np0005463759.novalocal sudo[109950]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:42:12 np0005463759.novalocal sudo[109950]: pam_unix(sudo:session): session closed for user root Sep 30 23:42:12 np0005463759.novalocal systemd[1]: session-c283.scope: Deactivated successfully. Sep 30 23:42:31 np0005463759.novalocal sshd-session[110008]: Received disconnect from 192.227.153.63 port 45886:11: Bye Bye [preauth] Sep 30 23:42:31 np0005463759.novalocal sshd-session[110008]: Disconnected from authenticating user root 192.227.153.63 port 45886 [preauth] Sep 30 23:42:59 np0005463759.novalocal sshd-session[110032]: Received disconnect from 218.51.148.194 port 53876:11: Bye Bye [preauth] Sep 30 23:42:59 np0005463759.novalocal sshd-session[110032]: Disconnected from authenticating user root 218.51.148.194 port 53876 [preauth] Sep 30 23:43:00 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:43:00 np0005463759.novalocal sshd-session[110034]: Invalid user rishu from 154.92.109.196 port 65277 Sep 30 23:43:00 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:43:00 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:43:01 np0005463759.novalocal sshd-session[110034]: Received disconnect from 154.92.109.196 port 65277:11: Bye Bye [preauth] Sep 30 23:43:01 np0005463759.novalocal sshd-session[110034]: Disconnected from invalid user rishu 154.92.109.196 port 65277 [preauth] Sep 30 23:43:11 np0005463759.novalocal sudo[110047]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:43:11 np0005463759.novalocal systemd[1]: Started Session c284 of User root. Sep 30 23:43:11 np0005463759.novalocal sudo[110047]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:43:11 np0005463759.novalocal sudo[110047]: pam_unix(sudo:session): session closed for user root Sep 30 23:43:11 np0005463759.novalocal systemd[1]: session-c284.scope: Deactivated successfully. Sep 30 23:43:11 np0005463759.novalocal sudo[110051]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:43:11 np0005463759.novalocal systemd[1]: Started Session c285 of User root. Sep 30 23:43:11 np0005463759.novalocal sudo[110051]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:43:12 np0005463759.novalocal sudo[110051]: pam_unix(sudo:session): session closed for user root Sep 30 23:43:12 np0005463759.novalocal systemd[1]: session-c285.scope: Deactivated successfully. Sep 30 23:43:12 np0005463759.novalocal sudo[110056]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:43:12 np0005463759.novalocal systemd[1]: Started Session c286 of User root. Sep 30 23:43:12 np0005463759.novalocal sudo[110056]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:43:12 np0005463759.novalocal sudo[110056]: pam_unix(sudo:session): session closed for user root Sep 30 23:43:12 np0005463759.novalocal systemd[1]: session-c286.scope: Deactivated successfully. Sep 30 23:43:12 np0005463759.novalocal sudo[110062]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:43:12 np0005463759.novalocal systemd[1]: Started Session c287 of User root. Sep 30 23:43:12 np0005463759.novalocal sudo[110062]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:43:13 np0005463759.novalocal sudo[110062]: pam_unix(sudo:session): session closed for user root Sep 30 23:43:13 np0005463759.novalocal systemd[1]: session-c287.scope: Deactivated successfully. Sep 30 23:43:30 np0005463759.novalocal sshd-session[110115]: Invalid user boom from 192.227.153.63 port 45846 Sep 30 23:43:30 np0005463759.novalocal sshd-session[110115]: Received disconnect from 192.227.153.63 port 45846:11: Bye Bye [preauth] Sep 30 23:43:30 np0005463759.novalocal sshd-session[110115]: Disconnected from invalid user boom 192.227.153.63 port 45846 [preauth] Sep 30 23:44:02 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:44:02 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:44:02 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:44:10 np0005463759.novalocal sshd-session[110149]: Invalid user uno85 from 154.92.109.196 port 32383 Sep 30 23:44:10 np0005463759.novalocal sshd-session[110149]: Received disconnect from 154.92.109.196 port 32383:11: Bye Bye [preauth] Sep 30 23:44:10 np0005463759.novalocal sshd-session[110149]: Disconnected from invalid user uno85 154.92.109.196 port 32383 [preauth] Sep 30 23:44:11 np0005463759.novalocal sudo[110152]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:44:11 np0005463759.novalocal systemd[1]: Started Session c288 of User root. Sep 30 23:44:11 np0005463759.novalocal sudo[110152]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:44:11 np0005463759.novalocal sudo[110152]: pam_unix(sudo:session): session closed for user root Sep 30 23:44:11 np0005463759.novalocal systemd[1]: session-c288.scope: Deactivated successfully. Sep 30 23:44:11 np0005463759.novalocal sudo[110158]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:44:11 np0005463759.novalocal systemd[1]: Started Session c289 of User root. Sep 30 23:44:11 np0005463759.novalocal sudo[110158]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:44:12 np0005463759.novalocal sudo[110158]: pam_unix(sudo:session): session closed for user root Sep 30 23:44:12 np0005463759.novalocal systemd[1]: session-c289.scope: Deactivated successfully. Sep 30 23:44:12 np0005463759.novalocal sudo[110162]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:44:12 np0005463759.novalocal systemd[1]: Started Session c290 of User root. Sep 30 23:44:12 np0005463759.novalocal sudo[110162]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:44:12 np0005463759.novalocal sudo[110162]: pam_unix(sudo:session): session closed for user root Sep 30 23:44:12 np0005463759.novalocal systemd[1]: session-c290.scope: Deactivated successfully. Sep 30 23:44:12 np0005463759.novalocal sudo[110166]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:44:12 np0005463759.novalocal systemd[1]: Started Session c291 of User root. Sep 30 23:44:12 np0005463759.novalocal sudo[110166]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:44:12 np0005463759.novalocal sudo[110166]: pam_unix(sudo:session): session closed for user root Sep 30 23:44:12 np0005463759.novalocal systemd[1]: session-c291.scope: Deactivated successfully. Sep 30 23:44:17 np0005463759.novalocal sshd-session[110173]: Invalid user uno85 from 218.51.148.194 port 49662 Sep 30 23:44:17 np0005463759.novalocal sshd-session[110173]: Received disconnect from 218.51.148.194 port 49662:11: Bye Bye [preauth] Sep 30 23:44:17 np0005463759.novalocal sshd-session[110173]: Disconnected from invalid user uno85 218.51.148.194 port 49662 [preauth] Sep 30 23:45:00 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:45:00 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:45:00 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:45:11 np0005463759.novalocal sudo[110256]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:45:11 np0005463759.novalocal systemd[1]: Started Session c292 of User root. Sep 30 23:45:11 np0005463759.novalocal sudo[110256]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:45:11 np0005463759.novalocal sudo[110256]: pam_unix(sudo:session): session closed for user root Sep 30 23:45:11 np0005463759.novalocal systemd[1]: session-c292.scope: Deactivated successfully. Sep 30 23:45:11 np0005463759.novalocal sudo[110260]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:45:11 np0005463759.novalocal systemd[1]: Started Session c293 of User root. Sep 30 23:45:11 np0005463759.novalocal sudo[110260]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:45:12 np0005463759.novalocal sudo[110260]: pam_unix(sudo:session): session closed for user root Sep 30 23:45:12 np0005463759.novalocal systemd[1]: session-c293.scope: Deactivated successfully. Sep 30 23:45:12 np0005463759.novalocal sudo[110264]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:45:12 np0005463759.novalocal systemd[1]: Started Session c294 of User root. Sep 30 23:45:12 np0005463759.novalocal sudo[110264]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:45:12 np0005463759.novalocal sudo[110264]: pam_unix(sudo:session): session closed for user root Sep 30 23:45:12 np0005463759.novalocal systemd[1]: session-c294.scope: Deactivated successfully. Sep 30 23:45:12 np0005463759.novalocal sudo[110270]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:45:12 np0005463759.novalocal systemd[1]: Started Session c295 of User root. Sep 30 23:45:12 np0005463759.novalocal sudo[110270]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:45:12 np0005463759.novalocal sudo[110270]: pam_unix(sudo:session): session closed for user root Sep 30 23:45:12 np0005463759.novalocal systemd[1]: session-c295.scope: Deactivated successfully. Sep 30 23:45:15 np0005463759.novalocal sshd-session[110274]: Invalid user uzivatel from 154.92.109.196 port 50118 Sep 30 23:45:15 np0005463759.novalocal sshd-session[110274]: Received disconnect from 154.92.109.196 port 50118:11: Bye Bye [preauth] Sep 30 23:45:15 np0005463759.novalocal sshd-session[110274]: Disconnected from invalid user uzivatel 154.92.109.196 port 50118 [preauth] Sep 30 23:45:33 np0005463759.novalocal sshd-session[110329]: Invalid user rishu from 218.51.148.194 port 45432 Sep 30 23:45:34 np0005463759.novalocal sshd-session[110329]: Received disconnect from 218.51.148.194 port 45432:11: Bye Bye [preauth] Sep 30 23:45:34 np0005463759.novalocal sshd-session[110329]: Disconnected from invalid user rishu 218.51.148.194 port 45432 [preauth] Sep 30 23:46:03 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:46:03 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:46:03 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:46:04 np0005463759.novalocal lvm[110357]: PV /dev/loop3 online, VG lvm-shares is complete. Sep 30 23:46:04 np0005463759.novalocal lvm[110357]: VG lvm-shares finished Sep 30 23:46:05 np0005463759.novalocal kernel: EXT4-fs (dm-6): mounted filesystem e70a6df9-3fe6-4dd4-9ed8-309d440a245f r/w with ordered data mode. Quota mode: none. Sep 30 23:46:07 np0005463759.novalocal systemd[1]: var-lib-manila-mnt-share\x2dc39ebf72\x2d71a3\x2d406f\x2da248\x2db9900e3774a9.mount: Deactivated successfully. Sep 30 23:46:07 np0005463759.novalocal kernel: EXT4-fs (dm-6): unmounting filesystem e70a6df9-3fe6-4dd4-9ed8-309d440a245f. Sep 30 23:46:07 np0005463759.novalocal lvm[110375]: PV /dev/loop3 online, VG lvm-shares is complete. Sep 30 23:46:07 np0005463759.novalocal lvm[110375]: VG lvm-shares finished Sep 30 23:46:11 np0005463759.novalocal sudo[110377]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:46:11 np0005463759.novalocal systemd[1]: Started Session c296 of User root. Sep 30 23:46:11 np0005463759.novalocal sudo[110377]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:46:11 np0005463759.novalocal sudo[110377]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:11 np0005463759.novalocal systemd[1]: session-c296.scope: Deactivated successfully. Sep 30 23:46:11 np0005463759.novalocal sudo[110381]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:46:11 np0005463759.novalocal systemd[1]: Started Session c297 of User root. Sep 30 23:46:11 np0005463759.novalocal sudo[110381]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:46:12 np0005463759.novalocal sudo[110381]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:12 np0005463759.novalocal systemd[1]: session-c297.scope: Deactivated successfully. Sep 30 23:46:12 np0005463759.novalocal sudo[110385]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:46:12 np0005463759.novalocal systemd[1]: Started Session c298 of User root. Sep 30 23:46:12 np0005463759.novalocal sudo[110385]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:46:12 np0005463759.novalocal sudo[110385]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:12 np0005463759.novalocal systemd[1]: session-c298.scope: Deactivated successfully. Sep 30 23:46:12 np0005463759.novalocal sudo[110389]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:46:12 np0005463759.novalocal systemd[1]: Started Session c299 of User root. Sep 30 23:46:12 np0005463759.novalocal sudo[110389]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:46:12 np0005463759.novalocal sudo[110389]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:12 np0005463759.novalocal systemd[1]: session-c299.scope: Deactivated successfully. Sep 30 23:46:15 np0005463759.novalocal sudo[64659]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:16 np0005463759.novalocal sudo[111098]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-jtiwsxoxkqwcuhrwoyrhspgcpavkuskb ; WORKSPACE=/var/log/weirdo-project /usr/bin/python3' Sep 30 23:46:16 np0005463759.novalocal sudo[111098]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:46:16 np0005463759.novalocal python3[111100]: ansible-command Invoked with chdir=/tmp/puppet-openstack creates=/var/log/weirdo-project/logs _raw_params=./copy_logs.sh warn=True _uses_shell=False stdin_add_newline=True strip_empty_ends=True argv=None executable=None removes=None stdin=None Sep 30 23:46:17 np0005463759.novalocal sudo[111223]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ceph /var/log/weirdo-project/logs/etc/ Sep 30 23:46:17 np0005463759.novalocal sudo[111223]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:17 np0005463759.novalocal sudo[111223]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:17 np0005463759.novalocal sudo[111226]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/cinder /var/log/weirdo-project/logs/etc/ Sep 30 23:46:17 np0005463759.novalocal sudo[111226]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:17 np0005463759.novalocal sudo[111226]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:17 np0005463759.novalocal sudo[111229]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/cinder /var/log/weirdo-project/logs Sep 30 23:46:17 np0005463759.novalocal sudo[111229]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:17 np0005463759.novalocal sudo[111229]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:17 np0005463759.novalocal sudo[111232]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/glance /var/log/weirdo-project/logs/etc/ Sep 30 23:46:17 np0005463759.novalocal sudo[111232]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:17 np0005463759.novalocal sudo[111232]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:17 np0005463759.novalocal sudo[111235]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/glance /var/log/weirdo-project/logs Sep 30 23:46:17 np0005463759.novalocal sudo[111235]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:17 np0005463759.novalocal sudo[111235]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:17 np0005463759.novalocal sudo[111238]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/horizon /var/log/weirdo-project/logs Sep 30 23:46:17 np0005463759.novalocal sudo[111238]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:17 np0005463759.novalocal sudo[111238]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:17 np0005463759.novalocal sudo[111241]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/keystone /var/log/weirdo-project/logs/etc/ Sep 30 23:46:17 np0005463759.novalocal sudo[111241]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:17 np0005463759.novalocal sudo[111241]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:17 np0005463759.novalocal sudo[111244]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/keystone /var/log/weirdo-project/logs Sep 30 23:46:17 np0005463759.novalocal sudo[111244]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:17 np0005463759.novalocal sudo[111244]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:17 np0005463759.novalocal sudo[111247]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/manila /var/log/weirdo-project/logs/etc/ Sep 30 23:46:17 np0005463759.novalocal sudo[111247]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:17 np0005463759.novalocal sudo[111247]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:17 np0005463759.novalocal sudo[111250]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/manila /var/log/weirdo-project/logs Sep 30 23:46:17 np0005463759.novalocal sudo[111250]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:17 np0005463759.novalocal sudo[111250]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:17 np0005463759.novalocal sudo[111253]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/neutron /var/log/weirdo-project/logs/etc/ Sep 30 23:46:17 np0005463759.novalocal sudo[111253]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:17 np0005463759.novalocal sudo[111253]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:17 np0005463759.novalocal sudo[111256]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/neutron /var/log/weirdo-project/logs Sep 30 23:46:17 np0005463759.novalocal sudo[111256]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:17 np0005463759.novalocal sudo[111256]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:17 np0005463759.novalocal sudo[111259]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/nova /var/log/weirdo-project/logs/etc/ Sep 30 23:46:17 np0005463759.novalocal sudo[111259]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:17 np0005463759.novalocal sudo[111259]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:17 np0005463759.novalocal sudo[111262]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/nova /var/log/weirdo-project/logs Sep 30 23:46:17 np0005463759.novalocal sudo[111262]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:17 np0005463759.novalocal sudo[111262]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:17 np0005463759.novalocal sudo[111265]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/octavia /var/log/weirdo-project/logs/etc/ Sep 30 23:46:18 np0005463759.novalocal sudo[111265]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:18 np0005463759.novalocal sudo[111265]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:18 np0005463759.novalocal sudo[111268]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/octavia /var/log/weirdo-project/logs Sep 30 23:46:18 np0005463759.novalocal sudo[111268]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:18 np0005463759.novalocal sudo[111268]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:18 np0005463759.novalocal sudo[111271]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/ovn /var/log/weirdo-project/logs/etc/ Sep 30 23:46:18 np0005463759.novalocal sudo[111271]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:18 np0005463759.novalocal sudo[111271]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:18 np0005463759.novalocal sudo[111274]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/ovn /var/log/weirdo-project/logs Sep 30 23:46:18 np0005463759.novalocal sudo[111274]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:18 np0005463759.novalocal sudo[111274]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:18 np0005463759.novalocal sudo[111277]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/placement /var/log/weirdo-project/logs/etc/ Sep 30 23:46:18 np0005463759.novalocal sudo[111277]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:18 np0005463759.novalocal sudo[111277]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:18 np0005463759.novalocal sudo[111280]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/placement /var/log/weirdo-project/logs Sep 30 23:46:18 np0005463759.novalocal sudo[111280]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:18 np0005463759.novalocal sudo[111280]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:18 np0005463759.novalocal sudo[111283]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/tempest /var/log/weirdo-project/logs/etc/ Sep 30 23:46:18 np0005463759.novalocal sudo[111283]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:18 np0005463759.novalocal sudo[111283]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:18 np0005463759.novalocal sudo[111286]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/puppet/puppet.conf /var/log/weirdo-project/logs/ Sep 30 23:46:18 np0005463759.novalocal sudo[111286]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:18 np0005463759.novalocal sudo[111286]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:18 np0005463759.novalocal sudo[111290]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/journalctl --no-pager Sep 30 23:46:18 np0005463759.novalocal sudo[111290]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:18 np0005463759.novalocal sudo[111290]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:18 np0005463759.novalocal sudo[111293]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rsyslog.d /var/log/weirdo-project/logs/etc/ Sep 30 23:46:18 np0005463759.novalocal sudo[111293]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:18 np0005463759.novalocal sudo[111293]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:18 np0005463759.novalocal sudo[111296]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/rsyslog.conf /var/log/weirdo-project/logs/etc/ Sep 30 23:46:18 np0005463759.novalocal sudo[111296]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:18 np0005463759.novalocal sudo[111296]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:18 np0005463759.novalocal sudo[111303]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/network-scripts /var/log/weirdo-project/logs/etc/sysconfig/ Sep 30 23:46:18 np0005463759.novalocal sudo[111303]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:18 np0005463759.novalocal sudo[111303]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:18 np0005463759.novalocal sudo[111310]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/rabbitmq /var/log/weirdo-project/logs/etc/ Sep 30 23:46:18 np0005463759.novalocal sudo[111310]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:18 np0005463759.novalocal sudo[111310]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:18 np0005463759.novalocal sudo[111341]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/rabbitmq /var/log/weirdo-project/logs Sep 30 23:46:18 np0005463759.novalocal sudo[111341]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:18 np0005463759.novalocal sudo[111341]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:18 np0005463759.novalocal sudo[111344]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/my.cnf /var/log/weirdo-project/logs/etc/ Sep 30 23:46:18 np0005463759.novalocal sudo[111344]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:18 np0005463759.novalocal sudo[111344]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:18 np0005463759.novalocal sudo[111347]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/my.cnf.d /var/log/weirdo-project/logs/etc/ Sep 30 23:46:18 np0005463759.novalocal sudo[111347]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:18 np0005463759.novalocal sudo[111347]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:18 np0005463759.novalocal sudo[111350]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/mariadb /var/log/weirdo-project/logs/ Sep 30 23:46:18 np0005463759.novalocal sudo[111350]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:18 np0005463759.novalocal sudo[111350]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:18 np0005463759.novalocal sudo[111353]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/iscsi /var/log/weirdo-project/logs/etc/ Sep 30 23:46:18 np0005463759.novalocal sudo[111353]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:18 np0005463759.novalocal sudo[111353]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:18 np0005463759.novalocal sudo[111356]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/tempest.log /var/log/weirdo-project/logs/ Sep 30 23:46:18 np0005463759.novalocal sudo[111356]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:18 np0005463759.novalocal sudo[111356]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:18 np0005463759.novalocal sudo[111359]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/testrepository.subunit /var/log/weirdo-project/logs/testrepository.subunit Sep 30 23:46:18 np0005463759.novalocal sudo[111359]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:18 np0005463759.novalocal sudo[111359]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:18 np0005463759.novalocal sudo[111362]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/testr_results.html /var/log/weirdo-project/logs/testr_results.html Sep 30 23:46:18 np0005463759.novalocal sudo[111362]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:18 np0005463759.novalocal sudo[111362]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:18 np0005463759.novalocal sudo[111365]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dstat.log /var/log/weirdo-project/logs/ Sep 30 23:46:18 np0005463759.novalocal sudo[111365]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:18 np0005463759.novalocal sudo[111365]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:18 np0005463759.novalocal sudo[111368]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iostat.log /var/log/weirdo-project/logs/ Sep 30 23:46:19 np0005463759.novalocal sudo[111368]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:19 np0005463759.novalocal sudo[111368]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:19 np0005463759.novalocal sudo[111371]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/iotop.log /var/log/weirdo-project/logs/ Sep 30 23:46:19 np0005463759.novalocal sudo[111371]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:19 np0005463759.novalocal sudo[111371]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:19 np0005463759.novalocal sudo[111374]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/libvirt /var/log/weirdo-project/logs/ Sep 30 23:46:19 np0005463759.novalocal sudo[111374]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:19 np0005463759.novalocal sudo[111374]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:19 np0005463759.novalocal sudo[111377]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/virsh net-list --all Sep 30 23:46:19 np0005463759.novalocal sudo[111377]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:19 np0005463759.novalocal virtqemud[103209]: Failed to connect socket to '/var/run/libvirt/virtnetworkd-sock': No such file or directory Sep 30 23:46:19 np0005463759.novalocal sudo[111377]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:19 np0005463759.novalocal sudo[111381]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/libvirt /var/log/weirdo-project/logs/etc/ Sep 30 23:46:19 np0005463759.novalocal sudo[111381]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:19 np0005463759.novalocal sudo[111381]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:19 np0005463759.novalocal sudo[111384]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sysconfig/libvirt-guests /var/log/weirdo-project/logs/etc/sysconfig Sep 30 23:46:19 np0005463759.novalocal sudo[111384]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:19 np0005463759.novalocal sudo[111384]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:19 np0005463759.novalocal sudo[111387]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openvswitch /var/log/weirdo-project/logs/etc/ Sep 30 23:46:19 np0005463759.novalocal sudo[111387]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:19 np0005463759.novalocal sudo[111387]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:19 np0005463759.novalocal sudo[111390]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/openvswitch /var/log/weirdo-project/logs/ Sep 30 23:46:19 np0005463759.novalocal sudo[111390]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:19 np0005463759.novalocal sudo[111390]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:19 np0005463759.novalocal sudo[111394]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Sep 30 23:46:19 np0005463759.novalocal sudo[111394]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:19 np0005463759.novalocal sudo[111394]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:19 np0005463759.novalocal sudo[111397]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-connection Sep 30 23:46:19 np0005463759.novalocal sudo[111397]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:19 np0005463759.novalocal sudo[111397]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:19 np0005463759.novalocal sudo[111400]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl get-ssl Sep 30 23:46:19 np0005463759.novalocal sudo[111400]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:19 np0005463759.novalocal sudo[111400]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:19 np0005463759.novalocal sudo[111403]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Sep 30 23:46:19 np0005463759.novalocal sudo[111403]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:19 np0005463759.novalocal sudo[111403]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:19 np0005463759.novalocal sudo[111406]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-connection Sep 30 23:46:19 np0005463759.novalocal sudo[111406]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:19 np0005463759.novalocal sudo[111406]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:19 np0005463759.novalocal sudo[111409]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl get-ssl Sep 30 23:46:19 np0005463759.novalocal sudo[111409]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:19 np0005463759.novalocal sudo[111409]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:19 np0005463759.novalocal sudo[111412]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ Sep 30 23:46:19 np0005463759.novalocal sudo[111412]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:19 np0005463759.novalocal sudo[111412]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:19 np0005463759.novalocal sudo[111415]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ Sep 30 23:46:19 np0005463759.novalocal sudo[111415]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:19 np0005463759.novalocal sudo[111415]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:19 np0005463759.novalocal sudo[111418]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/sudoers.d /var/log/weirdo-project/logs/ Sep 30 23:46:19 np0005463759.novalocal sudo[111418]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:19 np0005463759.novalocal sudo[111418]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:19 np0005463759.novalocal sudo[111421]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/sudoers /var/log/weirdo-project/logs/sudoers.txt Sep 30 23:46:19 np0005463759.novalocal sudo[111421]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:19 np0005463759.novalocal sudo[111421]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:19 np0005463759.novalocal sudo[111425]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf/httpd.conf /etc/httpd/conf/magic /etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ Sep 30 23:46:19 np0005463759.novalocal sudo[111425]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:19 np0005463759.novalocal sudo[111425]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:19 np0005463759.novalocal sudo[111429]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.d/10-cinder_wsgi.conf /etc/httpd/conf.d/10-glance_wsgi.conf /etc/httpd/conf.d/10-keystone_wsgi.conf /etc/httpd/conf.d/10-manila_wsgi.conf /etc/httpd/conf.d/10-nova_api_wsgi.conf /etc/httpd/conf.d/10-nova_metadata_wsgi.conf /etc/httpd/conf.d/10-octavia_wsgi.conf /etc/httpd/conf.d/10-placement_wsgi.conf /etc/httpd/conf.d/15-horizon_ssl_vhost.conf /etc/httpd/conf.d/15-horizon_vhost.conf /etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/ Sep 30 23:46:19 np0005463759.novalocal sudo[111429]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:19 np0005463759.novalocal sudo[111429]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:20 np0005463759.novalocal sudo[111433]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/httpd/conf.modules.d/alias.conf /etc/httpd/conf.modules.d/alias.load /etc/httpd/conf.modules.d/authz_core.load /etc/httpd/conf.modules.d/authz_host.load /etc/httpd/conf.modules.d/filter.load /etc/httpd/conf.modules.d/log_config.load /etc/httpd/conf.modules.d/mime.conf /etc/httpd/conf.modules.d/mime.load /etc/httpd/conf.modules.d/prefork.conf /etc/httpd/conf.modules.d/prefork.load /etc/httpd/conf.modules.d/setenvif.conf /etc/httpd/conf.modules.d/setenvif.load /etc/httpd/conf.modules.d/socache_shmcb.load /etc/httpd/conf.modules.d/ssl.conf /etc/httpd/conf.modules.d/ssl.load /etc/httpd/conf.modules.d/systemd.load /etc/httpd/conf.modules.d/unixd.load /etc/httpd/conf.modules.d/wsgi.conf /etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ Sep 30 23:46:20 np0005463759.novalocal sudo[111433]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:20 np0005463759.novalocal sudo[111433]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:20 np0005463759.novalocal sudo[111436]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/httpd /var/log/weirdo-project/logs/apache Sep 30 23:46:20 np0005463759.novalocal sudo[111436]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:20 np0005463759.novalocal sudo[111436]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:20 np0005463759.novalocal sudo[111439]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/log/redis /var/log/weirdo-project/logs/ Sep 30 23:46:20 np0005463759.novalocal sudo[111439]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:20 np0005463759.novalocal sudo[111439]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:20 np0005463759.novalocal sudo[111444]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/redis /var/log/weirdo-project/logs/etc/ Sep 30 23:46:20 np0005463759.novalocal sudo[111444]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:20 np0005463759.novalocal sudo[111444]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:20 np0005463759.novalocal sudo[111447]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/audit/audit.log /var/log/weirdo-project/logs/audit.log.txt Sep 30 23:46:20 np0005463759.novalocal sudo[111447]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:20 np0005463759.novalocal sudo[111447]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:20 np0005463759.novalocal sudo[111450]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /var/spool/cron /var/log/weirdo-project/logs/ Sep 30 23:46:20 np0005463759.novalocal sudo[111450]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:20 np0005463759.novalocal sudo[111450]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:20 np0005463759.novalocal sudo[111453]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /tmp/openstack/tempest/etc/tempest.conf /var/log/weirdo-project/logs/tempest.conf.txt Sep 30 23:46:20 np0005463759.novalocal sudo[111453]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:20 np0005463759.novalocal sudo[111453]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:20 np0005463759.novalocal sudo[111456]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack-dashboard /var/log/weirdo-project/logs/etc/openstack-dashboard Sep 30 23:46:20 np0005463759.novalocal sudo[111456]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:20 np0005463759.novalocal sudo[111456]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:20 np0005463759.novalocal sudo[111460]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt Sep 30 23:46:20 np0005463759.novalocal sudo[111460]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:20 np0005463759.novalocal sudo[111460]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:20 np0005463759.novalocal sudo[111463]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt Sep 30 23:46:20 np0005463759.novalocal sudo[111463]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:20 np0005463759.novalocal sudo[111463]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:20 np0005463759.novalocal sudo[111466]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled /var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt Sep 30 23:46:20 np0005463759.novalocal sudo[111466]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:20 np0005463759.novalocal sudo[111466]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:20 np0005463759.novalocal sudo[111469]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt Sep 30 23:46:20 np0005463759.novalocal sudo[111469]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:20 np0005463759.novalocal sudo[111469]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:20 np0005463759.novalocal sudo[111472]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt Sep 30 23:46:20 np0005463759.novalocal sudo[111472]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:20 np0005463759.novalocal sudo[111472]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:20 np0005463759.novalocal sudo[111475]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt Sep 30 23:46:20 np0005463759.novalocal sudo[111475]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:20 np0005463759.novalocal sudo[111475]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:20 np0005463759.novalocal sudo[111478]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt Sep 30 23:46:20 np0005463759.novalocal sudo[111478]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:20 np0005463759.novalocal sudo[111478]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:20 np0005463759.novalocal sudo[111481]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt Sep 30 23:46:20 np0005463759.novalocal sudo[111481]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:20 np0005463759.novalocal sudo[111481]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:20 np0005463759.novalocal sudo[111484]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt Sep 30 23:46:20 np0005463759.novalocal sudo[111484]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:20 np0005463759.novalocal sudo[111484]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:20 np0005463759.novalocal sudo[111487]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt Sep 30 23:46:20 np0005463759.novalocal sudo[111487]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:20 np0005463759.novalocal sudo[111487]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:20 np0005463759.novalocal sudo[111490]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt Sep 30 23:46:20 np0005463759.novalocal sudo[111490]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:20 np0005463759.novalocal sudo[111490]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:20 np0005463759.novalocal sudo[111493]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt Sep 30 23:46:20 np0005463759.novalocal sudo[111493]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:20 np0005463759.novalocal sudo[111493]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:20 np0005463759.novalocal sudo[111497]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/rsyncd.conf /var/log/weirdo-project/logs/etc/rsyncd.conf Sep 30 23:46:20 np0005463759.novalocal sudo[111497]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:20 np0005463759.novalocal sudo[111497]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:21 np0005463759.novalocal sudo[111504]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf repolist -v Sep 30 23:46:21 np0005463759.novalocal sudo[111504]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:21 np0005463759.novalocal sshd-session[111440]: Invalid user lzq from 154.92.109.196 port 43090 Sep 30 23:46:21 np0005463759.novalocal sshd-session[111440]: Received disconnect from 154.92.109.196 port 43090:11: Bye Bye [preauth] Sep 30 23:46:21 np0005463759.novalocal sshd-session[111440]: Disconnected from invalid user lzq 154.92.109.196 port 43090 [preauth] Sep 30 23:46:23 np0005463759.novalocal sudo[111504]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:23 np0005463759.novalocal sudo[111507]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf list installed Sep 30 23:46:23 np0005463759.novalocal sudo[111507]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:23 np0005463759.novalocal sudo[111507]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:23 np0005463759.novalocal sudo[111510]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/dnf module list Sep 30 23:46:23 np0005463759.novalocal sudo[111510]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:24 np0005463759.novalocal sudo[111510]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:24 np0005463759.novalocal sudo[111515]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/yum.repos.d /var/log/weirdo-project/logs/etc/yum.repos.d Sep 30 23:46:25 np0005463759.novalocal sudo[111515]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:25 np0005463759.novalocal sudo[111515]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:25 np0005463759.novalocal sudo[111520]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.log /var/log/weirdo-project/logs/dnf Sep 30 23:46:25 np0005463759.novalocal sudo[111520]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:25 np0005463759.novalocal sudo[111520]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:25 np0005463759.novalocal sudo[111523]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /var/log/dnf.rpm.log /var/log/weirdo-project/logs/dnf Sep 30 23:46:25 np0005463759.novalocal sudo[111523]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:25 np0005463759.novalocal sudo[111523]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:25 np0005463759.novalocal sudo[111529]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/passwd /var/log/weirdo-project/logs/etc Sep 30 23:46:25 np0005463759.novalocal sudo[111529]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:25 np0005463759.novalocal sudo[111529]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:25 np0005463759.novalocal sudo[111532]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/group /var/log/weirdo-project/logs/etc Sep 30 23:46:25 np0005463759.novalocal sudo[111532]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:25 np0005463759.novalocal sudo[111532]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:25 np0005463759.novalocal sudo[111535]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp -r /etc/openstack /var/log/weirdo-project/logs/etc Sep 30 23:46:25 np0005463759.novalocal sudo[111535]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:25 np0005463759.novalocal sudo[111535]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:25 np0005463759.novalocal sudo[111538]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chmod 777 /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml Sep 30 23:46:25 np0005463759.novalocal sudo[111538]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:25 np0005463759.novalocal sudo[111538]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:25 np0005463759.novalocal sudo[111545]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ps -eo user,pid,ppid,lwp,%cpu,%mem,size,rss,cmd Sep 30 23:46:25 np0005463759.novalocal sudo[111545]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:25 np0005463759.novalocal sudo[111545]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:25 np0005463759.novalocal sudo[111548]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/ip -d address Sep 30 23:46:25 np0005463759.novalocal sudo[111548]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:25 np0005463759.novalocal sudo[111548]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:25 np0005463759.novalocal sudo[111554]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl show Sep 30 23:46:26 np0005463759.novalocal sudo[111554]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:26 np0005463759.novalocal sudo[111554]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:26 np0005463759.novalocal sudo[111557]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovs-vsctl list open_vswitch Sep 30 23:46:26 np0005463759.novalocal sudo[111557]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:26 np0005463759.novalocal sudo[111557]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:26 np0005463759.novalocal sudo[111561]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-nbctl show Sep 30 23:46:26 np0005463759.novalocal sudo[111561]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:26 np0005463759.novalocal sudo[111561]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:26 np0005463759.novalocal sudo[111565]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/ovn-sbctl show Sep 30 23:46:26 np0005463759.novalocal sudo[111565]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:26 np0005463759.novalocal sudo[111565]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:26 np0005463759.novalocal sudo[111568]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/netstat -tulpn Sep 30 23:46:26 np0005463759.novalocal sudo[111568]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:26 np0005463759.novalocal sudo[111568]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:26 np0005463759.novalocal sudo[111571]: root : PWD=/tmp/puppet-openstack ; USER=root ; ENV=LC_CTYPE=C SYSTEMD_COLORS=false ; COMMAND=/bin/systemctl status --all --no-pager Sep 30 23:46:26 np0005463759.novalocal sudo[111571]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:28 np0005463759.novalocal sudo[111571]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:28 np0005463759.novalocal sudo[111574]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t raw -vnxL Sep 30 23:46:28 np0005463759.novalocal sudo[111574]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:28 np0005463759.novalocal sudo[111574]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:28 np0005463759.novalocal sudo[111577]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t filter -vnxL Sep 30 23:46:28 np0005463759.novalocal sudo[111577]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:28 np0005463759.novalocal sudo[111577]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:28 np0005463759.novalocal sudo[111580]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t nat -vnxL Sep 30 23:46:28 np0005463759.novalocal sudo[111580]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:28 np0005463759.novalocal sudo[111580]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:29 np0005463759.novalocal sudo[111583]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/iptables -t mangle -vnxL Sep 30 23:46:29 np0005463759.novalocal sudo[111583]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:29 np0005463759.novalocal sudo[111583]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:29 np0005463759.novalocal sudo[111586]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/cp /etc/fstab /var/log/weirdo-project/logs/etc/ Sep 30 23:46:29 np0005463759.novalocal sudo[111586]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:29 np0005463759.novalocal sudo[111586]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:29 np0005463759.novalocal sudo[111589]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mount Sep 30 23:46:29 np0005463759.novalocal sudo[111589]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:29 np0005463759.novalocal sudo[111589]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:29 np0005463759.novalocal sudo[111592]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/losetup -al Sep 30 23:46:29 np0005463759.novalocal sudo[111592]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:29 np0005463759.novalocal sudo[111592]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:29 np0005463759.novalocal sudo[111595]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/pvs Sep 30 23:46:29 np0005463759.novalocal sudo[111595]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:29 np0005463759.novalocal sudo[111595]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:29 np0005463759.novalocal sudo[111598]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/vgs Sep 30 23:46:29 np0005463759.novalocal sudo[111598]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:29 np0005463759.novalocal sudo[111598]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:29 np0005463759.novalocal sudo[111601]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/lvs Sep 30 23:46:29 np0005463759.novalocal sudo[111601]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:29 np0005463759.novalocal sudo[111601]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:29 np0005463759.novalocal sudo[111605]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/sbin/semanage boolean --list Sep 30 23:46:29 np0005463759.novalocal sudo[111605]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:30 np0005463759.novalocal sudo[111605]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:34 np0005463759.novalocal sudo[111614]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_cells --verbose Sep 30 23:46:34 np0005463759.novalocal sudo[111614]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Sep 30 23:46:37 np0005463759.novalocal sudo[111614]: pam_unix(sudo:session): session closed for user nova Sep 30 23:46:37 np0005463759.novalocal sudo[111618]: root : PWD=/tmp/puppet-openstack ; USER=nova ; COMMAND=/bin/nova-manage cell_v2 list_hosts Sep 30 23:46:37 np0005463759.novalocal sudo[111618]: pam_unix(sudo:session): session opened for user nova(uid=162) by zuul-worker(uid=0) Sep 30 23:46:40 np0005463759.novalocal sudo[111618]: pam_unix(sudo:session): session closed for user nova Sep 30 23:46:50 np0005463759.novalocal sshd-session[111631]: Invalid user minecraft from 218.51.148.194 port 41220 Sep 30 23:46:50 np0005463759.novalocal sshd-session[111631]: Received disconnect from 218.51.148.194 port 41220:11: Bye Bye [preauth] Sep 30 23:46:50 np0005463759.novalocal sshd-session[111631]: Disconnected from invalid user minecraft 218.51.148.194 port 41220 [preauth] Sep 30 23:46:52 np0005463759.novalocal sudo[111635]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type d -execdir sudo chmod 755 {} ; Sep 30 23:46:52 np0005463759.novalocal sudo[111635]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:52 np0005463759.novalocal sudo[111638]: root : PWD=/var/log/weirdo-project ; USER=root ; COMMAND=/bin/chmod 755 ./logs Sep 30 23:46:52 np0005463759.novalocal sudo[111638]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:52 np0005463759.novalocal sudo[111638]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:52 np0005463759.novalocal sudo[111641]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./etc Sep 30 23:46:52 np0005463759.novalocal sudo[111641]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:52 np0005463759.novalocal sudo[111641]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:52 np0005463759.novalocal sudo[111644]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./sysconfig Sep 30 23:46:52 np0005463759.novalocal sudo[111644]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:52 np0005463759.novalocal sudo[111644]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:52 np0005463759.novalocal sudo[111647]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 755 ./network-scripts Sep 30 23:46:52 np0005463759.novalocal sudo[111647]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:52 np0005463759.novalocal sudo[111647]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:52 np0005463759.novalocal sudo[111650]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ceph Sep 30 23:46:52 np0005463759.novalocal sudo[111650]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:52 np0005463759.novalocal sudo[111650]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:52 np0005463759.novalocal sudo[111653]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Sep 30 23:46:52 np0005463759.novalocal sudo[111653]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:52 np0005463759.novalocal sudo[111653]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:52 np0005463759.novalocal sudo[111656]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Sep 30 23:46:52 np0005463759.novalocal sudo[111656]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:52 np0005463759.novalocal sudo[111656]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:52 np0005463759.novalocal sudo[111659]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Sep 30 23:46:52 np0005463759.novalocal sudo[111659]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:52 np0005463759.novalocal sudo[111659]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:52 np0005463759.novalocal sudo[111662]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Sep 30 23:46:52 np0005463759.novalocal sudo[111662]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:52 np0005463759.novalocal sudo[111662]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:52 np0005463759.novalocal sudo[111665]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 755 ./volumes Sep 30 23:46:52 np0005463759.novalocal sudo[111665]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:52 np0005463759.novalocal sudo[111665]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:52 np0005463759.novalocal sudo[111668]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./glance Sep 30 23:46:52 np0005463759.novalocal sudo[111668]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:52 np0005463759.novalocal sudo[111668]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:52 np0005463759.novalocal sudo[111671]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Sep 30 23:46:52 np0005463759.novalocal sudo[111671]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:52 np0005463759.novalocal sudo[111671]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:52 np0005463759.novalocal sudo[111674]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Sep 30 23:46:52 np0005463759.novalocal sudo[111674]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:52 np0005463759.novalocal sudo[111674]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:52 np0005463759.novalocal sudo[111677]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./metadefs Sep 30 23:46:52 np0005463759.novalocal sudo[111677]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:52 np0005463759.novalocal sudo[111677]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:53 np0005463759.novalocal sudo[111680]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 755 ./rootwrap.d Sep 30 23:46:53 np0005463759.novalocal sudo[111680]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:53 np0005463759.novalocal sudo[111680]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:53 np0005463759.novalocal sudo[111683]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Sep 30 23:46:53 np0005463759.novalocal sudo[111683]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:53 np0005463759.novalocal sudo[111683]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:53 np0005463759.novalocal sudo[111686]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./policy.d Sep 30 23:46:53 np0005463759.novalocal sudo[111686]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:53 np0005463759.novalocal sudo[111686]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:53 np0005463759.novalocal sudo[111689]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./fernet-keys Sep 30 23:46:53 np0005463759.novalocal sudo[111689]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:53 np0005463759.novalocal sudo[111689]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:53 np0005463759.novalocal sudo[111692]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./credential-keys Sep 30 23:46:53 np0005463759.novalocal sudo[111692]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:53 np0005463759.novalocal sudo[111692]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:53 np0005463759.novalocal sudo[111695]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Sep 30 23:46:53 np0005463759.novalocal sudo[111695]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:53 np0005463759.novalocal sudo[111695]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:53 np0005463759.novalocal sudo[111698]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Sep 30 23:46:53 np0005463759.novalocal sudo[111698]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:53 np0005463759.novalocal sudo[111698]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:53 np0005463759.novalocal sudo[111701]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./manila Sep 30 23:46:53 np0005463759.novalocal sudo[111701]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:53 np0005463759.novalocal sudo[111701]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:53 np0005463759.novalocal sudo[111704]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Sep 30 23:46:53 np0005463759.novalocal sudo[111704]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:53 np0005463759.novalocal sudo[111704]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:53 np0005463759.novalocal sudo[111707]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Sep 30 23:46:53 np0005463759.novalocal sudo[111707]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:53 np0005463759.novalocal sudo[111707]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:53 np0005463759.novalocal sudo[111710]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Sep 30 23:46:53 np0005463759.novalocal sudo[111710]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:53 np0005463759.novalocal sudo[111710]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:53 np0005463759.novalocal sudo[111713]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Sep 30 23:46:53 np0005463759.novalocal sudo[111713]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:53 np0005463759.novalocal sudo[111713]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:53 np0005463759.novalocal sudo[111716]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Sep 30 23:46:53 np0005463759.novalocal sudo[111716]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:53 np0005463759.novalocal sudo[111716]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:53 np0005463759.novalocal sudo[111719]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovn-agent Sep 30 23:46:53 np0005463759.novalocal sudo[111719]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:53 np0005463759.novalocal sudo[111719]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:53 np0005463759.novalocal sudo[111722]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-dhcp-agent Sep 30 23:46:53 np0005463759.novalocal sudo[111722]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:53 np0005463759.novalocal sudo[111722]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:53 np0005463759.novalocal sudo[111725]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-l3-agent Sep 30 23:46:53 np0005463759.novalocal sudo[111725]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:53 np0005463759.novalocal sudo[111725]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:53 np0005463759.novalocal sudo[111728]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-linuxbridge-cleanup Sep 30 23:46:53 np0005463759.novalocal sudo[111728]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:53 np0005463759.novalocal sudo[111728]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:53 np0005463759.novalocal sudo[111731]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-metadata-agent Sep 30 23:46:53 np0005463759.novalocal sudo[111731]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:53 np0005463759.novalocal sudo[111731]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:53 np0005463759.novalocal sudo[111734]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-vpn-agent Sep 30 23:46:53 np0005463759.novalocal sudo[111734]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:53 np0005463759.novalocal sudo[111734]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:53 np0005463759.novalocal sudo[111737]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-netns-cleanup Sep 30 23:46:53 np0005463759.novalocal sudo[111737]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:53 np0005463759.novalocal sudo[111737]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:53 np0005463759.novalocal sudo[111740]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-ovs-cleanup Sep 30 23:46:53 np0005463759.novalocal sudo[111740]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:53 np0005463759.novalocal sudo[111740]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:53 np0005463759.novalocal sudo[111743]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./neutron-server Sep 30 23:46:53 np0005463759.novalocal sudo[111743]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:53 np0005463759.novalocal sudo[111743]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:53 np0005463759.novalocal sudo[111746]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./plugins Sep 30 23:46:53 np0005463759.novalocal sudo[111746]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:53 np0005463759.novalocal sudo[111746]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:54 np0005463759.novalocal sudo[111749]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./networking-ovn Sep 30 23:46:54 np0005463759.novalocal sudo[111749]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:54 np0005463759.novalocal sudo[111749]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:54 np0005463759.novalocal sudo[111752]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins ; USER=root ; COMMAND=/bin/chmod 755 ./ml2 Sep 30 23:46:54 np0005463759.novalocal sudo[111752]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:54 np0005463759.novalocal sudo[111752]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:54 np0005463759.novalocal sudo[111755]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Sep 30 23:46:54 np0005463759.novalocal sudo[111755]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:54 np0005463759.novalocal sudo[111755]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:54 np0005463759.novalocal sudo[111758]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Sep 30 23:46:54 np0005463759.novalocal sudo[111758]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:54 np0005463759.novalocal sudo[111758]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:54 np0005463759.novalocal sudo[111761]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 755 ./kill_scripts Sep 30 23:46:54 np0005463759.novalocal sudo[111761]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:54 np0005463759.novalocal sudo[111761]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:54 np0005463759.novalocal sudo[111764]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./nova Sep 30 23:46:54 np0005463759.novalocal sudo[111764]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:54 np0005463759.novalocal sudo[111764]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:54 np0005463759.novalocal sudo[111767]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Sep 30 23:46:54 np0005463759.novalocal sudo[111767]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:54 np0005463759.novalocal sudo[111767]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:54 np0005463759.novalocal sudo[111770]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Sep 30 23:46:54 np0005463759.novalocal sudo[111770]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:54 np0005463759.novalocal sudo[111770]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:54 np0005463759.novalocal sudo[111773]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Sep 30 23:46:54 np0005463759.novalocal sudo[111773]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:54 np0005463759.novalocal sudo[111773]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:54 np0005463759.novalocal sudo[111776]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./certs Sep 30 23:46:54 np0005463759.novalocal sudo[111776]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:54 np0005463759.novalocal sudo[111776]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:54 np0005463759.novalocal sudo[111779]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Sep 30 23:46:54 np0005463759.novalocal sudo[111779]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:54 np0005463759.novalocal sudo[111779]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:54 np0005463759.novalocal sudo[111782]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-api Sep 30 23:46:54 np0005463759.novalocal sudo[111782]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:54 np0005463759.novalocal sudo[111782]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:54 np0005463759.novalocal sudo[111785]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-health-manager Sep 30 23:46:54 np0005463759.novalocal sudo[111785]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:54 np0005463759.novalocal sudo[111785]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:54 np0005463759.novalocal sudo[111788]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-driver-agent Sep 30 23:46:54 np0005463759.novalocal sudo[111788]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:54 np0005463759.novalocal sudo[111788]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:54 np0005463759.novalocal sudo[111791]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./common Sep 30 23:46:54 np0005463759.novalocal sudo[111791]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:54 np0005463759.novalocal sudo[111791]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:54 np0005463759.novalocal sudo[111794]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-worker Sep 30 23:46:54 np0005463759.novalocal sudo[111794]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:54 np0005463759.novalocal sudo[111794]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:54 np0005463759.novalocal sudo[111799]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/conf.d ; USER=root ; COMMAND=/bin/chmod 755 ./octavia-housekeeping Sep 30 23:46:54 np0005463759.novalocal sudo[111799]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:54 np0005463759.novalocal sudo[111799]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:54 np0005463759.novalocal sudo[111802]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Sep 30 23:46:54 np0005463759.novalocal sudo[111802]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:54 np0005463759.novalocal sudo[111802]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:54 np0005463759.novalocal sudo[111805]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Sep 30 23:46:54 np0005463759.novalocal sudo[111805]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:54 np0005463759.novalocal sudo[111805]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:54 np0005463759.novalocal sudo[111808]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Sep 30 23:46:54 np0005463759.novalocal sudo[111808]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:54 np0005463759.novalocal sudo[111808]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:54 np0005463759.novalocal sudo[111811]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./placement Sep 30 23:46:54 np0005463759.novalocal sudo[111811]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:54 np0005463759.novalocal sudo[111811]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:54 np0005463759.novalocal sudo[111814]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Sep 30 23:46:54 np0005463759.novalocal sudo[111814]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:54 np0005463759.novalocal sudo[111814]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:54 np0005463759.novalocal sudo[111817]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Sep 30 23:46:54 np0005463759.novalocal sudo[111817]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:54 np0005463759.novalocal sudo[111817]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:54 np0005463759.novalocal sudo[111820]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./tempest Sep 30 23:46:54 np0005463759.novalocal sudo[111820]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:54 np0005463759.novalocal sudo[111820]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:54 np0005463759.novalocal sudo[111823]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rsyslog.d Sep 30 23:46:55 np0005463759.novalocal sudo[111823]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111823]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:55 np0005463759.novalocal sudo[111826]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Sep 30 23:46:55 np0005463759.novalocal sudo[111826]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111826]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:55 np0005463759.novalocal sudo[111829]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Sep 30 23:46:55 np0005463759.novalocal sudo[111829]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111829]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:55 np0005463759.novalocal sudo[111832]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Sep 30 23:46:55 np0005463759.novalocal sudo[111832]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111832]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:55 np0005463759.novalocal sudo[111835]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./my.cnf.d Sep 30 23:46:55 np0005463759.novalocal sudo[111835]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111835]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:55 np0005463759.novalocal sudo[111838]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./iscsi Sep 30 23:46:55 np0005463759.novalocal sudo[111838]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111838]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:55 np0005463759.novalocal sudo[111841]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Sep 30 23:46:55 np0005463759.novalocal sudo[111841]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111841]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:55 np0005463759.novalocal sudo[111844]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./storage Sep 30 23:46:55 np0005463759.novalocal sudo[111844]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111844]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:55 np0005463759.novalocal sudo[111847]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/storage ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Sep 30 23:46:55 np0005463759.novalocal sudo[111847]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111847]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:55 np0005463759.novalocal sudo[111850]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./secrets Sep 30 23:46:55 np0005463759.novalocal sudo[111850]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111850]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:55 np0005463759.novalocal sudo[111853]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Sep 30 23:46:55 np0005463759.novalocal sudo[111853]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111853]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:55 np0005463759.novalocal sudo[111856]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./networks Sep 30 23:46:55 np0005463759.novalocal sudo[111856]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111856]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:55 np0005463759.novalocal sudo[111859]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Sep 30 23:46:55 np0005463759.novalocal sudo[111859]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111859]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:55 np0005463759.novalocal sudo[111862]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 755 ./autostart Sep 30 23:46:55 np0005463759.novalocal sudo[111862]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111862]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:55 np0005463759.novalocal sudo[111865]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./nwfilter Sep 30 23:46:55 np0005463759.novalocal sudo[111865]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111865]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:55 np0005463759.novalocal sudo[111868]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Sep 30 23:46:55 np0005463759.novalocal sudo[111868]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111868]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:55 np0005463759.novalocal sudo[111871]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./httpd Sep 30 23:46:55 np0005463759.novalocal sudo[111871]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111871]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:55 np0005463759.novalocal sudo[111874]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf Sep 30 23:46:55 np0005463759.novalocal sudo[111874]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111874]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:55 np0005463759.novalocal sudo[111877]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.d Sep 30 23:46:55 np0005463759.novalocal sudo[111877]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111877]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:55 np0005463759.novalocal sudo[111880]: root : PWD=/var/log/weirdo-project/logs/etc/httpd ; USER=root ; COMMAND=/bin/chmod 755 ./conf.modules.d Sep 30 23:46:55 np0005463759.novalocal sudo[111880]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111880]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:55 np0005463759.novalocal sudo[111883]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./redis Sep 30 23:46:55 np0005463759.novalocal sudo[111883]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111883]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:55 np0005463759.novalocal sudo[111886]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 755 ./ssl Sep 30 23:46:55 np0005463759.novalocal sudo[111886]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111886]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:55 np0005463759.novalocal sudo[111889]: root : PWD=/var/log/weirdo-project/logs/etc/redis/ssl ; USER=root ; COMMAND=/bin/chmod 755 ./private Sep 30 23:46:55 np0005463759.novalocal sudo[111889]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111889]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:55 np0005463759.novalocal sudo[111892]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack-dashboard Sep 30 23:46:55 np0005463759.novalocal sudo[111892]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111892]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:55 np0005463759.novalocal sudo[111895]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./default_policies.txt Sep 30 23:46:55 np0005463759.novalocal sudo[111895]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111895]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:55 np0005463759.novalocal sudo[111898]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./enabled.txt Sep 30 23:46:55 np0005463759.novalocal sudo[111898]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111898]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:55 np0005463759.novalocal sudo[111901]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./local_settings.d.txt Sep 30 23:46:55 np0005463759.novalocal sudo[111901]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:55 np0005463759.novalocal sudo[111901]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:56 np0005463759.novalocal sudo[111904]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./nova_policy.d.txt Sep 30 23:46:56 np0005463759.novalocal sudo[111904]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:56 np0005463759.novalocal sudo[111904]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:56 np0005463759.novalocal sudo[111907]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 755 ./ssl.txt Sep 30 23:46:56 np0005463759.novalocal sudo[111907]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:56 np0005463759.novalocal sudo[111907]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:56 np0005463759.novalocal sudo[111910]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt ; USER=root ; COMMAND=/bin/chmod 755 ./private Sep 30 23:46:56 np0005463759.novalocal sudo[111910]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:56 np0005463759.novalocal sudo[111910]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:56 np0005463759.novalocal sudo[111913]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./yum.repos.d Sep 30 23:46:56 np0005463759.novalocal sudo[111913]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:56 np0005463759.novalocal sudo[111913]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:56 np0005463759.novalocal sudo[111916]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 755 ./openstack Sep 30 23:46:56 np0005463759.novalocal sudo[111916]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:56 np0005463759.novalocal sudo[111916]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:56 np0005463759.novalocal sudo[111919]: root : PWD=/var/log/weirdo-project/logs/etc/openstack ; USER=root ; COMMAND=/bin/chmod 755 ./puppet Sep 30 23:46:56 np0005463759.novalocal sudo[111919]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:56 np0005463759.novalocal sudo[111919]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:56 np0005463759.novalocal sudo[111922]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cinder Sep 30 23:46:56 np0005463759.novalocal sudo[111922]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:56 np0005463759.novalocal sudo[111922]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:56 np0005463759.novalocal sudo[111925]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./glance Sep 30 23:46:56 np0005463759.novalocal sudo[111925]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:56 np0005463759.novalocal sudo[111925]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:56 np0005463759.novalocal sudo[111928]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./horizon Sep 30 23:46:56 np0005463759.novalocal sudo[111928]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:56 np0005463759.novalocal sudo[111928]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:56 np0005463759.novalocal sudo[111931]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./keystone Sep 30 23:46:56 np0005463759.novalocal sudo[111931]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:56 np0005463759.novalocal sudo[111931]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:56 np0005463759.novalocal sudo[111934]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./manila Sep 30 23:46:56 np0005463759.novalocal sudo[111934]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:56 np0005463759.novalocal sudo[111934]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:56 np0005463759.novalocal sudo[111937]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./neutron Sep 30 23:46:56 np0005463759.novalocal sudo[111937]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:56 np0005463759.novalocal sudo[111937]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:56 np0005463759.novalocal sudo[111940]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./nova Sep 30 23:46:56 np0005463759.novalocal sudo[111940]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:56 np0005463759.novalocal sudo[111940]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:56 np0005463759.novalocal sudo[111943]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./octavia Sep 30 23:46:56 np0005463759.novalocal sudo[111943]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:56 np0005463759.novalocal sudo[111943]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:56 np0005463759.novalocal sudo[111946]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./ovn Sep 30 23:46:56 np0005463759.novalocal sudo[111946]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:56 np0005463759.novalocal sudo[111946]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:56 np0005463759.novalocal sudo[111949]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./placement Sep 30 23:46:56 np0005463759.novalocal sudo[111949]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:56 np0005463759.novalocal sudo[111949]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:56 np0005463759.novalocal sudo[111952]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./rabbitmq Sep 30 23:46:56 np0005463759.novalocal sudo[111952]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:56 np0005463759.novalocal sudo[111952]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:56 np0005463759.novalocal sudo[111955]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./mariadb Sep 30 23:46:56 np0005463759.novalocal sudo[111955]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:56 np0005463759.novalocal sudo[111955]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:56 np0005463759.novalocal sudo[111958]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./libvirt Sep 30 23:46:56 np0005463759.novalocal sudo[111958]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:56 np0005463759.novalocal sudo[111958]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:56 np0005463759.novalocal sudo[111961]: root : PWD=/var/log/weirdo-project/logs/libvirt ; USER=root ; COMMAND=/bin/chmod 755 ./qemu Sep 30 23:46:56 np0005463759.novalocal sudo[111961]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:56 np0005463759.novalocal sudo[111961]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:56 np0005463759.novalocal sudo[111964]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openvswitch Sep 30 23:46:56 np0005463759.novalocal sudo[111964]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:56 np0005463759.novalocal sudo[111964]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:56 np0005463759.novalocal sudo[111967]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./sudoers.d Sep 30 23:46:56 np0005463759.novalocal sudo[111967]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:56 np0005463759.novalocal sudo[111967]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:56 np0005463759.novalocal sudo[111970]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./apache Sep 30 23:46:56 np0005463759.novalocal sudo[111970]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:56 np0005463759.novalocal sudo[111970]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:56 np0005463759.novalocal sudo[111973]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./redis Sep 30 23:46:56 np0005463759.novalocal sudo[111973]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:56 np0005463759.novalocal sudo[111973]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:56 np0005463759.novalocal sudo[111976]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./cron Sep 30 23:46:56 np0005463759.novalocal sudo[111976]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:57 np0005463759.novalocal sudo[111976]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:57 np0005463759.novalocal sudo[111979]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./dnf Sep 30 23:46:57 np0005463759.novalocal sudo[111979]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:57 np0005463759.novalocal sudo[111979]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:57 np0005463759.novalocal sudo[111982]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 755 ./openstack_resources Sep 30 23:46:57 np0005463759.novalocal sudo[111982]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:57 np0005463759.novalocal sudo[111982]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:57 np0005463759.novalocal sudo[111635]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:57 np0005463759.novalocal sudo[111985]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type f -execdir sudo chmod 644 {} ; Sep 30 23:46:57 np0005463759.novalocal sudo[111985]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:57 np0005463759.novalocal sudo[111988]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet-20250930_233019.log Sep 30 23:46:57 np0005463759.novalocal sudo[111988]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:57 np0005463759.novalocal sudo[111988]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:57 np0005463759.novalocal sudo[111991]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet-20250930_233315.log Sep 30 23:46:57 np0005463759.novalocal sudo[111991]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:57 np0005463759.novalocal sudo[111991]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:57 np0005463759.novalocal sudo[111994]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-post Sep 30 23:46:57 np0005463759.novalocal sudo[111994]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:57 np0005463759.novalocal sudo[111994]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:57 np0005463759.novalocal sudo[111997]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-routes Sep 30 23:46:57 np0005463759.novalocal sudo[111997]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:57 np0005463759.novalocal sudo[111997]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:57 np0005463759.novalocal sudo[112000]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-tunnel Sep 30 23:46:57 np0005463759.novalocal sudo[112000]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:57 np0005463759.novalocal sudo[112000]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:57 np0005463759.novalocal sudo[112003]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-lo Sep 30 23:46:57 np0005463759.novalocal sudo[112003]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:57 np0005463759.novalocal sudo[112003]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:57 np0005463759.novalocal sudo[112006]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown Sep 30 23:46:57 np0005463759.novalocal sudo[112006]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:57 np0005463759.novalocal sudo[112006]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:57 np0005463759.novalocal sudo[112009]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-eth Sep 30 23:46:57 np0005463759.novalocal sudo[112009]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:57 np0005463759.novalocal sudo[112009]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:57 np0005463759.novalocal sudo[112012]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ipv6 Sep 30 23:46:57 np0005463759.novalocal sudo[112012]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:57 np0005463759.novalocal sudo[112012]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:57 np0005463759.novalocal sudo[112015]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifdown-ovs Sep 30 23:46:57 np0005463759.novalocal sudo[112015]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:57 np0005463759.novalocal sudo[112015]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:57 np0005463759.novalocal sudo[112018]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-loop1 Sep 30 23:46:57 np0005463759.novalocal sudo[112018]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:57 np0005463759.novalocal sudo[112018]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:57 np0005463759.novalocal sudo[112021]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-br-ex Sep 30 23:46:57 np0005463759.novalocal sudo[112021]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:57 np0005463759.novalocal sudo[112021]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:57 np0005463759.novalocal sudo[112024]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./readme-ifcfg-rh.txt Sep 30 23:46:57 np0005463759.novalocal sudo[112024]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:57 np0005463759.novalocal sudo[112024]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:57 np0005463759.novalocal sudo[112027]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifcfg-eth0 Sep 30 23:46:57 np0005463759.novalocal sudo[112027]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:57 np0005463759.novalocal sudo[112027]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:57 np0005463759.novalocal sudo[112030]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup Sep 30 23:46:57 np0005463759.novalocal sudo[112030]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:57 np0005463759.novalocal sudo[112030]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:57 np0005463759.novalocal sudo[112033]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-aliases Sep 30 23:46:57 np0005463759.novalocal sudo[112033]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:57 np0005463759.novalocal sudo[112033]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:57 np0005463759.novalocal sudo[112036]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-eth Sep 30 23:46:57 np0005463759.novalocal sudo[112036]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:57 np0005463759.novalocal sudo[112036]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:57 np0005463759.novalocal sudo[112039]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ipv6 Sep 30 23:46:57 np0005463759.novalocal sudo[112039]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:57 np0005463759.novalocal sudo[112039]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:57 np0005463759.novalocal sudo[112042]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-ovs Sep 30 23:46:57 np0005463759.novalocal sudo[112042]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:57 np0005463759.novalocal sudo[112042]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:57 np0005463759.novalocal sudo[112045]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-post Sep 30 23:46:57 np0005463759.novalocal sudo[112045]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:57 np0005463759.novalocal sudo[112045]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:57 np0005463759.novalocal sudo[112048]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-routes Sep 30 23:46:57 np0005463759.novalocal sudo[112048]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:57 np0005463759.novalocal sudo[112048]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:57 np0005463759.novalocal sudo[112051]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./ifup-tunnel Sep 30 23:46:58 np0005463759.novalocal sudo[112051]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:58 np0005463759.novalocal sudo[112051]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:58 np0005463759.novalocal sudo[112054]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./init.ipv6-global Sep 30 23:46:58 np0005463759.novalocal sudo[112054]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:58 np0005463759.novalocal sudo[112054]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:58 np0005463759.novalocal sudo[112057]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions Sep 30 23:46:58 np0005463759.novalocal sudo[112057]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:58 np0005463759.novalocal sudo[112057]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:58 np0005463759.novalocal sudo[112060]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig/network-scripts ; USER=root ; COMMAND=/bin/chmod 644 ./network-functions-ipv6 Sep 30 23:46:58 np0005463759.novalocal sudo[112060]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:58 np0005463759.novalocal sudo[112060]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:58 np0005463759.novalocal sudo[112063]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-guests Sep 30 23:46:58 np0005463759.novalocal sudo[112063]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:58 np0005463759.novalocal sudo[112063]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:58 np0005463759.novalocal sudo[112066]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd Sep 30 23:46:58 np0005463759.novalocal sudo[112066]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:58 np0005463759.novalocal sudo[112066]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:58 np0005463759.novalocal sudo[112069]: root : PWD=/var/log/weirdo-project/logs/etc/sysconfig ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller Sep 30 23:46:58 np0005463759.novalocal sudo[112069]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:58 np0005463759.novalocal sudo[112069]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:58 np0005463759.novalocal sudo[112072]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005463759.novalocal.pem Sep 30 23:46:58 np0005463759.novalocal sudo[112072]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:58 np0005463759.novalocal sudo[112072]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:58 np0005463759.novalocal sudo[112075]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Sep 30 23:46:58 np0005463759.novalocal sudo[112075]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:58 np0005463759.novalocal sudo[112075]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:58 np0005463759.novalocal sudo[112078]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.conf Sep 30 23:46:58 np0005463759.novalocal sudo[112078]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:58 np0005463759.novalocal sudo[112078]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:58 np0005463759.novalocal sudo[112081]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./resource_filters.json Sep 30 23:46:58 np0005463759.novalocal sudo[112081]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:58 np0005463759.novalocal sudo[112081]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:58 np0005463759.novalocal sudo[112084]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Sep 30 23:46:58 np0005463759.novalocal sudo[112084]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:58 np0005463759.novalocal sudo[112084]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:58 np0005463759.novalocal sudo[112087]: root : PWD=/var/log/weirdo-project/logs/etc/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Sep 30 23:46:58 np0005463759.novalocal sudo[112087]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:58 np0005463759.novalocal sudo[112087]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:58 np0005463759.novalocal sudo[112090]: root : PWD=/var/log/weirdo-project/logs/etc/glance/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005463759.novalocal.pem Sep 30 23:46:58 np0005463759.novalocal sudo[112090]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:58 np0005463759.novalocal sudo[112090]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:58 np0005463759.novalocal sudo[112093]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api-paste.ini Sep 30 23:46:58 np0005463759.novalocal sudo[112093]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:58 np0005463759.novalocal sudo[112093]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:58 np0005463759.novalocal sudo[112096]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-api.conf Sep 30 23:46:58 np0005463759.novalocal sudo[112096]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:58 np0005463759.novalocal sudo[112096]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:58 np0005463759.novalocal sudo[112099]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-cache.conf Sep 30 23:46:58 np0005463759.novalocal sudo[112099]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:58 np0005463759.novalocal sudo[112099]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:58 np0005463759.novalocal sudo[112102]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-image-import.conf Sep 30 23:46:58 np0005463759.novalocal sudo[112102]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:58 np0005463759.novalocal sudo[112102]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:58 np0005463759.novalocal sudo[112105]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-scrubber.conf Sep 30 23:46:58 np0005463759.novalocal sudo[112105]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:58 np0005463759.novalocal sudo[112105]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:58 np0005463759.novalocal sudo[112108]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./glance-swift.conf Sep 30 23:46:58 np0005463759.novalocal sudo[112108]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:58 np0005463759.novalocal sudo[112108]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:58 np0005463759.novalocal sudo[112111]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Sep 30 23:46:58 np0005463759.novalocal sudo[112111]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:58 np0005463759.novalocal sudo[112111]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:58 np0005463759.novalocal sudo[112114]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./schema-image.json Sep 30 23:46:58 np0005463759.novalocal sudo[112114]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:58 np0005463759.novalocal sudo[112114]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:58 np0005463759.novalocal sudo[112117]: root : PWD=/var/log/weirdo-project/logs/etc/glance ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Sep 30 23:46:58 np0005463759.novalocal sudo[112117]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:58 np0005463759.novalocal sudo[112117]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:58 np0005463759.novalocal sudo[112120]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt.json Sep 30 23:46:58 np0005463759.novalocal sudo[112120]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:58 np0005463759.novalocal sudo[112120]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:58 np0005463759.novalocal sudo[112123]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-processor-allocation-setting-data.json Sep 30 23:46:58 np0005463759.novalocal sudo[112123]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:58 np0005463759.novalocal sudo[112123]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:58 np0005463759.novalocal sudo[112126]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-resource-allocation-setting-data.json Sep 30 23:46:58 np0005463759.novalocal sudo[112126]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:58 np0005463759.novalocal sudo[112126]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:58 np0005463759.novalocal sudo[112129]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-storage-allocation-setting-data.json Sep 30 23:46:59 np0005463759.novalocal sudo[112129]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:59 np0005463759.novalocal sudo[112129]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:59 np0005463759.novalocal sudo[112132]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./cim-virtual-system-setting-data.json Sep 30 23:46:59 np0005463759.novalocal sudo[112132]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:59 np0005463759.novalocal sudo[112132]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:59 np0005463759.novalocal sudo[112135]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-disk-filter.json Sep 30 23:46:59 np0005463759.novalocal sudo[112135]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:59 np0005463759.novalocal sudo[112135]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:59 np0005463759.novalocal sudo[112138]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-iops-filter.json Sep 30 23:46:59 np0005463759.novalocal sudo[112138]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:59 np0005463759.novalocal sudo[112138]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:59 np0005463759.novalocal sudo[112141]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-aggr-num-instances.json Sep 30 23:46:59 np0005463759.novalocal sudo[112141]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:59 np0005463759.novalocal sudo[112141]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:59 np0005463759.novalocal sudo[112144]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-mode.json Sep 30 23:46:59 np0005463759.novalocal sudo[112144]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:59 np0005463759.novalocal sudo[112144]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:59 np0005463759.novalocal sudo[112147]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-cpu-pinning.json Sep 30 23:46:59 np0005463759.novalocal sudo[112147]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:59 np0005463759.novalocal sudo[112147]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:59 np0005463759.novalocal sudo[112150]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-memory-backing.json Sep 30 23:46:59 np0005463759.novalocal sudo[112150]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:59 np0005463759.novalocal sudo[112150]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:59 np0005463759.novalocal sudo[112153]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-guest-shutdown.json Sep 30 23:46:59 np0005463759.novalocal sudo[112153]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:59 np0005463759.novalocal sudo[112153]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:59 np0005463759.novalocal sudo[112156]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-host-capabilities.json Sep 30 23:46:59 np0005463759.novalocal sudo[112156]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:59 np0005463759.novalocal sudo[112156]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:59 np0005463759.novalocal sudo[112159]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-hypervisor.json Sep 30 23:46:59 np0005463759.novalocal sudo[112159]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:59 np0005463759.novalocal sudo[112159]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:59 np0005463759.novalocal sudo[112162]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-instance-data.json Sep 30 23:46:59 np0005463759.novalocal sudo[112162]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:59 np0005463759.novalocal sudo[112162]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:59 np0005463759.novalocal sudo[112165]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-libvirt-image.json Sep 30 23:46:59 np0005463759.novalocal sudo[112165]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:59 np0005463759.novalocal sudo[112165]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:59 np0005463759.novalocal sudo[112168]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-quota.json Sep 30 23:46:59 np0005463759.novalocal sudo[112168]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:59 np0005463759.novalocal sudo[112168]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:59 np0005463759.novalocal sudo[112171]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-randomgen.json Sep 30 23:46:59 np0005463759.novalocal sudo[112171]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:59 np0005463759.novalocal sudo[112171]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:59 np0005463759.novalocal sudo[112174]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vcputopology.json Sep 30 23:46:59 np0005463759.novalocal sudo[112174]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:59 np0005463759.novalocal sudo[112174]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:59 np0005463759.novalocal sudo[112177]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-flavor.json Sep 30 23:46:59 np0005463759.novalocal sudo[112177]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:59 np0005463759.novalocal sudo[112177]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:59 np0005463759.novalocal sudo[112180]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware-quota-flavor.json Sep 30 23:46:59 np0005463759.novalocal sudo[112180]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:59 np0005463759.novalocal sudo[112180]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:59 np0005463759.novalocal sudo[112183]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vmware.json Sep 30 23:46:59 np0005463759.novalocal sudo[112183]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:59 np0005463759.novalocal sudo[112183]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:59 np0005463759.novalocal sudo[112186]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm-hw.json Sep 30 23:46:59 np0005463759.novalocal sudo[112186]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:59 np0005463759.novalocal sudo[112186]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:59 np0005463759.novalocal sudo[112189]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-vtpm.json Sep 30 23:46:59 np0005463759.novalocal sudo[112189]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:59 np0005463759.novalocal sudo[112189]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:59 np0005463759.novalocal sudo[112192]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-watchdog.json Sep 30 23:46:59 np0005463759.novalocal sudo[112192]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:59 np0005463759.novalocal sudo[112192]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:59 np0005463759.novalocal sudo[112195]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./compute-xenapi.json Sep 30 23:46:59 np0005463759.novalocal sudo[112195]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:59 np0005463759.novalocal sudo[112195]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:59 np0005463759.novalocal sudo[112198]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./glance-common-image-props.json Sep 30 23:46:59 np0005463759.novalocal sudo[112198]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:59 np0005463759.novalocal sudo[112198]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:59 np0005463759.novalocal sudo[112201]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./image-signature-verification.json Sep 30 23:46:59 np0005463759.novalocal sudo[112201]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:46:59 np0005463759.novalocal sudo[112201]: pam_unix(sudo:session): session closed for user root Sep 30 23:46:59 np0005463759.novalocal sudo[112204]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./operating-system.json Sep 30 23:47:00 np0005463759.novalocal systemd[1]: Starting system activity accounting tool... Sep 30 23:47:00 np0005463759.novalocal sudo[112204]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112204]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:00 np0005463759.novalocal systemd[1]: sysstat-collect.service: Deactivated successfully. Sep 30 23:47:00 np0005463759.novalocal systemd[1]: Finished system activity accounting tool. Sep 30 23:47:00 np0005463759.novalocal sudo[112208]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-databases.json Sep 30 23:47:00 np0005463759.novalocal sudo[112208]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112208]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:00 np0005463759.novalocal sudo[112212]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-runtimes.json Sep 30 23:47:00 np0005463759.novalocal sudo[112212]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112212]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:00 np0005463759.novalocal sudo[112215]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./software-webservers.json Sep 30 23:47:00 np0005463759.novalocal sudo[112215]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112215]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:00 np0005463759.novalocal sudo[112218]: root : PWD=/var/log/weirdo-project/logs/etc/glance/metadefs ; USER=root ; COMMAND=/bin/chmod 644 ./storage-volume-type.json Sep 30 23:47:00 np0005463759.novalocal sudo[112218]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112218]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:00 np0005463759.novalocal sudo[112221]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./default_catalog.templates Sep 30 23:47:00 np0005463759.novalocal sudo[112221]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112221]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:00 np0005463759.novalocal sudo[112224]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.conf Sep 30 23:47:00 np0005463759.novalocal sudo[112224]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112224]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:00 np0005463759.novalocal sudo[112227]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf Sep 30 23:47:00 np0005463759.novalocal sudo[112227]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112227]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:00 np0005463759.novalocal sudo[112230]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./sso_callback_template.html Sep 30 23:47:00 np0005463759.novalocal sudo[112230]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112230]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:00 np0005463759.novalocal sudo[112233]: root : PWD=/var/log/weirdo-project/logs/etc/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Sep 30 23:47:00 np0005463759.novalocal sudo[112233]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112233]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:00 np0005463759.novalocal sudo[112236]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Sep 30 23:47:00 np0005463759.novalocal sudo[112236]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112236]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:00 np0005463759.novalocal sudo[112239]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./2 Sep 30 23:47:00 np0005463759.novalocal sudo[112239]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112239]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:00 np0005463759.novalocal sudo[112242]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/fernet-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Sep 30 23:47:00 np0005463759.novalocal sudo[112242]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112242]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:00 np0005463759.novalocal sudo[112245]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./1 Sep 30 23:47:00 np0005463759.novalocal sudo[112245]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112245]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:00 np0005463759.novalocal sudo[112248]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/credential-keys ; USER=root ; COMMAND=/bin/chmod 644 ./0 Sep 30 23:47:00 np0005463759.novalocal sudo[112248]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112248]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:00 np0005463759.novalocal sudo[112251]: root : PWD=/var/log/weirdo-project/logs/etc/keystone/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005463759.novalocal.pem Sep 30 23:47:00 np0005463759.novalocal sudo[112251]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112251]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:00 np0005463759.novalocal sudo[112254]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Sep 30 23:47:00 np0005463759.novalocal sudo[112254]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112254]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:00 np0005463759.novalocal sudo[112257]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila.conf Sep 30 23:47:00 np0005463759.novalocal sudo[112257]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112257]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:00 np0005463759.novalocal sudo[112260]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Sep 30 23:47:00 np0005463759.novalocal sudo[112260]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112260]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:00 np0005463759.novalocal sudo[112263]: root : PWD=/var/log/weirdo-project/logs/etc/manila ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Sep 30 23:47:00 np0005463759.novalocal sudo[112263]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112263]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:00 np0005463759.novalocal sudo[112266]: root : PWD=/var/log/weirdo-project/logs/etc/manila/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005463759.novalocal.pem Sep 30 23:47:00 np0005463759.novalocal sudo[112266]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112266]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:00 np0005463759.novalocal sudo[112269]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./README Sep 30 23:47:00 np0005463759.novalocal sudo[112269]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112269]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:00 np0005463759.novalocal sudo[112272]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ml2_conf.ini Sep 30 23:47:00 np0005463759.novalocal sudo[112272]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112272]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:00 np0005463759.novalocal sudo[112275]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_agent.ini Sep 30 23:47:00 np0005463759.novalocal sudo[112275]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112275]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:00 np0005463759.novalocal sudo[112278]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/ml2 ; USER=root ; COMMAND=/bin/chmod 644 ./sriov_agent.ini Sep 30 23:47:00 np0005463759.novalocal sudo[112278]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112278]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:00 np0005463759.novalocal sudo[112281]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005463759.novalocal.pem Sep 30 23:47:00 np0005463759.novalocal sudo[112281]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112281]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:00 np0005463759.novalocal sudo[112284]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.conf Sep 30 23:47:00 np0005463759.novalocal sudo[112284]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:00 np0005463759.novalocal sudo[112284]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:01 np0005463759.novalocal sudo[112287]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Sep 30 23:47:01 np0005463759.novalocal sudo[112287]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:01 np0005463759.novalocal sudo[112287]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:01 np0005463759.novalocal sudo[112290]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Sep 30 23:47:01 np0005463759.novalocal sudo[112290]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:01 np0005463759.novalocal sudo[112290]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:01 np0005463759.novalocal sudo[112293]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./dhcp_agent.ini Sep 30 23:47:01 np0005463759.novalocal sudo[112293]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:01 np0005463759.novalocal sudo[112293]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:01 np0005463759.novalocal sudo[112296]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./l3_agent.ini Sep 30 23:47:01 np0005463759.novalocal sudo[112296]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:01 np0005463759.novalocal sudo[112296]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:01 np0005463759.novalocal sudo[112299]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./metadata_agent.ini Sep 30 23:47:01 np0005463759.novalocal sudo[112299]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:01 np0005463759.novalocal sudo[112299]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:01 np0005463759.novalocal sudo[112302]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn_vpn_agent.ini Sep 30 23:47:01 np0005463759.novalocal sudo[112302]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:01 np0005463759.novalocal sudo[112302]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:01 np0005463759.novalocal sudo[112305]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_vpnaas.conf Sep 30 23:47:01 np0005463759.novalocal sudo[112305]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:01 np0005463759.novalocal sudo[112305]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:01 np0005463759.novalocal sudo[112308]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./vpn_agent.ini Sep 30 23:47:01 np0005463759.novalocal sudo[112308]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:01 np0005463759.novalocal sudo[112308]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:01 np0005463759.novalocal sudo[112311]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Sep 30 23:47:01 np0005463759.novalocal sudo[112311]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:01 np0005463759.novalocal sudo[112311]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:01 np0005463759.novalocal sudo[112314]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Sep 30 23:47:01 np0005463759.novalocal sudo[112314]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:01 np0005463759.novalocal sudo[112314]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:01 np0005463759.novalocal sudo[112317]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Sep 30 23:47:01 np0005463759.novalocal sudo[112317]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:01 np0005463759.novalocal sudo[112317]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:01 np0005463759.novalocal sudo[112320]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Sep 30 23:47:01 np0005463759.novalocal sudo[112320]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:01 np0005463759.novalocal sudo[112320]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:01 np0005463759.novalocal sudo[112323]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Sep 30 23:47:01 np0005463759.novalocal sudo[112323]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:01 np0005463759.novalocal sudo[112323]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:01 np0005463759.novalocal sudo[112326]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Sep 30 23:47:01 np0005463759.novalocal sudo[112326]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:01 np0005463759.novalocal sudo[112326]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:01 np0005463759.novalocal sudo[112329]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.conf Sep 30 23:47:01 np0005463759.novalocal sudo[112329]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:01 np0005463759.novalocal sudo[112329]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:01 np0005463759.novalocal sudo[112332]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./api-paste.ini Sep 30 23:47:01 np0005463759.novalocal sudo[112332]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:01 np0005463759.novalocal sudo[112332]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:01 np0005463759.novalocal sudo[112335]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova.conf Sep 30 23:47:01 np0005463759.novalocal sudo[112335]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:01 np0005463759.novalocal sudo[112335]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:01 np0005463759.novalocal sudo[112338]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./release Sep 30 23:47:01 np0005463759.novalocal sudo[112338]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:01 np0005463759.novalocal sudo[112338]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:01 np0005463759.novalocal sudo[112341]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./rootwrap.conf Sep 30 23:47:01 np0005463759.novalocal sudo[112341]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:01 np0005463759.novalocal sudo[112341]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:01 np0005463759.novalocal sudo[112344]: root : PWD=/var/log/weirdo-project/logs/etc/nova ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Sep 30 23:47:01 np0005463759.novalocal sudo[112344]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:01 np0005463759.novalocal sudo[112344]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:01 np0005463759.novalocal sudo[112347]: root : PWD=/var/log/weirdo-project/logs/etc/nova/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005463759.novalocal.pem Sep 30 23:47:01 np0005463759.novalocal sudo[112347]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:01 np0005463759.novalocal sudo[112347]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:01 np0005463759.novalocal sudo[112350]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.conf Sep 30 23:47:01 np0005463759.novalocal sudo[112350]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:01 np0005463759.novalocal sudo[112350]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:01 np0005463759.novalocal sudo[112353]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Sep 30 23:47:01 np0005463759.novalocal sudo[112353]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:01 np0005463759.novalocal sudo[112353]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:01 np0005463759.novalocal sudo[112356]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Sep 30 23:47:01 np0005463759.novalocal sudo[112356]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:01 np0005463759.novalocal sudo[112356]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:01 np0005463759.novalocal sudo[112359]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Sep 30 23:47:01 np0005463759.novalocal sudo[112359]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:01 np0005463759.novalocal sudo[112359]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:01 np0005463759.novalocal sudo[112362]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Sep 30 23:47:01 np0005463759.novalocal sudo[112362]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112362]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112365]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Sep 30 23:47:02 np0005463759.novalocal sudo[112365]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112365]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112368]: root : PWD=/var/log/weirdo-project/logs/etc/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./switchcacert.pem Sep 30 23:47:02 np0005463759.novalocal sudo[112368]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112368]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112371]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.cert.pem Sep 30 23:47:02 np0005463759.novalocal sudo[112371]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112371]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112374]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./server_ca.key.pem Sep 30 23:47:02 np0005463759.novalocal sudo[112374]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112374]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112377]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client_ca.cert.pem Sep 30 23:47:02 np0005463759.novalocal sudo[112377]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112377]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112380]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/certs ; USER=root ; COMMAND=/bin/chmod 644 ./client.cert-and-key.pem Sep 30 23:47:02 np0005463759.novalocal sudo[112380]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112380]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112383]: root : PWD=/var/log/weirdo-project/logs/etc/octavia/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005463759.novalocal.pem Sep 30 23:47:02 np0005463759.novalocal sudo[112383]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112383]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112386]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.conf Sep 30 23:47:02 np0005463759.novalocal sudo[112386]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112386]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112389]: root : PWD=/var/log/weirdo-project/logs/etc/placement ; USER=root ; COMMAND=/bin/chmod 644 ./policy.yaml Sep 30 23:47:02 np0005463759.novalocal sudo[112389]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112389]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112392]: root : PWD=/var/log/weirdo-project/logs/etc/placement/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005463759.novalocal.pem Sep 30 23:47:02 np0005463759.novalocal sudo[112392]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112392]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112395]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./accounts.yaml.sample Sep 30 23:47:02 np0005463759.novalocal sudo[112395]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112395]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112398]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./allow-list.yaml Sep 30 23:47:02 np0005463759.novalocal sudo[112398]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112398]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112401]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./logging.conf.sample Sep 30 23:47:02 np0005463759.novalocal sudo[112401]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112401]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112404]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./rbac-persona-accounts.yaml.sample Sep 30 23:47:02 np0005463759.novalocal sudo[112404]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112404]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112407]: root : PWD=/var/log/weirdo-project/logs/etc/tempest ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf Sep 30 23:47:02 np0005463759.novalocal sudo[112407]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112407]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112410]: root : PWD=/var/log/weirdo-project/logs/etc/rsyslog.d ; USER=root ; COMMAND=/bin/chmod 644 ./21-cloudinit.conf Sep 30 23:47:02 np0005463759.novalocal sudo[112410]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112410]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112413]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./rsyslog.conf Sep 30 23:47:02 np0005463759.novalocal sudo[112413]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112413]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112416]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./inetrc Sep 30 23:47:02 np0005463759.novalocal sudo[112416]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112416]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112419]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmqadmin.conf Sep 30 23:47:02 np0005463759.novalocal sudo[112419]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112419]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112422]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./enabled_plugins Sep 30 23:47:02 np0005463759.novalocal sudo[112422]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112422]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112425]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.config Sep 30 23:47:02 np0005463759.novalocal sudo[112425]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112425]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112428]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq-env.conf Sep 30 23:47:02 np0005463759.novalocal sudo[112428]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112428]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112431]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbitmq.conf Sep 30 23:47:02 np0005463759.novalocal sudo[112431]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112431]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112434]: root : PWD=/var/log/weirdo-project/logs/etc/rabbitmq/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005463759.novalocal.pem Sep 30 23:47:02 np0005463759.novalocal sudo[112434]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112434]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112437]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./my.cnf Sep 30 23:47:02 np0005463759.novalocal sudo[112437]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112437]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112440]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./auth_gssapi.cnf Sep 30 23:47:02 np0005463759.novalocal sudo[112440]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:02 np0005463759.novalocal sudo[112440]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:02 np0005463759.novalocal sudo[112443]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./enable_encryption.preset Sep 30 23:47:03 np0005463759.novalocal sudo[112443]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:03 np0005463759.novalocal sudo[112443]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:03 np0005463759.novalocal sudo[112446]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb-server.cnf Sep 30 23:47:03 np0005463759.novalocal sudo[112446]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:03 np0005463759.novalocal sudo[112446]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:03 np0005463759.novalocal sudo[112449]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./spider.cnf Sep 30 23:47:03 np0005463759.novalocal sudo[112449]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:03 np0005463759.novalocal sudo[112449]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:03 np0005463759.novalocal sudo[112452]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./mysql-clients.cnf Sep 30 23:47:03 np0005463759.novalocal sudo[112452]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:03 np0005463759.novalocal sudo[112452]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:03 np0005463759.novalocal sudo[112455]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./server.cnf Sep 30 23:47:03 np0005463759.novalocal sudo[112455]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:03 np0005463759.novalocal sudo[112455]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:03 np0005463759.novalocal sudo[112458]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./client.cnf Sep 30 23:47:03 np0005463759.novalocal sudo[112458]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:03 np0005463759.novalocal sudo[112458]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:03 np0005463759.novalocal sudo[112461]: root : PWD=/var/log/weirdo-project/logs/etc/my.cnf.d ; USER=root ; COMMAND=/bin/chmod 644 ./np0005463759.novalocal.pem Sep 30 23:47:03 np0005463759.novalocal sudo[112461]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:03 np0005463759.novalocal sudo[112461]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:03 np0005463759.novalocal sudo[112464]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./iscsid.conf Sep 30 23:47:03 np0005463759.novalocal sudo[112464]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:03 np0005463759.novalocal sudo[112464]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:03 np0005463759.novalocal sudo[112467]: root : PWD=/var/log/weirdo-project/logs/etc/iscsi ; USER=root ; COMMAND=/bin/chmod 644 ./initiatorname.iscsi Sep 30 23:47:03 np0005463759.novalocal sudo[112467]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:03 np0005463759.novalocal sudo[112467]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:03 np0005463759.novalocal sudo[112470]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks ; USER=root ; COMMAND=/bin/chmod 644 ./default.xml Sep 30 23:47:03 np0005463759.novalocal sudo[112470]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:03 np0005463759.novalocal sudo[112470]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:03 np0005463759.novalocal sudo[112473]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./network.conf Sep 30 23:47:03 np0005463759.novalocal sudo[112473]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:03 np0005463759.novalocal sudo[112473]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:03 np0005463759.novalocal sudo[112476]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnetworkd.conf Sep 30 23:47:03 np0005463759.novalocal sudo[112476]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:03 np0005463759.novalocal sudo[112476]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:03 np0005463759.novalocal sudo[112479]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnodedevd.conf Sep 30 23:47:03 np0005463759.novalocal sudo[112479]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:03 np0005463759.novalocal sudo[112479]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:03 np0005463759.novalocal sudo[112482]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtnwfilterd.conf Sep 30 23:47:03 np0005463759.novalocal sudo[112482]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:03 np0005463759.novalocal sudo[112482]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:03 np0005463759.novalocal sudo[112485]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu-lockd.conf Sep 30 23:47:03 np0005463759.novalocal sudo[112485]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:03 np0005463759.novalocal sudo[112485]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:03 np0005463759.novalocal sudo[112488]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./qemu.conf Sep 30 23:47:03 np0005463759.novalocal sudo[112488]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:03 np0005463759.novalocal sudo[112488]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:03 np0005463759.novalocal sudo[112491]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtqemud.conf Sep 30 23:47:03 np0005463759.novalocal sudo[112491]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:03 np0005463759.novalocal sudo[112491]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:03 np0005463759.novalocal sudo[112494]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtsecretd.conf Sep 30 23:47:03 np0005463759.novalocal sudo[112494]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:03 np0005463759.novalocal sudo[112494]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:03 np0005463759.novalocal sudo[112497]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt-admin.conf Sep 30 23:47:03 np0005463759.novalocal sudo[112497]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:03 np0005463759.novalocal sudo[112497]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:03 np0005463759.novalocal sudo[112500]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirt.conf Sep 30 23:47:03 np0005463759.novalocal sudo[112500]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:03 np0005463759.novalocal sudo[112500]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:03 np0005463759.novalocal sudo[112503]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlockd.conf Sep 30 23:47:03 np0005463759.novalocal sudo[112503]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:03 np0005463759.novalocal sudo[112503]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:03 np0005463759.novalocal sudo[112506]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtlogd.conf Sep 30 23:47:03 np0005463759.novalocal sudo[112506]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:03 np0005463759.novalocal sudo[112506]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:03 np0005463759.novalocal sudo[112509]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtproxyd.conf Sep 30 23:47:03 np0005463759.novalocal sudo[112509]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:03 np0005463759.novalocal sudo[112509]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:03 np0005463759.novalocal sudo[112512]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtstoraged.conf Sep 30 23:47:03 np0005463759.novalocal sudo[112512]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:03 np0005463759.novalocal sudo[112512]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:03 np0005463759.novalocal sudo[112515]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./libvirtd.conf Sep 30 23:47:03 np0005463759.novalocal sudo[112515]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:03 np0005463759.novalocal sudo[112515]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:03 np0005463759.novalocal sudo[112518]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt ; USER=root ; COMMAND=/bin/chmod 644 ./virtinterfaced.conf Sep 30 23:47:03 np0005463759.novalocal sudo[112518]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:04 np0005463759.novalocal sudo[112518]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:04 np0005463759.novalocal sudo[112521]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./default.conf Sep 30 23:47:04 np0005463759.novalocal sudo[112521]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:04 np0005463759.novalocal sudo[112521]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:04 np0005463759.novalocal sudo[112524]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./.conf.db.~lock~ Sep 30 23:47:04 np0005463759.novalocal sudo[112524]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:04 np0005463759.novalocal sudo[112524]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:04 np0005463759.novalocal sudo[112527]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./conf.db Sep 30 23:47:04 np0005463759.novalocal sudo[112527]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:04 np0005463759.novalocal sudo[112527]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:04 np0005463759.novalocal sudo[112530]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./system-id.conf Sep 30 23:47:04 np0005463759.novalocal sudo[112530]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:04 np0005463759.novalocal sudo[112530]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:04 np0005463759.novalocal sudo[112533]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-req.pem Sep 30 23:47:04 np0005463759.novalocal sudo[112533]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:04 np0005463759.novalocal sudo[112533]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:04 np0005463759.novalocal sudo[112536]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-cert.pem Sep 30 23:47:04 np0005463759.novalocal sudo[112536]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:04 np0005463759.novalocal sudo[112536]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:04 np0005463759.novalocal sudo[112539]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-req.pem Sep 30 23:47:04 np0005463759.novalocal sudo[112539]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:04 np0005463759.novalocal sudo[112539]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:04 np0005463759.novalocal sudo[112542]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-cert.pem Sep 30 23:47:04 np0005463759.novalocal sudo[112542]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:04 np0005463759.novalocal sudo[112542]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:04 np0005463759.novalocal sudo[112545]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-req.pem Sep 30 23:47:04 np0005463759.novalocal sudo[112545]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:04 np0005463759.novalocal sudo[112545]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:04 np0005463759.novalocal sudo[112548]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-cert.pem Sep 30 23:47:04 np0005463759.novalocal sudo[112548]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:04 np0005463759.novalocal sudo[112548]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:04 np0005463759.novalocal sudo[112551]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnnb-privkey.pem Sep 30 23:47:04 np0005463759.novalocal sudo[112551]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:04 np0005463759.novalocal sudo[112551]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:04 np0005463759.novalocal sudo[112554]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovnsb-privkey.pem Sep 30 23:47:04 np0005463759.novalocal sudo[112554]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:04 np0005463759.novalocal sudo[112554]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:04 np0005463759.novalocal sudo[112557]: root : PWD=/var/log/weirdo-project/logs/etc/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovncontroller-privkey.pem Sep 30 23:47:04 np0005463759.novalocal sudo[112557]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:04 np0005463759.novalocal sudo[112557]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:04 np0005463759.novalocal sudo[112560]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./httpd.conf Sep 30 23:47:04 np0005463759.novalocal sudo[112560]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:04 np0005463759.novalocal sudo[112560]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:04 np0005463759.novalocal sudo[112563]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./magic Sep 30 23:47:04 np0005463759.novalocal sudo[112563]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:04 np0005463759.novalocal sudo[112563]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:04 np0005463759.novalocal sudo[112566]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf ; USER=root ; COMMAND=/bin/chmod 644 ./ports.conf Sep 30 23:47:04 np0005463759.novalocal sudo[112566]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:04 np0005463759.novalocal sudo[112566]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:04 np0005463759.novalocal sudo[112571]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-cinder_wsgi.conf Sep 30 23:47:04 np0005463759.novalocal sudo[112571]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:04 np0005463759.novalocal sudo[112571]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:04 np0005463759.novalocal sudo[112574]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-glance_wsgi.conf Sep 30 23:47:04 np0005463759.novalocal sudo[112574]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:04 np0005463759.novalocal sudo[112574]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:04 np0005463759.novalocal sudo[112577]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-keystone_wsgi.conf Sep 30 23:47:04 np0005463759.novalocal sudo[112577]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:04 np0005463759.novalocal sudo[112577]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:04 np0005463759.novalocal sudo[112580]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-manila_wsgi.conf Sep 30 23:47:04 np0005463759.novalocal sudo[112580]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:04 np0005463759.novalocal sudo[112580]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:04 np0005463759.novalocal sudo[112583]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_api_wsgi.conf Sep 30 23:47:04 np0005463759.novalocal sudo[112583]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:04 np0005463759.novalocal sudo[112583]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:04 np0005463759.novalocal sudo[112586]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-nova_metadata_wsgi.conf Sep 30 23:47:04 np0005463759.novalocal sudo[112586]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:04 np0005463759.novalocal sudo[112586]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:04 np0005463759.novalocal sudo[112589]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-octavia_wsgi.conf Sep 30 23:47:04 np0005463759.novalocal sudo[112589]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:04 np0005463759.novalocal sudo[112589]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:04 np0005463759.novalocal sudo[112592]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./10-placement_wsgi.conf Sep 30 23:47:04 np0005463759.novalocal sudo[112592]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:04 np0005463759.novalocal sudo[112592]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:05 np0005463759.novalocal sudo[112595]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_ssl_vhost.conf Sep 30 23:47:05 np0005463759.novalocal sudo[112595]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:05 np0005463759.novalocal sudo[112595]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:05 np0005463759.novalocal sudo[112598]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./15-horizon_vhost.conf Sep 30 23:47:05 np0005463759.novalocal sudo[112598]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:05 np0005463759.novalocal sudo[112598]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:05 np0005463759.novalocal sudo[112601]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.d ; USER=root ; COMMAND=/bin/chmod 644 ./openstack-dashboard.conf Sep 30 23:47:05 np0005463759.novalocal sudo[112601]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:05 np0005463759.novalocal sudo[112601]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:05 np0005463759.novalocal sudo[112604]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.conf Sep 30 23:47:05 np0005463759.novalocal sudo[112604]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:05 np0005463759.novalocal sudo[112604]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:05 np0005463759.novalocal sudo[112607]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./alias.load Sep 30 23:47:05 np0005463759.novalocal sudo[112607]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:05 np0005463759.novalocal sudo[112607]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:05 np0005463759.novalocal sudo[112610]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_core.load Sep 30 23:47:05 np0005463759.novalocal sudo[112610]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:05 np0005463759.novalocal sudo[112610]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:05 np0005463759.novalocal sudo[112613]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./authz_host.load Sep 30 23:47:05 np0005463759.novalocal sudo[112613]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:05 np0005463759.novalocal sudo[112613]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:05 np0005463759.novalocal sudo[112616]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./filter.load Sep 30 23:47:05 np0005463759.novalocal sudo[112616]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:05 np0005463759.novalocal sudo[112616]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:05 np0005463759.novalocal sudo[112619]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./log_config.load Sep 30 23:47:05 np0005463759.novalocal sudo[112619]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:05 np0005463759.novalocal sudo[112619]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:05 np0005463759.novalocal sudo[112622]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.conf Sep 30 23:47:05 np0005463759.novalocal sudo[112622]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:05 np0005463759.novalocal sudo[112622]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:05 np0005463759.novalocal sudo[112625]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./mime.load Sep 30 23:47:05 np0005463759.novalocal sudo[112625]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:05 np0005463759.novalocal sudo[112625]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:05 np0005463759.novalocal sudo[112628]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.conf Sep 30 23:47:05 np0005463759.novalocal sudo[112628]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:05 np0005463759.novalocal sudo[112628]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:05 np0005463759.novalocal sudo[112631]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./prefork.load Sep 30 23:47:05 np0005463759.novalocal sudo[112631]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:05 np0005463759.novalocal sudo[112631]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:05 np0005463759.novalocal sudo[112634]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.conf Sep 30 23:47:05 np0005463759.novalocal sudo[112634]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:05 np0005463759.novalocal sudo[112634]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:05 np0005463759.novalocal sudo[112637]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./setenvif.load Sep 30 23:47:05 np0005463759.novalocal sudo[112637]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:05 np0005463759.novalocal sudo[112637]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:05 np0005463759.novalocal sudo[112640]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./socache_shmcb.load Sep 30 23:47:05 np0005463759.novalocal sudo[112640]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:05 np0005463759.novalocal sudo[112640]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:05 np0005463759.novalocal sudo[112643]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.conf Sep 30 23:47:05 np0005463759.novalocal sudo[112643]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:05 np0005463759.novalocal sudo[112643]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:05 np0005463759.novalocal sudo[112646]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./ssl.load Sep 30 23:47:05 np0005463759.novalocal sudo[112646]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:05 np0005463759.novalocal sudo[112646]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:05 np0005463759.novalocal sudo[112649]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./systemd.load Sep 30 23:47:05 np0005463759.novalocal sudo[112649]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:05 np0005463759.novalocal sudo[112649]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:05 np0005463759.novalocal sudo[112652]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./unixd.load Sep 30 23:47:05 np0005463759.novalocal sudo[112652]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:05 np0005463759.novalocal sudo[112652]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:05 np0005463759.novalocal sudo[112655]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.conf Sep 30 23:47:05 np0005463759.novalocal sudo[112655]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:05 np0005463759.novalocal sudo[112655]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:05 np0005463759.novalocal sudo[112658]: root : PWD=/var/log/weirdo-project/logs/etc/httpd/conf.modules.d ; USER=root ; COMMAND=/bin/chmod 644 ./wsgi.load Sep 30 23:47:05 np0005463759.novalocal sudo[112658]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:05 np0005463759.novalocal sudo[112658]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:05 np0005463759.novalocal sudo[112661]: root : PWD=/var/log/weirdo-project/logs/etc/redis/ssl/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005463759.novalocal.pem Sep 30 23:47:05 np0005463759.novalocal sudo[112661]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:05 np0005463759.novalocal sudo[112661]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:05 np0005463759.novalocal sudo[112664]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.conf.puppet Sep 30 23:47:05 np0005463759.novalocal sudo[112664]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:05 np0005463759.novalocal sudo[112664]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:05 np0005463759.novalocal sudo[112667]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.conf Sep 30 23:47:05 np0005463759.novalocal sudo[112667]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:05 np0005463759.novalocal sudo[112667]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:06 np0005463759.novalocal sudo[112670]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.conf Sep 30 23:47:06 np0005463759.novalocal sudo[112670]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:06 np0005463759.novalocal sudo[112670]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:06 np0005463759.novalocal sudo[112673]: root : PWD=/var/log/weirdo-project/logs/etc/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.conf.puppet Sep 30 23:47:06 np0005463759.novalocal sudo[112673]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:06 np0005463759.novalocal sudo[112673]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:06 np0005463759.novalocal sudo[112676]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./.secret_key_store Sep 30 23:47:06 np0005463759.novalocal sudo[112676]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:06 np0005463759.novalocal sudo[112676]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:06 np0005463759.novalocal sudo[112679]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_policy.yaml.txt Sep 30 23:47:06 np0005463759.novalocal sudo[112679]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:06 np0005463759.novalocal sudo[112679]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:06 np0005463759.novalocal sudo[112682]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./README.txt Sep 30 23:47:06 np0005463759.novalocal sudo[112682]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:06 np0005463759.novalocal sudo[112682]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:06 np0005463759.novalocal sudo[112685]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.yaml Sep 30 23:47:06 np0005463759.novalocal sudo[112685]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:06 np0005463759.novalocal sudo[112685]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:06 np0005463759.novalocal sudo[112688]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./glance.yaml Sep 30 23:47:06 np0005463759.novalocal sudo[112688]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:06 np0005463759.novalocal sudo[112688]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:06 np0005463759.novalocal sudo[112691]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.yaml Sep 30 23:47:06 np0005463759.novalocal sudo[112691]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:06 np0005463759.novalocal sudo[112691]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:06 np0005463759.novalocal sudo[112694]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.yaml Sep 30 23:47:06 np0005463759.novalocal sudo[112694]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:06 np0005463759.novalocal sudo[112694]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:06 np0005463759.novalocal sudo[112697]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./nova.yaml Sep 30 23:47:06 np0005463759.novalocal sudo[112697]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:06 np0005463759.novalocal sudo[112697]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:06 np0005463759.novalocal sudo[112700]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt ; USER=root ; COMMAND=/bin/chmod 644 ./manila.yaml Sep 30 23:47:06 np0005463759.novalocal sudo[112700]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:06 np0005463759.novalocal sudo[112700]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:06 np0005463759.novalocal sudo[112703]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./glance_policy.yaml.txt Sep 30 23:47:06 np0005463759.novalocal sudo[112703]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:06 np0005463759.novalocal sudo[112703]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:06 np0005463759.novalocal sudo[112706]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_policy.yaml.txt Sep 30 23:47:06 np0005463759.novalocal sudo[112706]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:06 np0005463759.novalocal sudo[112706]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:06 np0005463759.novalocal sudo[112709]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./local_settings.txt Sep 30 23:47:06 np0005463759.novalocal sudo[112709]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:06 np0005463759.novalocal sudo[112709]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:06 np0005463759.novalocal sudo[112712]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_90_manila_shares.py Sep 30 23:47:06 np0005463759.novalocal sudo[112712]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:06 np0005463759.novalocal sudo[112712]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:06 np0005463759.novalocal sudo[112715]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_10_set_custom_theme.py.example Sep 30 23:47:06 np0005463759.novalocal sudo[112715]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:06 np0005463759.novalocal sudo[112715]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:06 np0005463759.novalocal sudo[112718]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_11_toggle_angular_features.py.example Sep 30 23:47:06 np0005463759.novalocal sudo[112718]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:06 np0005463759.novalocal sudo[112718]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:06 np0005463759.novalocal sudo[112721]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_2010_integration_tests_deprecated.py.example Sep 30 23:47:06 np0005463759.novalocal sudo[112721]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:06 np0005463759.novalocal sudo[112721]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:06 np0005463759.novalocal sudo[112724]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_20_integration_tests_scaffolds.py.example Sep 30 23:47:06 np0005463759.novalocal sudo[112724]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:06 np0005463759.novalocal sudo[112724]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:06 np0005463759.novalocal sudo[112727]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./_9030_profiler_settings.py.example Sep 30 23:47:06 np0005463759.novalocal sudo[112727]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:06 np0005463759.novalocal sudo[112727]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:06 np0005463759.novalocal sudo[112730]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./manila_policy.yaml.txt Sep 30 23:47:06 np0005463759.novalocal sudo[112730]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:06 np0005463759.novalocal sudo[112730]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:06 np0005463759.novalocal sudo[112733]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./neutron_policy.yaml.txt Sep 30 23:47:06 np0005463759.novalocal sudo[112733]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:06 np0005463759.novalocal sudo[112733]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:06 np0005463759.novalocal sudo[112736]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt ; USER=root ; COMMAND=/bin/chmod 644 ./api-extensions.yaml Sep 30 23:47:06 np0005463759.novalocal sudo[112736]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:06 np0005463759.novalocal sudo[112736]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:06 np0005463759.novalocal sudo[112739]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard ; USER=root ; COMMAND=/bin/chmod 644 ./nova_policy.yaml.txt Sep 30 23:47:06 np0005463759.novalocal sudo[112739]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:06 np0005463759.novalocal sudo[112739]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:06 np0005463759.novalocal sudo[112742]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private ; USER=root ; COMMAND=/bin/chmod 644 ./np0005463759.novalocal.pem Sep 30 23:47:07 np0005463759.novalocal sudo[112742]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:07 np0005463759.novalocal sudo[112742]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:07 np0005463759.novalocal sudo[112745]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./rsyncd.conf Sep 30 23:47:07 np0005463759.novalocal sudo[112745]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:07 np0005463759.novalocal sudo[112745]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:07 np0005463759.novalocal sudo[112748]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos-addons.repo Sep 30 23:47:07 np0005463759.novalocal sudo[112748]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:07 np0005463759.novalocal sudo[112748]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:07 np0005463759.novalocal sudo[112751]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./centos.repo Sep 30 23:47:07 np0005463759.novalocal sudo[112751]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:07 np0005463759.novalocal sudo[112751]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:07 np0005463759.novalocal sudo[112754]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean-deps.repo Sep 30 23:47:07 np0005463759.novalocal sudo[112754]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:07 np0005463759.novalocal sudo[112754]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:07 np0005463759.novalocal sudo[112757]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./delorean.repo Sep 30 23:47:07 np0005463759.novalocal sudo[112757]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:07 np0005463759.novalocal sudo[112757]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:07 np0005463759.novalocal sudo[112760]: root : PWD=/var/log/weirdo-project/logs/etc/yum.repos.d ; USER=root ; COMMAND=/bin/chmod 644 ./redhat.repo Sep 30 23:47:07 np0005463759.novalocal sudo[112760]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:07 np0005463759.novalocal sudo[112760]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:07 np0005463759.novalocal sudo[112763]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./passwd Sep 30 23:47:07 np0005463759.novalocal sudo[112763]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:07 np0005463759.novalocal sudo[112763]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:07 np0005463759.novalocal sudo[112766]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./group Sep 30 23:47:07 np0005463759.novalocal sudo[112766]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:07 np0005463759.novalocal sudo[112766]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:07 np0005463759.novalocal sudo[112769]: root : PWD=/var/log/weirdo-project/logs/etc/openstack/puppet ; USER=root ; COMMAND=/bin/chmod 644 ./admin-clouds.yaml Sep 30 23:47:07 np0005463759.novalocal sudo[112769]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:07 np0005463759.novalocal sudo[112769]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:07 np0005463759.novalocal sudo[112772]: root : PWD=/var/log/weirdo-project/logs/etc ; USER=root ; COMMAND=/bin/chmod 644 ./fstab Sep 30 23:47:07 np0005463759.novalocal sudo[112772]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:07 np0005463759.novalocal sudo[112772]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:07 np0005463759.novalocal sudo[112775]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-manage.log Sep 30 23:47:07 np0005463759.novalocal sudo[112775]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:07 np0005463759.novalocal sudo[112775]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:07 np0005463759.novalocal sudo[112778]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./cinder-api.log Sep 30 23:47:07 np0005463759.novalocal sudo[112778]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:07 np0005463759.novalocal sudo[112778]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:07 np0005463759.novalocal sudo[112781]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Sep 30 23:47:07 np0005463759.novalocal sudo[112781]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:07 np0005463759.novalocal sudo[112781]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:07 np0005463759.novalocal sudo[112784]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./volume.log Sep 30 23:47:07 np0005463759.novalocal sudo[112784]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:07 np0005463759.novalocal sudo[112784]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:07 np0005463759.novalocal sudo[112787]: root : PWD=/var/log/weirdo-project/logs/cinder ; USER=root ; COMMAND=/bin/chmod 644 ./backup.log Sep 30 23:47:07 np0005463759.novalocal sudo[112787]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:07 np0005463759.novalocal sudo[112787]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:07 np0005463759.novalocal sudo[112790]: root : PWD=/var/log/weirdo-project/logs/glance ; USER=root ; COMMAND=/bin/chmod 644 ./api.log Sep 30 23:47:07 np0005463759.novalocal sudo[112790]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:07 np0005463759.novalocal sudo[112790]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:07 np0005463759.novalocal sudo[112793]: root : PWD=/var/log/weirdo-project/logs/glance ; USER=root ; COMMAND=/bin/chmod 644 ./cache.log Sep 30 23:47:07 np0005463759.novalocal sudo[112793]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:07 np0005463759.novalocal sudo[112793]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:07 np0005463759.novalocal sudo[112796]: root : PWD=/var/log/weirdo-project/logs/horizon ; USER=root ; COMMAND=/bin/chmod 644 ./horizon.log Sep 30 23:47:07 np0005463759.novalocal sudo[112796]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:07 np0005463759.novalocal sudo[112796]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:07 np0005463759.novalocal sudo[112799]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.log Sep 30 23:47:07 np0005463759.novalocal sudo[112799]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:07 np0005463759.novalocal sudo[112799]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:07 np0005463759.novalocal sudo[112802]: root : PWD=/var/log/weirdo-project/logs/keystone ; USER=root ; COMMAND=/bin/chmod 644 ./keystone-manage.log Sep 30 23:47:07 np0005463759.novalocal sudo[112802]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:07 np0005463759.novalocal sudo[112802]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:07 np0005463759.novalocal sudo[112805]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila-manage.log Sep 30 23:47:07 np0005463759.novalocal sudo[112805]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:07 np0005463759.novalocal sudo[112805]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:07 np0005463759.novalocal sudo[112808]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./scheduler.log Sep 30 23:47:07 np0005463759.novalocal sudo[112808]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:07 np0005463759.novalocal sudo[112808]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:07 np0005463759.novalocal sudo[112811]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./share.log Sep 30 23:47:07 np0005463759.novalocal sudo[112811]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:08 np0005463759.novalocal sudo[112811]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:08 np0005463759.novalocal sudo[112814]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Sep 30 23:47:08 np0005463759.novalocal sudo[112814]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:08 np0005463759.novalocal sudo[112814]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:08 np0005463759.novalocal sudo[112817]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./data.log Sep 30 23:47:08 np0005463759.novalocal sudo[112817]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:08 np0005463759.novalocal sudo[112817]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:08 np0005463759.novalocal sudo[112820]: root : PWD=/var/log/weirdo-project/logs/manila ; USER=root ; COMMAND=/bin/chmod 644 ./manila-api.log Sep 30 23:47:08 np0005463759.novalocal sudo[112820]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:08 np0005463759.novalocal sudo[112820]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:08 np0005463759.novalocal sudo[112823]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./server.log Sep 30 23:47:08 np0005463759.novalocal sudo[112823]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:08 np0005463759.novalocal sudo[112823]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:08 np0005463759.novalocal sudo[112826]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./neutron-ovn-agent.log Sep 30 23:47:08 np0005463759.novalocal sudo[112826]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:08 np0005463759.novalocal sudo[112826]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:08 np0005463759.novalocal sudo[112829]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-vpn-agent.log Sep 30 23:47:08 np0005463759.novalocal sudo[112829]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:08 np0005463759.novalocal sudo[112829]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:08 np0005463759.novalocal sudo[112832]: root : PWD=/var/log/weirdo-project/logs/neutron ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Sep 30 23:47:08 np0005463759.novalocal sudo[112832]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:08 np0005463759.novalocal sudo[112832]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:08 np0005463759.novalocal sudo[112835]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-manage.log Sep 30 23:47:08 np0005463759.novalocal sudo[112835]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:08 np0005463759.novalocal sudo[112835]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:08 np0005463759.novalocal sudo[112838]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-novncproxy.log Sep 30 23:47:08 np0005463759.novalocal sudo[112838]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:08 np0005463759.novalocal sudo[112838]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:08 np0005463759.novalocal sudo[112841]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-conductor.log Sep 30 23:47:08 np0005463759.novalocal sudo[112841]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:08 np0005463759.novalocal sudo[112841]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:08 np0005463759.novalocal sudo[112844]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-compute.log Sep 30 23:47:08 np0005463759.novalocal sudo[112844]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:08 np0005463759.novalocal sudo[112844]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:08 np0005463759.novalocal sudo[112847]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-scheduler.log Sep 30 23:47:08 np0005463759.novalocal sudo[112847]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:08 np0005463759.novalocal sudo[112847]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:08 np0005463759.novalocal sudo[112850]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-api.log Sep 30 23:47:08 np0005463759.novalocal sudo[112850]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:08 np0005463759.novalocal sudo[112850]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:08 np0005463759.novalocal sudo[112853]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./privsep-helper.log Sep 30 23:47:08 np0005463759.novalocal sudo[112853]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:08 np0005463759.novalocal sudo[112853]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:08 np0005463759.novalocal sudo[112856]: root : PWD=/var/log/weirdo-project/logs/nova ; USER=root ; COMMAND=/bin/chmod 644 ./nova-metadata-api.log Sep 30 23:47:08 np0005463759.novalocal sudo[112856]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:08 np0005463759.novalocal sudo[112856]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:08 np0005463759.novalocal sudo[112859]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./health-manager.log Sep 30 23:47:08 np0005463759.novalocal sudo[112859]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:08 np0005463759.novalocal sudo[112859]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:08 np0005463759.novalocal sudo[112862]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./housekeeping.log Sep 30 23:47:08 np0005463759.novalocal sudo[112862]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:08 np0005463759.novalocal sudo[112862]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:08 np0005463759.novalocal sudo[112865]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./driver-agent.log Sep 30 23:47:08 np0005463759.novalocal sudo[112865]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:08 np0005463759.novalocal sudo[112865]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:08 np0005463759.novalocal sudo[112868]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./worker.log Sep 30 23:47:08 np0005463759.novalocal sudo[112868]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:08 np0005463759.novalocal sudo[112868]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:08 np0005463759.novalocal sudo[112871]: root : PWD=/var/log/weirdo-project/logs/octavia ; USER=root ; COMMAND=/bin/chmod 644 ./app.log Sep 30 23:47:08 np0005463759.novalocal sudo[112871]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:08 np0005463759.novalocal sudo[112871]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:08 np0005463759.novalocal sudo[112874]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-nb.log Sep 30 23:47:08 np0005463759.novalocal sudo[112874]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:08 np0005463759.novalocal sudo[112874]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:08 np0005463759.novalocal sudo[112877]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server-sb.log Sep 30 23:47:08 np0005463759.novalocal sudo[112877]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:08 np0005463759.novalocal sudo[112877]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:08 np0005463759.novalocal sudo[112880]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-northd.log Sep 30 23:47:08 np0005463759.novalocal sudo[112880]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:08 np0005463759.novalocal sudo[112880]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:08 np0005463759.novalocal sudo[112883]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-controller.log Sep 30 23:47:08 np0005463759.novalocal sudo[112883]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:08 np0005463759.novalocal sudo[112883]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:09 np0005463759.novalocal sudo[112886]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_show.txt Sep 30 23:47:09 np0005463759.novalocal sudo[112886]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:09 np0005463759.novalocal sudo[112886]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:09 np0005463759.novalocal sudo[112889]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-connection.txt Sep 30 23:47:09 np0005463759.novalocal sudo[112889]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:09 np0005463759.novalocal sudo[112889]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:09 np0005463759.novalocal sudo[112892]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_get-ssl.txt Sep 30 23:47:09 np0005463759.novalocal sudo[112892]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:09 np0005463759.novalocal sudo[112892]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:09 np0005463759.novalocal sudo[112895]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_show.txt Sep 30 23:47:09 np0005463759.novalocal sudo[112895]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:09 np0005463759.novalocal sudo[112895]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:09 np0005463759.novalocal sudo[112898]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-connection.txt Sep 30 23:47:09 np0005463759.novalocal sudo[112898]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:09 np0005463759.novalocal sudo[112898]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:09 np0005463759.novalocal sudo[112901]: root : PWD=/var/log/weirdo-project/logs/ovn ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_get-ssl.txt Sep 30 23:47:09 np0005463759.novalocal sudo[112901]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:09 np0005463759.novalocal sudo[112901]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:09 np0005463759.novalocal sudo[112904]: root : PWD=/var/log/weirdo-project/logs/placement ; USER=root ; COMMAND=/bin/chmod 644 ./placement.log Sep 30 23:47:09 np0005463759.novalocal sudo[112904]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:09 np0005463759.novalocal sudo[112904]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:09 np0005463759.novalocal sudo[112907]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./puppet.conf Sep 30 23:47:09 np0005463759.novalocal sudo[112907]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:09 np0005463759.novalocal sudo[112907]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:09 np0005463759.novalocal sudo[112910]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./syslog.txt Sep 30 23:47:09 np0005463759.novalocal sudo[112910]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:09 np0005463759.novalocal sudo[112910]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:09 np0005463759.novalocal sudo[112913]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6.log Sep 30 23:47:09 np0005463759.novalocal sudo[112913]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:09 np0005463759.novalocal sudo[112913]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:09 np0005463759.novalocal sudo[112916]: root : PWD=/var/log/weirdo-project/logs/rabbitmq ; USER=root ; COMMAND=/bin/chmod 644 ./rabbit@localhost6_upgrade.log Sep 30 23:47:09 np0005463759.novalocal sudo[112916]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:09 np0005463759.novalocal sudo[112916]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:09 np0005463759.novalocal sudo[112919]: root : PWD=/var/log/weirdo-project/logs/mariadb ; USER=root ; COMMAND=/bin/chmod 644 ./mariadb.log Sep 30 23:47:09 np0005463759.novalocal sudo[112919]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:09 np0005463759.novalocal sudo[112919]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:09 np0005463759.novalocal sudo[112922]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.log Sep 30 23:47:09 np0005463759.novalocal sudo[112922]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:09 np0005463759.novalocal sudo[112922]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:09 np0005463759.novalocal sudo[112925]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./testrepository.subunit Sep 30 23:47:09 np0005463759.novalocal sudo[112925]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:09 np0005463759.novalocal sudo[112925]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:09 np0005463759.novalocal sudo[112928]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./testr_results.html Sep 30 23:47:09 np0005463759.novalocal sudo[112928]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:09 np0005463759.novalocal sudo[112928]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:09 np0005463759.novalocal sudo[112931]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./dstat.log Sep 30 23:47:09 np0005463759.novalocal sudo[112931]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:09 np0005463759.novalocal sudo[112931]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:09 np0005463759.novalocal sudo[112934]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iostat.log Sep 30 23:47:09 np0005463759.novalocal sudo[112934]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:09 np0005463759.novalocal sudo[112934]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:09 np0005463759.novalocal sudo[112937]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iotop.log Sep 30 23:47:09 np0005463759.novalocal sudo[112937]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:09 np0005463759.novalocal sudo[112937]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:09 np0005463759.novalocal sudo[112940]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000003.log Sep 30 23:47:09 np0005463759.novalocal sudo[112940]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:09 np0005463759.novalocal sudo[112940]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:09 np0005463759.novalocal sudo[112943]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000004.log Sep 30 23:47:09 np0005463759.novalocal sudo[112943]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:09 np0005463759.novalocal sudo[112943]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:09 np0005463759.novalocal sudo[112946]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000005.log Sep 30 23:47:09 np0005463759.novalocal sudo[112946]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:09 np0005463759.novalocal sudo[112946]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:09 np0005463759.novalocal sudo[112949]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000008.log Sep 30 23:47:09 np0005463759.novalocal sudo[112949]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:09 np0005463759.novalocal sudo[112949]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:09 np0005463759.novalocal sudo[112952]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000001.log Sep 30 23:47:09 np0005463759.novalocal sudo[112952]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:09 np0005463759.novalocal sudo[112952]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[112955]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000002.log Sep 30 23:47:10 np0005463759.novalocal sudo[112955]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[112955]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[112958]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000009.log Sep 30 23:47:10 np0005463759.novalocal sudo[112958]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[112958]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[112961]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-0000000a.log Sep 30 23:47:10 np0005463759.novalocal sudo[112961]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[112961]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[112964]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000007.log Sep 30 23:47:10 np0005463759.novalocal sudo[112964]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[112964]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[112967]: root : PWD=/var/log/weirdo-project/logs/libvirt/qemu ; USER=root ; COMMAND=/bin/chmod 644 ./instance-00000006.log Sep 30 23:47:10 np0005463759.novalocal sudo[112967]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[112967]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[112970]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./virsh-net-list.txt Sep 30 23:47:10 np0005463759.novalocal sudo[112970]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[112970]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[112973]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vswitchd.log Sep 30 23:47:10 np0005463759.novalocal sudo[112973]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[112973]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[112976]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-pki.log Sep 30 23:47:10 np0005463759.novalocal sudo[112976]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[112976]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[112979]: root : PWD=/var/log/weirdo-project/logs/openvswitch ; USER=root ; COMMAND=/bin/chmod 644 ./ovsdb-server.log Sep 30 23:47:10 np0005463759.novalocal sudo[112979]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[112979]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[112982]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./zuul Sep 30 23:47:10 np0005463759.novalocal sudo[112982]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[112982]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[112985]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./90-cloud-init-users Sep 30 23:47:10 np0005463759.novalocal sudo[112985]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[112985]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[112988]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./neutron Sep 30 23:47:10 np0005463759.novalocal sudo[112988]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[112988]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[112991]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./glance Sep 30 23:47:10 np0005463759.novalocal sudo[112991]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[112991]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[112994]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./manila Sep 30 23:47:10 np0005463759.novalocal sudo[112994]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[112994]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[112997]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./nova Sep 30 23:47:10 np0005463759.novalocal sudo[112997]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[112997]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[113000]: root : PWD=/var/log/weirdo-project/logs/sudoers.d ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Sep 30 23:47:10 np0005463759.novalocal sudo[113000]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[113000]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[113003]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./sudoers.txt Sep 30 23:47:10 np0005463759.novalocal sudo[113003]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[113003]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[113006]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./error_log Sep 30 23:47:10 np0005463759.novalocal sudo[113006]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[113006]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[113009]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_error.log Sep 30 23:47:10 np0005463759.novalocal sudo[113009]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[113009]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[113012]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_error.log Sep 30 23:47:10 np0005463759.novalocal sudo[113012]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[113012]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[113015]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_error_ssl.log Sep 30 23:47:10 np0005463759.novalocal sudo[113015]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[113015]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[113018]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_error_ssl.log Sep 30 23:47:10 np0005463759.novalocal sudo[113018]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[113018]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[113021]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_error_ssl.log Sep 30 23:47:10 np0005463759.novalocal sudo[113021]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[113021]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[113024]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_error_ssl.log Sep 30 23:47:10 np0005463759.novalocal sudo[113024]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[113024]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[113027]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_error_ssl.log Sep 30 23:47:10 np0005463759.novalocal sudo[113027]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[113027]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[113030]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_error_ssl.log Sep 30 23:47:10 np0005463759.novalocal sudo[113030]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[113030]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:10 np0005463759.novalocal sudo[113033]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./glance_wsgi_error_ssl.log Sep 30 23:47:10 np0005463759.novalocal sudo[113033]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:10 np0005463759.novalocal sudo[113033]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:11 np0005463759.novalocal sudo[113036]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_error_ssl.log Sep 30 23:47:11 np0005463759.novalocal sudo[113036]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:11 np0005463759.novalocal sudo[113036]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:11 np0005463759.novalocal sudo[113039]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_access.log Sep 30 23:47:11 np0005463759.novalocal sudo[113039]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:11 np0005463759.novalocal sudo[113039]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:11 np0005463759.novalocal sudo[113042]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./horizon_ssl_access.log Sep 30 23:47:11 np0005463759.novalocal sudo[113042]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:11 np0005463759.novalocal sudo[113042]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:11 np0005463759.novalocal sudo[113045]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./placement_wsgi_access_ssl.log Sep 30 23:47:11 np0005463759.novalocal sudo[113045]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:11 np0005463759.novalocal sudo[113045]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:11 np0005463759.novalocal sudo[113048]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./octavia_wsgi_access_ssl.log Sep 30 23:47:11 np0005463759.novalocal sudo[113048]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:11 np0005463759.novalocal sudo[113048]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:11 np0005463759.novalocal sudo[113051]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_metadata_wsgi_access_ssl.log Sep 30 23:47:11 np0005463759.novalocal sudo[113051]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:11 np0005463759.novalocal sudo[113051]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:11 np0005463759.novalocal sudo[113052]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C vgs --noheadings --unit=g -o name,size,free,lv_count,uuid --separator : --nosuffix cinder-volumes Sep 30 23:47:11 np0005463759.novalocal sudo[113055]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./nova_api_wsgi_access_ssl.log Sep 30 23:47:11 np0005463759.novalocal systemd[1]: Started Session c300 of User root. Sep 30 23:47:11 np0005463759.novalocal sudo[113052]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:47:11 np0005463759.novalocal sudo[113055]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:11 np0005463759.novalocal sudo[113055]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:11 np0005463759.novalocal sudo[113060]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./manila_wsgi_access_ssl.log Sep 30 23:47:11 np0005463759.novalocal sudo[113060]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:11 np0005463759.novalocal sudo[113060]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:11 np0005463759.novalocal sudo[113063]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./keystone_wsgi_access_ssl.log Sep 30 23:47:11 np0005463759.novalocal sudo[113063]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:11 np0005463759.novalocal sudo[113063]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:11 np0005463759.novalocal sudo[113066]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./glance_wsgi_access_ssl.log Sep 30 23:47:11 np0005463759.novalocal sudo[113066]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:11 np0005463759.novalocal sudo[113066]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:11 np0005463759.novalocal sudo[113069]: root : PWD=/var/log/weirdo-project/logs/apache ; USER=root ; COMMAND=/bin/chmod 644 ./cinder_wsgi_access_ssl.log Sep 30 23:47:11 np0005463759.novalocal sudo[113069]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:11 np0005463759.novalocal sudo[113069]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:11 np0005463759.novalocal sudo[113072]: root : PWD=/var/log/weirdo-project/logs/redis ; USER=root ; COMMAND=/bin/chmod 644 ./redis.log Sep 30 23:47:11 np0005463759.novalocal sudo[113072]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:11 np0005463759.novalocal sudo[113072]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:11 np0005463759.novalocal sudo[113075]: root : PWD=/var/log/weirdo-project/logs/redis ; USER=root ; COMMAND=/bin/chmod 644 ./sentinel.log Sep 30 23:47:11 np0005463759.novalocal sudo[113075]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:11 np0005463759.novalocal sudo[113075]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:11 np0005463759.novalocal sudo[113079]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./audit.log.txt Sep 30 23:47:11 np0005463759.novalocal sudo[113079]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:11 np0005463759.novalocal sudo[113079]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:11 np0005463759.novalocal sudo[113082]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./manila Sep 30 23:47:11 np0005463759.novalocal sudo[113082]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:11 np0005463759.novalocal sudo[113082]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:11 np0005463759.novalocal sudo[113085]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./cinder Sep 30 23:47:11 np0005463759.novalocal sudo[113052]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:11 np0005463759.novalocal sudo[113085]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:11 np0005463759.novalocal systemd[1]: session-c300.scope: Deactivated successfully. Sep 30 23:47:11 np0005463759.novalocal sudo[113085]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:11 np0005463759.novalocal sudo[113088]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./keystone Sep 30 23:47:11 np0005463759.novalocal sudo[113088]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:11 np0005463759.novalocal sudo[113088]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:11 np0005463759.novalocal sudo[113089]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:47:11 np0005463759.novalocal sudo[113092]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./glance Sep 30 23:47:11 np0005463759.novalocal sudo[113092]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:11 np0005463759.novalocal sudo[113092]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:11 np0005463759.novalocal systemd[1]: Started Session c301 of User root. Sep 30 23:47:11 np0005463759.novalocal sudo[113089]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:47:11 np0005463759.novalocal sudo[113096]: root : PWD=/var/log/weirdo-project/logs/cron ; USER=root ; COMMAND=/bin/chmod 644 ./nova Sep 30 23:47:11 np0005463759.novalocal sudo[113096]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:11 np0005463759.novalocal sudo[113096]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:11 np0005463759.novalocal sudo[113100]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./tempest.conf.txt Sep 30 23:47:11 np0005463759.novalocal sudo[113100]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:11 np0005463759.novalocal sudo[113100]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:11 np0005463759.novalocal sudo[113103]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./rpm-qa.txt Sep 30 23:47:11 np0005463759.novalocal sudo[113103]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:11 np0005463759.novalocal sudo[113103]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:11 np0005463759.novalocal sudo[113106]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./repolist.txt Sep 30 23:47:11 np0005463759.novalocal sudo[113106]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:11 np0005463759.novalocal sudo[113106]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:12 np0005463759.novalocal sudo[113110]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./installed-packages.txt Sep 30 23:47:12 np0005463759.novalocal sudo[113110]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:12 np0005463759.novalocal sudo[113110]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:12 np0005463759.novalocal sudo[113113]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./modulelist.txt Sep 30 23:47:12 np0005463759.novalocal sudo[113113]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:12 np0005463759.novalocal sudo[113113]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:12 np0005463759.novalocal sudo[113089]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:12 np0005463759.novalocal sudo[113116]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.log Sep 30 23:47:12 np0005463759.novalocal systemd[1]: session-c301.scope: Deactivated successfully. Sep 30 23:47:12 np0005463759.novalocal sudo[113116]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:12 np0005463759.novalocal sudo[113116]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:12 np0005463759.novalocal sudo[113120]: root : PWD=/var/log/weirdo-project/logs/dnf ; USER=root ; COMMAND=/bin/chmod 644 ./dnf.rpm.log Sep 30 23:47:12 np0005463759.novalocal sudo[113120]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:12 np0005463759.novalocal sudo[113118]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o size,data_percent --separator : --nosuffix /dev/cinder-volumes/cinder-volumes-pool Sep 30 23:47:12 np0005463759.novalocal sudo[113120]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:12 np0005463759.novalocal systemd[1]: Started Session c302 of User root. Sep 30 23:47:12 np0005463759.novalocal sudo[113118]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:47:12 np0005463759.novalocal sudo[113124]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./gem-list.txt Sep 30 23:47:12 np0005463759.novalocal sudo[113124]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:12 np0005463759.novalocal sudo[113124]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:12 np0005463759.novalocal sudo[113128]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./df.txt Sep 30 23:47:12 np0005463759.novalocal sudo[113128]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:12 np0005463759.novalocal sudo[113128]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:12 np0005463759.novalocal sudo[113131]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./free.txt Sep 30 23:47:12 np0005463759.novalocal sudo[113131]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:12 np0005463759.novalocal sudo[113131]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:12 np0005463759.novalocal sudo[113134]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lsmod.txt Sep 30 23:47:12 np0005463759.novalocal sudo[113134]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:12 np0005463759.novalocal sudo[113134]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:12 np0005463759.novalocal sudo[113137]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./cpuinfo.txt Sep 30 23:47:12 np0005463759.novalocal sudo[113137]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:12 np0005463759.novalocal sudo[113137]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:12 np0005463759.novalocal sudo[113140]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ps.txt Sep 30 23:47:12 np0005463759.novalocal sudo[113140]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:12 np0005463759.novalocal sudo[113140]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:12 np0005463759.novalocal sudo[113143]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ip_-d_address.txt Sep 30 23:47:12 np0005463759.novalocal sudo[113143]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:12 np0005463759.novalocal sudo[113143]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:12 np0005463759.novalocal sudo[113147]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./brctl_show.txt Sep 30 23:47:12 np0005463759.novalocal sudo[113147]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:12 np0005463759.novalocal sudo[113147]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:12 np0005463759.novalocal sudo[113150]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vsctl_show.txt Sep 30 23:47:12 np0005463759.novalocal sudo[113150]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:12 np0005463759.novalocal sudo[113118]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:12 np0005463759.novalocal systemd[1]: session-c302.scope: Deactivated successfully. Sep 30 23:47:12 np0005463759.novalocal sudo[113150]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:12 np0005463759.novalocal sudo[113153]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovs-vsctl_list_open_vswitch.txt Sep 30 23:47:12 np0005463759.novalocal sudo[113153]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:12 np0005463759.novalocal sudo[113153]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:12 np0005463759.novalocal sudo[113154]: cinder : PWD=/ ; USER=root ; COMMAND=/usr/bin/cinder-rootwrap /etc/cinder/rootwrap.conf env LC_ALL=C lvs --noheadings --unit=g -o vg_name,name,size --nosuffix --readonly cinder-volumes Sep 30 23:47:12 np0005463759.novalocal systemd[1]: Started Session c303 of User root. Sep 30 23:47:12 np0005463759.novalocal sudo[113154]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=165) Sep 30 23:47:12 np0005463759.novalocal sudo[113158]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-nbctl_show.txt Sep 30 23:47:12 np0005463759.novalocal sudo[113158]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:12 np0005463759.novalocal sudo[113158]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:12 np0005463759.novalocal sudo[113162]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./ovn-sbctl_show.txt Sep 30 23:47:12 np0005463759.novalocal sudo[113162]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:12 np0005463759.novalocal sudo[113162]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:12 np0005463759.novalocal sudo[113165]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./netstat.txt Sep 30 23:47:12 np0005463759.novalocal sudo[113165]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:12 np0005463759.novalocal sudo[113165]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:12 np0005463759.novalocal sudo[113168]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./systemctl.txt Sep 30 23:47:12 np0005463759.novalocal sudo[113168]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:12 np0005463759.novalocal sudo[113168]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:12 np0005463759.novalocal sudo[113171]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./iptables.txt Sep 30 23:47:12 np0005463759.novalocal sudo[113171]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:12 np0005463759.novalocal sudo[113171]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:12 np0005463759.novalocal sudo[113174]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./mount.txt Sep 30 23:47:12 np0005463759.novalocal sudo[113174]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:12 np0005463759.novalocal sudo[113174]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:12 np0005463759.novalocal sudo[113177]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./losetup_-al.txt Sep 30 23:47:12 np0005463759.novalocal sudo[113177]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:12 np0005463759.novalocal sudo[113177]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:12 np0005463759.novalocal sudo[113180]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./lvm.txt Sep 30 23:47:12 np0005463759.novalocal sudo[113180]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:12 np0005463759.novalocal sudo[113180]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:12 np0005463759.novalocal sudo[113184]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./semanage-boolean-list.txt Sep 30 23:47:12 np0005463759.novalocal sudo[113184]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:12 np0005463759.novalocal sudo[113184]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:12 np0005463759.novalocal sudo[113187]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./keystone.txt Sep 30 23:47:12 np0005463759.novalocal sudo[113187]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:13 np0005463759.novalocal sudo[113187]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:13 np0005463759.novalocal sudo[113190]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./nova.txt Sep 30 23:47:13 np0005463759.novalocal sudo[113190]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:13 np0005463759.novalocal sudo[113190]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:13 np0005463759.novalocal sudo[113154]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:13 np0005463759.novalocal systemd[1]: session-c303.scope: Deactivated successfully. Sep 30 23:47:13 np0005463759.novalocal sudo[113193]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./placement.txt Sep 30 23:47:13 np0005463759.novalocal sudo[113193]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:13 np0005463759.novalocal sudo[113193]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:13 np0005463759.novalocal sudo[113196]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./cinder.txt Sep 30 23:47:13 np0005463759.novalocal sudo[113196]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:13 np0005463759.novalocal sudo[113196]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:13 np0005463759.novalocal sudo[113199]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./glance.txt Sep 30 23:47:13 np0005463759.novalocal sudo[113199]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:13 np0005463759.novalocal sudo[113199]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:13 np0005463759.novalocal sudo[113202]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./neutron.txt Sep 30 23:47:13 np0005463759.novalocal sudo[113202]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:13 np0005463759.novalocal sudo[113202]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:13 np0005463759.novalocal sudo[113205]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./manila.txt Sep 30 23:47:13 np0005463759.novalocal sudo[113205]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:13 np0005463759.novalocal sudo[113205]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:13 np0005463759.novalocal sudo[113208]: root : PWD=/var/log/weirdo-project/logs/openstack_resources ; USER=root ; COMMAND=/bin/chmod 644 ./octavia.txt Sep 30 23:47:13 np0005463759.novalocal sudo[113208]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:13 np0005463759.novalocal sudo[113208]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:13 np0005463759.novalocal sudo[113211]: root : PWD=/var/log/weirdo-project/logs ; USER=root ; COMMAND=/bin/chmod 644 ./nova-cell_v2.txt Sep 30 23:47:13 np0005463759.novalocal sudo[113211]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:13 np0005463759.novalocal sudo[113211]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:13 np0005463759.novalocal sudo[111985]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:13 np0005463759.novalocal sudo[113216]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/chown -R 0:0 /var/log/weirdo-project/logs Sep 30 23:47:13 np0005463759.novalocal sudo[113216]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:13 np0005463759.novalocal sudo[113216]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:13 np0005463759.novalocal sudo[113219]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/find /var/log/weirdo-project/logs -type l -execdir sudo rm -f {} ; Sep 30 23:47:13 np0005463759.novalocal sudo[113219]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:13 np0005463759.novalocal sudo[113222]: root : PWD=/var/log/weirdo-project/logs/etc/cinder/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Sep 30 23:47:13 np0005463759.novalocal sudo[113222]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:13 np0005463759.novalocal sudo[113222]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:13 np0005463759.novalocal sudo[113225]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./glance_cinder_store.filters Sep 30 23:47:13 np0005463759.novalocal sudo[113225]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:13 np0005463759.novalocal sudo[113225]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:13 np0005463759.novalocal sudo[113228]: root : PWD=/var/log/weirdo-project/logs/etc/glance/rootwrap.d ; USER=root ; COMMAND=/bin/rm -f ./os-brick.filters Sep 30 23:47:13 np0005463759.novalocal sudo[113228]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:13 np0005463759.novalocal sudo[113228]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:13 np0005463759.novalocal sudo[113231]: root : PWD=/var/log/weirdo-project/logs/etc/neutron/plugins/networking-ovn ; USER=root ; COMMAND=/bin/rm -f ./networking-ovn.ini Sep 30 23:47:13 np0005463759.novalocal sudo[113231]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:13 np0005463759.novalocal sudo[113231]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:13 np0005463759.novalocal sudo[113234]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./ovn.ini Sep 30 23:47:13 np0005463759.novalocal sudo[113234]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:13 np0005463759.novalocal sudo[113234]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:13 np0005463759.novalocal sudo[113237]: root : PWD=/var/log/weirdo-project/logs/etc/neutron ; USER=root ; COMMAND=/bin/rm -f ./plugin.ini Sep 30 23:47:13 np0005463759.novalocal sudo[113237]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:13 np0005463759.novalocal sudo[113237]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:13 np0005463759.novalocal sudo[113240]: root : PWD=/var/log/weirdo-project/logs/etc/libvirt/qemu/networks/autostart ; USER=root ; COMMAND=/bin/rm -f ./default.xml Sep 30 23:47:13 np0005463759.novalocal sudo[113240]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:13 np0005463759.novalocal sudo[113240]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:13 np0005463759.novalocal sudo[113243]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_project_add_share_networks_panel_to_share_panel_group.py Sep 30 23:47:13 np0005463759.novalocal sudo[113243]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:13 np0005463759.novalocal sudo[113243]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:13 np0005463759.novalocal sudo[113246]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_admin_add_share_panel_group.py Sep 30 23:47:13 np0005463759.novalocal sudo[113246]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:13 np0005463759.novalocal sudo[113246]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:13 np0005463759.novalocal sudo[113249]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_80_manila_project_add_share_panel_group.py Sep 30 23:47:13 np0005463759.novalocal sudo[113249]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:13 np0005463759.novalocal sudo[113249]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:13 np0005463759.novalocal sudo[113252]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_admin_add_shares_panel_to_share_panel_group.py Sep 30 23:47:13 np0005463759.novalocal sudo[113252]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:13 np0005463759.novalocal sudo[113252]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:13 np0005463759.novalocal sudo[113255]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9010_manila_project_add_shares_panel_to_share_panel_group.py Sep 30 23:47:14 np0005463759.novalocal sudo[113255]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:14 np0005463759.novalocal sudo[113255]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:14 np0005463759.novalocal sudo[113258]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_admin_add_share_snapshots_panel_to_share_panel_group.py Sep 30 23:47:14 np0005463759.novalocal sudo[113258]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:14 np0005463759.novalocal sudo[113258]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:14 np0005463759.novalocal sudo[113261]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9020_manila_project_add_share_snapshots_panel_to_share_panel_group.py Sep 30 23:47:14 np0005463759.novalocal sudo[113261]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:14 np0005463759.novalocal sudo[113261]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:14 np0005463759.novalocal sudo[113264]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9030_manila_admin_add_share_types_panel_to_share_panel_group.py Sep 30 23:47:14 np0005463759.novalocal sudo[113264]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:14 np0005463759.novalocal sudo[113264]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:14 np0005463759.novalocal sudo[113267]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9040_manila_admin_add_share_networks_panel_to_share_panel_group.py Sep 30 23:47:14 np0005463759.novalocal sudo[113267]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:14 np0005463759.novalocal sudo[113267]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:14 np0005463759.novalocal sudo[113270]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_admin_add_security_services_panel_to_share_panel_group.py Sep 30 23:47:14 np0005463759.novalocal sudo[113270]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:14 np0005463759.novalocal sudo[113270]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:14 np0005463759.novalocal sudo[113273]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9050_manila_project_add_security_services_panel_to_share_panel_group.py Sep 30 23:47:14 np0005463759.novalocal sudo[113273]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:14 np0005463759.novalocal sudo[113273]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:14 np0005463759.novalocal sudo[113276]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9060_manila_admin_add_share_servers_panel_to_share_panel_group.py Sep 30 23:47:14 np0005463759.novalocal sudo[113276]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:14 np0005463759.novalocal sudo[113276]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:14 np0005463759.novalocal sudo[113279]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9070_manila_admin_add_share_instances_panel_to_share_panel_group.py Sep 30 23:47:14 np0005463759.novalocal sudo[113279]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:14 np0005463759.novalocal sudo[113279]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:14 np0005463759.novalocal sudo[113282]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_admin_add_share_groups_panel_to_share_panel_group.py Sep 30 23:47:14 np0005463759.novalocal sudo[113282]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:14 np0005463759.novalocal sudo[113282]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:14 np0005463759.novalocal sudo[113285]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9080_manila_project_add_share_groups_panel_to_share_panel_group.py Sep 30 23:47:14 np0005463759.novalocal sudo[113285]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:14 np0005463759.novalocal sudo[113285]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:14 np0005463759.novalocal sudo[113288]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_admin_add_share_group_snapshots_panel_to_share_panel_group.py Sep 30 23:47:14 np0005463759.novalocal sudo[113288]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:14 np0005463759.novalocal sudo[113288]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:14 np0005463759.novalocal sudo[113291]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9085_manila_project_add_share_group_snapshots_panel_to_share_panel_group.py Sep 30 23:47:14 np0005463759.novalocal sudo[113291]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:14 np0005463759.novalocal sudo[113291]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:14 np0005463759.novalocal sudo[113294]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9090_manila_admin_add_share_group_types_panel_to_share_panel_group.py Sep 30 23:47:14 np0005463759.novalocal sudo[113294]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:14 np0005463759.novalocal sudo[113294]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:14 np0005463759.novalocal sudo[113297]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_admin_add_user_messages_panel_to_share_panel_group.py Sep 30 23:47:14 np0005463759.novalocal sudo[113297]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:14 np0005463759.novalocal sudo[113297]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:14 np0005463759.novalocal sudo[113300]: root : PWD=/var/log/weirdo-project/logs/etc/openstack-dashboard/enabled.txt ; USER=root ; COMMAND=/bin/rm -f ./_9095_manila_project_add_user_messages_panel_to_share_panel_group.py Sep 30 23:47:14 np0005463759.novalocal sudo[113300]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:14 np0005463759.novalocal sudo[113300]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:14 np0005463759.novalocal sudo[113219]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:14 np0005463759.novalocal sudo[113306]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet-20250930_233019.log /var/log/weirdo-project/logs/puppet-20250930_233019.txt Sep 30 23:47:14 np0005463759.novalocal sudo[113306]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:14 np0005463759.novalocal sudo[113306]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:14 np0005463759.novalocal sudo[113309]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/puppet-20250930_233315.log /var/log/weirdo-project/logs/puppet-20250930_233315.txt Sep 30 23:47:14 np0005463759.novalocal sudo[113309]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:14 np0005463759.novalocal sudo[113309]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:14 np0005463759.novalocal sudo[113312]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-manage.log /var/log/weirdo-project/logs/cinder/cinder-manage.txt Sep 30 23:47:14 np0005463759.novalocal sudo[113312]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:14 np0005463759.novalocal sudo[113312]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:14 np0005463759.novalocal sudo[113315]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/cinder-api.log /var/log/weirdo-project/logs/cinder/cinder-api.txt Sep 30 23:47:14 np0005463759.novalocal sudo[113315]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:14 np0005463759.novalocal sudo[113315]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:14 np0005463759.novalocal sudo[113318]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/scheduler.log /var/log/weirdo-project/logs/cinder/scheduler.txt Sep 30 23:47:14 np0005463759.novalocal sudo[113318]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:14 np0005463759.novalocal sudo[113318]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:14 np0005463759.novalocal sudo[113321]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/volume.log /var/log/weirdo-project/logs/cinder/volume.txt Sep 30 23:47:14 np0005463759.novalocal sudo[113321]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:14 np0005463759.novalocal sudo[113321]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:15 np0005463759.novalocal sudo[113324]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/cinder/backup.log /var/log/weirdo-project/logs/cinder/backup.txt Sep 30 23:47:15 np0005463759.novalocal sudo[113324]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:15 np0005463759.novalocal sudo[113324]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:15 np0005463759.novalocal sudo[113327]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/glance/api.log /var/log/weirdo-project/logs/glance/api.txt Sep 30 23:47:15 np0005463759.novalocal sudo[113327]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:15 np0005463759.novalocal sudo[113327]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:15 np0005463759.novalocal sudo[113330]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/glance/cache.log /var/log/weirdo-project/logs/glance/cache.txt Sep 30 23:47:15 np0005463759.novalocal sudo[113330]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:15 np0005463759.novalocal sudo[113330]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:15 np0005463759.novalocal sudo[113333]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/horizon/horizon.log /var/log/weirdo-project/logs/horizon/horizon.txt Sep 30 23:47:15 np0005463759.novalocal sudo[113333]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:15 np0005463759.novalocal sudo[113333]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:15 np0005463759.novalocal sudo[113336]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone.log /var/log/weirdo-project/logs/keystone/keystone.txt Sep 30 23:47:15 np0005463759.novalocal sudo[113336]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:15 np0005463759.novalocal sudo[113336]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:15 np0005463759.novalocal sudo[113339]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/keystone/keystone-manage.log /var/log/weirdo-project/logs/keystone/keystone-manage.txt Sep 30 23:47:15 np0005463759.novalocal sudo[113339]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:15 np0005463759.novalocal sudo[113339]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:15 np0005463759.novalocal sudo[113342]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/manila-manage.log /var/log/weirdo-project/logs/manila/manila-manage.txt Sep 30 23:47:15 np0005463759.novalocal sudo[113342]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:15 np0005463759.novalocal sudo[113342]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:15 np0005463759.novalocal sudo[113345]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/scheduler.log /var/log/weirdo-project/logs/manila/scheduler.txt Sep 30 23:47:15 np0005463759.novalocal sudo[113345]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:15 np0005463759.novalocal sudo[113345]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:15 np0005463759.novalocal sudo[113348]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/share.log /var/log/weirdo-project/logs/manila/share.txt Sep 30 23:47:15 np0005463759.novalocal sudo[113348]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:15 np0005463759.novalocal sudo[113348]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:15 np0005463759.novalocal sudo[113351]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/privsep-helper.log /var/log/weirdo-project/logs/manila/privsep-helper.txt Sep 30 23:47:15 np0005463759.novalocal sudo[113351]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:15 np0005463759.novalocal sudo[113351]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:15 np0005463759.novalocal sudo[113354]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/data.log /var/log/weirdo-project/logs/manila/data.txt Sep 30 23:47:15 np0005463759.novalocal sudo[113354]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:15 np0005463759.novalocal sudo[113354]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:15 np0005463759.novalocal sudo[113357]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/manila/manila-api.log /var/log/weirdo-project/logs/manila/manila-api.txt Sep 30 23:47:15 np0005463759.novalocal sudo[113357]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:15 np0005463759.novalocal sudo[113357]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:15 np0005463759.novalocal sudo[113360]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/server.log /var/log/weirdo-project/logs/neutron/server.txt Sep 30 23:47:15 np0005463759.novalocal sudo[113360]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:15 np0005463759.novalocal sudo[113360]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:15 np0005463759.novalocal sudo[113363]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/neutron-ovn-agent.log /var/log/weirdo-project/logs/neutron/neutron-ovn-agent.txt Sep 30 23:47:15 np0005463759.novalocal sudo[113363]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:15 np0005463759.novalocal sudo[113363]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:15 np0005463759.novalocal sudo[113366]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/ovn-vpn-agent.log /var/log/weirdo-project/logs/neutron/ovn-vpn-agent.txt Sep 30 23:47:15 np0005463759.novalocal sudo[113366]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:15 np0005463759.novalocal sudo[113366]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:15 np0005463759.novalocal sudo[113369]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/neutron/privsep-helper.log /var/log/weirdo-project/logs/neutron/privsep-helper.txt Sep 30 23:47:15 np0005463759.novalocal sudo[113369]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:15 np0005463759.novalocal sudo[113369]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:15 np0005463759.novalocal sudo[113372]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-manage.log /var/log/weirdo-project/logs/nova/nova-manage.txt Sep 30 23:47:15 np0005463759.novalocal sudo[113372]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:15 np0005463759.novalocal sudo[113372]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:15 np0005463759.novalocal sudo[113375]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-novncproxy.log /var/log/weirdo-project/logs/nova/nova-novncproxy.txt Sep 30 23:47:15 np0005463759.novalocal sudo[113375]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:15 np0005463759.novalocal sudo[113375]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:15 np0005463759.novalocal sudo[113378]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-conductor.log /var/log/weirdo-project/logs/nova/nova-conductor.txt Sep 30 23:47:15 np0005463759.novalocal sudo[113378]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:15 np0005463759.novalocal sudo[113378]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:15 np0005463759.novalocal sudo[113381]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-compute.log /var/log/weirdo-project/logs/nova/nova-compute.txt Sep 30 23:47:15 np0005463759.novalocal sudo[113381]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:15 np0005463759.novalocal sudo[113381]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:15 np0005463759.novalocal sudo[113384]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-scheduler.log /var/log/weirdo-project/logs/nova/nova-scheduler.txt Sep 30 23:47:15 np0005463759.novalocal sudo[113384]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:15 np0005463759.novalocal sudo[113384]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:15 np0005463759.novalocal sudo[113387]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-api.log /var/log/weirdo-project/logs/nova/nova-api.txt Sep 30 23:47:15 np0005463759.novalocal sudo[113387]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:15 np0005463759.novalocal sudo[113387]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:15 np0005463759.novalocal sudo[113390]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/privsep-helper.log /var/log/weirdo-project/logs/nova/privsep-helper.txt Sep 30 23:47:15 np0005463759.novalocal sudo[113390]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:15 np0005463759.novalocal sudo[113390]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:16 np0005463759.novalocal sudo[113393]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/nova/nova-metadata-api.log /var/log/weirdo-project/logs/nova/nova-metadata-api.txt Sep 30 23:47:16 np0005463759.novalocal sudo[113393]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:16 np0005463759.novalocal sudo[113393]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:16 np0005463759.novalocal sudo[113396]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/health-manager.log /var/log/weirdo-project/logs/octavia/health-manager.txt Sep 30 23:47:16 np0005463759.novalocal sudo[113396]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:16 np0005463759.novalocal sudo[113396]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:16 np0005463759.novalocal sudo[113399]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/housekeeping.log /var/log/weirdo-project/logs/octavia/housekeeping.txt Sep 30 23:47:16 np0005463759.novalocal sudo[113399]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:16 np0005463759.novalocal sudo[113399]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:16 np0005463759.novalocal sudo[113402]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/driver-agent.log /var/log/weirdo-project/logs/octavia/driver-agent.txt Sep 30 23:47:16 np0005463759.novalocal sudo[113402]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:16 np0005463759.novalocal sudo[113402]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:16 np0005463759.novalocal sudo[113405]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/worker.log /var/log/weirdo-project/logs/octavia/worker.txt Sep 30 23:47:16 np0005463759.novalocal sudo[113405]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:16 np0005463759.novalocal sudo[113405]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:16 np0005463759.novalocal sudo[113408]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/octavia/app.log /var/log/weirdo-project/logs/octavia/app.txt Sep 30 23:47:16 np0005463759.novalocal sudo[113408]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:16 np0005463759.novalocal sudo[113408]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:16 np0005463759.novalocal sudo[113411]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-nb.txt Sep 30 23:47:16 np0005463759.novalocal sudo[113411]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:16 np0005463759.novalocal sudo[113411]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:16 np0005463759.novalocal sudo[113414]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.log /var/log/weirdo-project/logs/ovn/ovsdb-server-sb.txt Sep 30 23:47:16 np0005463759.novalocal sudo[113414]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:16 np0005463759.novalocal sudo[113414]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:16 np0005463759.novalocal sudo[113417]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-northd.log /var/log/weirdo-project/logs/ovn/ovn-northd.txt Sep 30 23:47:16 np0005463759.novalocal sudo[113417]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:16 np0005463759.novalocal sudo[113417]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:16 np0005463759.novalocal sudo[113420]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/ovn/ovn-controller.log /var/log/weirdo-project/logs/ovn/ovn-controller.txt Sep 30 23:47:16 np0005463759.novalocal sudo[113420]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:16 np0005463759.novalocal sudo[113420]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:16 np0005463759.novalocal sudo[113423]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/placement/placement.log /var/log/weirdo-project/logs/placement/placement.txt Sep 30 23:47:16 np0005463759.novalocal sudo[113423]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:16 np0005463759.novalocal sudo[113423]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:16 np0005463759.novalocal sudo[113426]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6.txt Sep 30 23:47:16 np0005463759.novalocal sudo[113426]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:16 np0005463759.novalocal sudo[113426]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:16 np0005463759.novalocal sudo[113429]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.log /var/log/weirdo-project/logs/rabbitmq/rabbit@localhost6_upgrade.txt Sep 30 23:47:16 np0005463759.novalocal sudo[113429]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:16 np0005463759.novalocal sudo[113429]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:16 np0005463759.novalocal sudo[113432]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/mariadb/mariadb.log /var/log/weirdo-project/logs/mariadb/mariadb.txt Sep 30 23:47:16 np0005463759.novalocal sudo[113432]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:16 np0005463759.novalocal sudo[113432]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:16 np0005463759.novalocal sudo[113435]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/tempest.log /var/log/weirdo-project/logs/tempest.txt Sep 30 23:47:16 np0005463759.novalocal sudo[113435]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:16 np0005463759.novalocal sudo[113435]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:16 np0005463759.novalocal sudo[113438]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dstat.log /var/log/weirdo-project/logs/dstat.txt Sep 30 23:47:16 np0005463759.novalocal sudo[113438]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:16 np0005463759.novalocal sudo[113438]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:16 np0005463759.novalocal sudo[113441]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iostat.log /var/log/weirdo-project/logs/iostat.txt Sep 30 23:47:16 np0005463759.novalocal sudo[113441]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:16 np0005463759.novalocal sudo[113441]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:16 np0005463759.novalocal sudo[113444]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/iotop.log /var/log/weirdo-project/logs/iotop.txt Sep 30 23:47:16 np0005463759.novalocal sudo[113444]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:16 np0005463759.novalocal sudo[113444]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:16 np0005463759.novalocal sudo[113447]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000003.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000003.txt Sep 30 23:47:16 np0005463759.novalocal sudo[113447]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:16 np0005463759.novalocal sudo[113447]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:16 np0005463759.novalocal sudo[113450]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000004.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000004.txt Sep 30 23:47:16 np0005463759.novalocal sudo[113450]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:16 np0005463759.novalocal sudo[113450]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:16 np0005463759.novalocal sudo[113453]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000005.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000005.txt Sep 30 23:47:16 np0005463759.novalocal sudo[113453]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:16 np0005463759.novalocal sudo[113453]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:16 np0005463759.novalocal sudo[113456]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000008.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000008.txt Sep 30 23:47:16 np0005463759.novalocal sudo[113456]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:16 np0005463759.novalocal sudo[113456]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:16 np0005463759.novalocal sudo[113459]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000001.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000001.txt Sep 30 23:47:16 np0005463759.novalocal sudo[113459]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:16 np0005463759.novalocal sudo[113459]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:16 np0005463759.novalocal sudo[113462]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000002.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000002.txt Sep 30 23:47:16 np0005463759.novalocal sudo[113462]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:16 np0005463759.novalocal sudo[113462]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:16 np0005463759.novalocal sudo[113465]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000009.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000009.txt Sep 30 23:47:16 np0005463759.novalocal sudo[113465]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:16 np0005463759.novalocal sudo[113465]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:16 np0005463759.novalocal sudo[113468]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-0000000a.log /var/log/weirdo-project/logs/libvirt/qemu/instance-0000000a.txt Sep 30 23:47:16 np0005463759.novalocal sudo[113468]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:16 np0005463759.novalocal sudo[113468]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:17 np0005463759.novalocal sudo[113471]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000007.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000007.txt Sep 30 23:47:17 np0005463759.novalocal sudo[113471]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:17 np0005463759.novalocal sudo[113471]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:17 np0005463759.novalocal sudo[113474]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/libvirt/qemu/instance-00000006.log /var/log/weirdo-project/logs/libvirt/qemu/instance-00000006.txt Sep 30 23:47:17 np0005463759.novalocal sudo[113474]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:17 np0005463759.novalocal sudo[113474]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:17 np0005463759.novalocal sudo[113477]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.log /var/log/weirdo-project/logs/openvswitch/ovs-vswitchd.txt Sep 30 23:47:17 np0005463759.novalocal sudo[113477]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:17 np0005463759.novalocal sudo[113477]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:17 np0005463759.novalocal sudo[113480]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovs-pki.log /var/log/weirdo-project/logs/openvswitch/ovs-pki.txt Sep 30 23:47:17 np0005463759.novalocal sudo[113480]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:17 np0005463759.novalocal sudo[113480]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:17 np0005463759.novalocal sudo[113483]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/openvswitch/ovsdb-server.log /var/log/weirdo-project/logs/openvswitch/ovsdb-server.txt Sep 30 23:47:17 np0005463759.novalocal sudo[113483]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:17 np0005463759.novalocal sudo[113483]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:17 np0005463759.novalocal sudo[113486]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_error.log /var/log/weirdo-project/logs/apache/horizon_error.txt Sep 30 23:47:17 np0005463759.novalocal sudo[113486]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:17 np0005463759.novalocal sudo[113486]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:17 np0005463759.novalocal sudo[113489]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_error.log /var/log/weirdo-project/logs/apache/horizon_ssl_error.txt Sep 30 23:47:17 np0005463759.novalocal sudo[113489]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:17 np0005463759.novalocal sudo[113489]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:17 np0005463759.novalocal sudo[113492]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_error_ssl.txt Sep 30 23:47:17 np0005463759.novalocal sudo[113492]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:17 np0005463759.novalocal sudo[113492]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:17 np0005463759.novalocal sudo[113495]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_error_ssl.txt Sep 30 23:47:17 np0005463759.novalocal sudo[113495]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:17 np0005463759.novalocal sudo[113495]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:17 np0005463759.novalocal sudo[113498]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_error_ssl.txt Sep 30 23:47:17 np0005463759.novalocal sudo[113498]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:17 np0005463759.novalocal sudo[113498]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:17 np0005463759.novalocal sudo[113501]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_error_ssl.txt Sep 30 23:47:17 np0005463759.novalocal sudo[113501]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:17 np0005463759.novalocal sudo[113501]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:17 np0005463759.novalocal sudo[113504]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_error_ssl.txt Sep 30 23:47:17 np0005463759.novalocal sudo[113504]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:17 np0005463759.novalocal sudo[113504]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:17 np0005463759.novalocal sudo[113507]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_error_ssl.txt Sep 30 23:47:17 np0005463759.novalocal sudo[113507]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:17 np0005463759.novalocal sudo[113507]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:17 np0005463759.novalocal sudo[113510]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/glance_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/glance_wsgi_error_ssl.txt Sep 30 23:47:17 np0005463759.novalocal sudo[113510]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:17 np0005463759.novalocal sudo[113510]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:17 np0005463759.novalocal sudo[113513]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_error_ssl.txt Sep 30 23:47:17 np0005463759.novalocal sudo[113513]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:17 np0005463759.novalocal sudo[113513]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:17 np0005463759.novalocal sudo[113516]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_access.log /var/log/weirdo-project/logs/apache/horizon_access.txt Sep 30 23:47:17 np0005463759.novalocal sudo[113516]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:17 np0005463759.novalocal sudo[113516]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:17 np0005463759.novalocal sudo[113519]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/horizon_ssl_access.log /var/log/weirdo-project/logs/apache/horizon_ssl_access.txt Sep 30 23:47:17 np0005463759.novalocal sudo[113519]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:17 np0005463759.novalocal sudo[113519]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:17 np0005463759.novalocal sudo[113522]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/placement_wsgi_access_ssl.txt Sep 30 23:47:17 np0005463759.novalocal sudo[113522]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:17 np0005463759.novalocal sudo[113522]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:17 np0005463759.novalocal sudo[113525]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/octavia_wsgi_access_ssl.txt Sep 30 23:47:17 np0005463759.novalocal sudo[113525]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:17 np0005463759.novalocal sudo[113525]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:17 np0005463759.novalocal sudo[113528]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_metadata_wsgi_access_ssl.txt Sep 30 23:47:17 np0005463759.novalocal sudo[113528]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:17 np0005463759.novalocal sudo[113528]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:17 np0005463759.novalocal sudo[113531]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/nova_api_wsgi_access_ssl.txt Sep 30 23:47:17 np0005463759.novalocal sudo[113531]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:17 np0005463759.novalocal sudo[113531]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:17 np0005463759.novalocal sudo[113534]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/manila_wsgi_access_ssl.txt Sep 30 23:47:17 np0005463759.novalocal sudo[113534]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:17 np0005463759.novalocal sudo[113534]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:17 np0005463759.novalocal sudo[113537]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/keystone_wsgi_access_ssl.txt Sep 30 23:47:17 np0005463759.novalocal sudo[113537]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:17 np0005463759.novalocal sudo[113537]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:17 np0005463759.novalocal sudo[113540]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/glance_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/glance_wsgi_access_ssl.txt Sep 30 23:47:18 np0005463759.novalocal sudo[113540]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:18 np0005463759.novalocal sudo[113540]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:18 np0005463759.novalocal sudo[113543]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.log /var/log/weirdo-project/logs/apache/cinder_wsgi_access_ssl.txt Sep 30 23:47:18 np0005463759.novalocal sudo[113543]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:18 np0005463759.novalocal sudo[113543]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:18 np0005463759.novalocal sudo[113546]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/redis/redis.log /var/log/weirdo-project/logs/redis/redis.txt Sep 30 23:47:18 np0005463759.novalocal sudo[113546]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:18 np0005463759.novalocal sudo[113546]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:18 np0005463759.novalocal sudo[113549]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/redis/sentinel.log /var/log/weirdo-project/logs/redis/sentinel.txt Sep 30 23:47:18 np0005463759.novalocal sudo[113549]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:18 np0005463759.novalocal sudo[113549]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:18 np0005463759.novalocal sudo[113553]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.log /var/log/weirdo-project/logs/dnf/dnf.txt Sep 30 23:47:18 np0005463759.novalocal sudo[113553]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:18 np0005463759.novalocal sudo[113553]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:18 np0005463759.novalocal sudo[113556]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/dnf/dnf.rpm.log /var/log/weirdo-project/logs/dnf/dnf.rpm.txt Sep 30 23:47:18 np0005463759.novalocal sudo[113556]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:18 np0005463759.novalocal sudo[113556]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:18 np0005463759.novalocal sudo[113560]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/zuul /var/log/weirdo-project/logs/sudoers.d/zuul.txt Sep 30 23:47:18 np0005463759.novalocal sudo[113560]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:18 np0005463759.novalocal sudo[113560]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:18 np0005463759.novalocal sudo[113563]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users /var/log/weirdo-project/logs/sudoers.d/90-cloud-init-users.txt Sep 30 23:47:18 np0005463759.novalocal sudo[113563]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:18 np0005463759.novalocal sudo[113563]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:18 np0005463759.novalocal sudo[113566]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/neutron /var/log/weirdo-project/logs/sudoers.d/neutron.txt Sep 30 23:47:18 np0005463759.novalocal sudo[113566]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:18 np0005463759.novalocal sudo[113566]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:18 np0005463759.novalocal sudo[113569]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/glance /var/log/weirdo-project/logs/sudoers.d/glance.txt Sep 30 23:47:18 np0005463759.novalocal sudo[113569]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:18 np0005463759.novalocal sudo[113569]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:18 np0005463759.novalocal sudo[113572]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/manila /var/log/weirdo-project/logs/sudoers.d/manila.txt Sep 30 23:47:18 np0005463759.novalocal sudo[113572]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:18 np0005463759.novalocal sudo[113572]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:18 np0005463759.novalocal sudo[113575]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/nova /var/log/weirdo-project/logs/sudoers.d/nova.txt Sep 30 23:47:18 np0005463759.novalocal sudo[113575]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:18 np0005463759.novalocal sudo[113575]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:18 np0005463759.novalocal sudo[113578]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/sudoers.d/cinder /var/log/weirdo-project/logs/sudoers.d/cinder.txt Sep 30 23:47:18 np0005463759.novalocal sudo[113578]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:18 np0005463759.novalocal sudo[113578]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:18 np0005463759.novalocal sudo[113581]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-post.txt Sep 30 23:47:18 np0005463759.novalocal sudo[113581]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:18 np0005463759.novalocal sudo[113581]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:18 np0005463759.novalocal sudo[113584]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-routes.txt Sep 30 23:47:18 np0005463759.novalocal sudo[113584]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:18 np0005463759.novalocal sudo[113584]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:18 np0005463759.novalocal sudo[113587]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-tunnel.txt Sep 30 23:47:18 np0005463759.novalocal sudo[113587]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:18 np0005463759.novalocal sudo[113587]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:18 np0005463759.novalocal sudo[113590]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-lo.txt Sep 30 23:47:18 np0005463759.novalocal sudo[113590]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:18 np0005463759.novalocal sudo[113590]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:18 np0005463759.novalocal sudo[113593]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown.txt Sep 30 23:47:18 np0005463759.novalocal sudo[113593]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:18 np0005463759.novalocal sudo[113593]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:18 np0005463759.novalocal sudo[113596]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-eth.txt Sep 30 23:47:18 np0005463759.novalocal sudo[113596]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:18 np0005463759.novalocal sudo[113596]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:18 np0005463759.novalocal sudo[113604]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ipv6.txt Sep 30 23:47:18 np0005463759.novalocal sudo[113604]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:18 np0005463759.novalocal sudo[113604]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:18 np0005463759.novalocal sudo[113610]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifdown-ovs.txt Sep 30 23:47:18 np0005463759.novalocal sudo[113610]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:18 np0005463759.novalocal sudo[113610]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:18 np0005463759.novalocal sudo[113641]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-loop1.txt Sep 30 23:47:18 np0005463759.novalocal sudo[113641]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:18 np0005463759.novalocal sudo[113641]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:18 np0005463759.novalocal sudo[113644]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-br-ex.txt Sep 30 23:47:18 np0005463759.novalocal sudo[113644]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:18 np0005463759.novalocal sudo[113644]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:18 np0005463759.novalocal sudo[113647]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/readme-ifcfg-rh.txt.txt Sep 30 23:47:18 np0005463759.novalocal sudo[113647]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:19 np0005463759.novalocal sudo[113647]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:19 np0005463759.novalocal sudo[113651]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifcfg-eth0.txt Sep 30 23:47:19 np0005463759.novalocal sudo[113651]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:19 np0005463759.novalocal sudo[113651]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:19 np0005463759.novalocal sudo[113654]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup.txt Sep 30 23:47:19 np0005463759.novalocal sudo[113654]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:19 np0005463759.novalocal sudo[113654]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:19 np0005463759.novalocal sudo[113657]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-aliases.txt Sep 30 23:47:19 np0005463759.novalocal sudo[113657]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:19 np0005463759.novalocal sudo[113657]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:19 np0005463759.novalocal sudo[113660]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-eth.txt Sep 30 23:47:19 np0005463759.novalocal sudo[113660]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:19 np0005463759.novalocal sudo[113660]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:19 np0005463759.novalocal sudo[113663]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ipv6.txt Sep 30 23:47:19 np0005463759.novalocal sudo[113663]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:19 np0005463759.novalocal sudo[113663]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:19 np0005463759.novalocal sudo[113666]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-ovs.txt Sep 30 23:47:19 np0005463759.novalocal sudo[113666]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:19 np0005463759.novalocal sudo[113666]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:19 np0005463759.novalocal sudo[113669]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-post.txt Sep 30 23:47:19 np0005463759.novalocal sudo[113669]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:19 np0005463759.novalocal sudo[113669]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:19 np0005463759.novalocal sudo[113672]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-routes.txt Sep 30 23:47:19 np0005463759.novalocal sudo[113672]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:19 np0005463759.novalocal sudo[113672]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:19 np0005463759.novalocal sudo[113675]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/ifup-tunnel.txt Sep 30 23:47:19 np0005463759.novalocal sudo[113675]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:19 np0005463759.novalocal sudo[113675]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:19 np0005463759.novalocal sudo[113678]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/init.ipv6-global.txt Sep 30 23:47:19 np0005463759.novalocal sudo[113678]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:19 np0005463759.novalocal sudo[113678]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:19 np0005463759.novalocal sudo[113681]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions.txt Sep 30 23:47:19 np0005463759.novalocal sudo[113681]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:19 np0005463759.novalocal sudo[113681]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:19 np0005463759.novalocal sudo[113684]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6 /var/log/weirdo-project/logs/etc/sysconfig/network-scripts/network-functions-ipv6.txt Sep 30 23:47:19 np0005463759.novalocal sudo[113684]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:19 np0005463759.novalocal sudo[113684]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:19 np0005463759.novalocal sudo[113687]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/libvirt-guests /var/log/weirdo-project/logs/etc/sysconfig/libvirt-guests.txt Sep 30 23:47:19 np0005463759.novalocal sudo[113687]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:19 np0005463759.novalocal sudo[113687]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:19 np0005463759.novalocal sudo[113690]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd /var/log/weirdo-project/logs/etc/sysconfig/ovn-northd.txt Sep 30 23:47:19 np0005463759.novalocal sudo[113690]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:19 np0005463759.novalocal sudo[113690]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:19 np0005463759.novalocal sudo[113693]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller /var/log/weirdo-project/logs/etc/sysconfig/ovn-controller.txt Sep 30 23:47:19 np0005463759.novalocal sudo[113693]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:19 np0005463759.novalocal sudo[113693]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:19 np0005463759.novalocal sudo[113696]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005463759.novalocal.pem /var/log/weirdo-project/logs/etc/cinder/ssl/private/np0005463759.novalocal.pem.txt Sep 30 23:47:19 np0005463759.novalocal sudo[113696]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:19 np0005463759.novalocal sudo[113696]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:19 np0005463759.novalocal sudo[113699]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/api-paste.ini /var/log/weirdo-project/logs/etc/cinder/api-paste.ini.txt Sep 30 23:47:19 np0005463759.novalocal sudo[113699]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:19 np0005463759.novalocal sudo[113699]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:19 np0005463759.novalocal sudo[113702]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/cinder.conf /var/log/weirdo-project/logs/etc/cinder/cinder.conf.txt Sep 30 23:47:19 np0005463759.novalocal sudo[113702]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:19 np0005463759.novalocal sudo[113702]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:19 np0005463759.novalocal sudo[113705]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/resource_filters.json /var/log/weirdo-project/logs/etc/cinder/resource_filters.json.txt Sep 30 23:47:19 np0005463759.novalocal sudo[113705]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:19 np0005463759.novalocal sudo[113705]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:19 np0005463759.novalocal sudo[113708]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf /var/log/weirdo-project/logs/etc/cinder/rootwrap.conf.txt Sep 30 23:47:19 np0005463759.novalocal sudo[113708]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:19 np0005463759.novalocal sudo[113708]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:19 np0005463759.novalocal sudo[113711]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/cinder/policy.yaml /var/log/weirdo-project/logs/etc/cinder/policy.yaml.txt Sep 30 23:47:19 np0005463759.novalocal sudo[113711]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:19 np0005463759.novalocal sudo[113711]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:19 np0005463759.novalocal sudo[113714]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005463759.novalocal.pem /var/log/weirdo-project/logs/etc/glance/ssl/private/np0005463759.novalocal.pem.txt Sep 30 23:47:19 np0005463759.novalocal sudo[113714]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:19 np0005463759.novalocal sudo[113714]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:19 np0005463759.novalocal sudo[113717]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini /var/log/weirdo-project/logs/etc/glance/glance-api-paste.ini.txt Sep 30 23:47:19 np0005463759.novalocal sudo[113717]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:19 np0005463759.novalocal sudo[113717]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:19 np0005463759.novalocal sudo[113720]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-api.conf /var/log/weirdo-project/logs/etc/glance/glance-api.conf.txt Sep 30 23:47:19 np0005463759.novalocal sudo[113720]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:19 np0005463759.novalocal sudo[113720]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:19 np0005463759.novalocal sudo[113723]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-cache.conf /var/log/weirdo-project/logs/etc/glance/glance-cache.conf.txt Sep 30 23:47:19 np0005463759.novalocal sudo[113723]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:19 np0005463759.novalocal sudo[113723]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:19 np0005463759.novalocal sudo[113726]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf /var/log/weirdo-project/logs/etc/glance/glance-image-import.conf.txt Sep 30 23:47:19 np0005463759.novalocal sudo[113726]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:20 np0005463759.novalocal sudo[113726]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:20 np0005463759.novalocal sudo[113729]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf /var/log/weirdo-project/logs/etc/glance/glance-scrubber.conf.txt Sep 30 23:47:20 np0005463759.novalocal sudo[113729]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:20 np0005463759.novalocal sudo[113729]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:20 np0005463759.novalocal sshd-session[113550]: Connection closed by authenticating user root 185.156.73.233 port 60182 [preauth] Sep 30 23:47:20 np0005463759.novalocal sudo[113732]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/glance-swift.conf /var/log/weirdo-project/logs/etc/glance/glance-swift.conf.txt Sep 30 23:47:20 np0005463759.novalocal sudo[113732]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:20 np0005463759.novalocal sudo[113732]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:20 np0005463759.novalocal sudo[113735]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/rootwrap.conf /var/log/weirdo-project/logs/etc/glance/rootwrap.conf.txt Sep 30 23:47:20 np0005463759.novalocal sudo[113735]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:20 np0005463759.novalocal sudo[113735]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:20 np0005463759.novalocal sudo[113738]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/schema-image.json /var/log/weirdo-project/logs/etc/glance/schema-image.json.txt Sep 30 23:47:20 np0005463759.novalocal sudo[113738]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:20 np0005463759.novalocal sudo[113738]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:20 np0005463759.novalocal sudo[113741]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/policy.yaml /var/log/weirdo-project/logs/etc/glance/policy.yaml.txt Sep 30 23:47:20 np0005463759.novalocal sudo[113741]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:20 np0005463759.novalocal sudo[113741]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:20 np0005463759.novalocal sudo[113744]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt.json.txt Sep 30 23:47:20 np0005463759.novalocal sudo[113744]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:20 np0005463759.novalocal sudo[113744]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:20 np0005463759.novalocal sudo[113747]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-processor-allocation-setting-data.json.txt Sep 30 23:47:20 np0005463759.novalocal sudo[113747]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:20 np0005463759.novalocal sudo[113747]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:20 np0005463759.novalocal sudo[113750]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-resource-allocation-setting-data.json.txt Sep 30 23:47:20 np0005463759.novalocal sudo[113750]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:20 np0005463759.novalocal sudo[113750]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:20 np0005463759.novalocal sudo[113753]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-storage-allocation-setting-data.json.txt Sep 30 23:47:20 np0005463759.novalocal sudo[113753]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:20 np0005463759.novalocal sudo[113753]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:20 np0005463759.novalocal sudo[113756]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/cim-virtual-system-setting-data.json.txt Sep 30 23:47:20 np0005463759.novalocal sudo[113756]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:20 np0005463759.novalocal sudo[113756]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:20 np0005463759.novalocal sudo[113759]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-disk-filter.json.txt Sep 30 23:47:20 np0005463759.novalocal sudo[113759]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:20 np0005463759.novalocal sudo[113759]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:20 np0005463759.novalocal sudo[113762]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-iops-filter.json.txt Sep 30 23:47:20 np0005463759.novalocal sudo[113762]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:20 np0005463759.novalocal sudo[113762]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:20 np0005463759.novalocal sudo[113765]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-aggr-num-instances.json.txt Sep 30 23:47:20 np0005463759.novalocal sudo[113765]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:20 np0005463759.novalocal sudo[113765]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:20 np0005463759.novalocal sudo[113768]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-mode.json.txt Sep 30 23:47:20 np0005463759.novalocal sudo[113768]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:20 np0005463759.novalocal sudo[113768]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:20 np0005463759.novalocal sudo[113771]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-cpu-pinning.json.txt Sep 30 23:47:20 np0005463759.novalocal sudo[113771]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:20 np0005463759.novalocal sudo[113771]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:20 np0005463759.novalocal sudo[113774]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-memory-backing.json.txt Sep 30 23:47:20 np0005463759.novalocal sudo[113774]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:20 np0005463759.novalocal sudo[113774]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:20 np0005463759.novalocal sudo[113777]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-guest-shutdown.json.txt Sep 30 23:47:20 np0005463759.novalocal sudo[113777]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:20 np0005463759.novalocal sudo[113777]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:20 np0005463759.novalocal sudo[113780]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-host-capabilities.json.txt Sep 30 23:47:20 np0005463759.novalocal sudo[113780]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:20 np0005463759.novalocal sudo[113780]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:20 np0005463759.novalocal sudo[113783]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-hypervisor.json.txt Sep 30 23:47:20 np0005463759.novalocal sudo[113783]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:20 np0005463759.novalocal sudo[113783]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:20 np0005463759.novalocal sudo[113786]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-instance-data.json.txt Sep 30 23:47:20 np0005463759.novalocal sudo[113786]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:20 np0005463759.novalocal sudo[113786]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:20 np0005463759.novalocal sudo[113789]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-libvirt-image.json.txt Sep 30 23:47:20 np0005463759.novalocal sudo[113789]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:20 np0005463759.novalocal sudo[113789]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:20 np0005463759.novalocal sudo[113792]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-quota.json.txt Sep 30 23:47:20 np0005463759.novalocal sudo[113792]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:20 np0005463759.novalocal sudo[113792]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:20 np0005463759.novalocal sudo[113795]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-randomgen.json.txt Sep 30 23:47:21 np0005463759.novalocal sudo[113795]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:21 np0005463759.novalocal sudo[113795]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:21 np0005463759.novalocal sudo[113798]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vcputopology.json.txt Sep 30 23:47:21 np0005463759.novalocal sudo[113798]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:21 np0005463759.novalocal sudo[113798]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:21 np0005463759.novalocal sudo[113801]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-flavor.json.txt Sep 30 23:47:21 np0005463759.novalocal sudo[113801]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:21 np0005463759.novalocal sudo[113801]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:21 np0005463759.novalocal sudo[113804]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware-quota-flavor.json.txt Sep 30 23:47:21 np0005463759.novalocal sudo[113804]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:21 np0005463759.novalocal sudo[113804]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:21 np0005463759.novalocal sudo[113807]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vmware.json.txt Sep 30 23:47:21 np0005463759.novalocal sudo[113807]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:21 np0005463759.novalocal sudo[113807]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:21 np0005463759.novalocal sudo[113810]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm-hw.json.txt Sep 30 23:47:21 np0005463759.novalocal sudo[113810]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:21 np0005463759.novalocal sudo[113810]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:21 np0005463759.novalocal sudo[113813]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-vtpm.json.txt Sep 30 23:47:21 np0005463759.novalocal sudo[113813]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:21 np0005463759.novalocal sudo[113813]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:21 np0005463759.novalocal sudo[113816]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-watchdog.json.txt Sep 30 23:47:21 np0005463759.novalocal sudo[113816]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:21 np0005463759.novalocal sudo[113816]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:21 np0005463759.novalocal sudo[113819]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json /var/log/weirdo-project/logs/etc/glance/metadefs/compute-xenapi.json.txt Sep 30 23:47:21 np0005463759.novalocal sudo[113819]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:21 np0005463759.novalocal sudo[113819]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:21 np0005463759.novalocal sudo[113822]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json /var/log/weirdo-project/logs/etc/glance/metadefs/glance-common-image-props.json.txt Sep 30 23:47:21 np0005463759.novalocal sudo[113822]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:21 np0005463759.novalocal sudo[113822]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:21 np0005463759.novalocal sudo[113825]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json /var/log/weirdo-project/logs/etc/glance/metadefs/image-signature-verification.json.txt Sep 30 23:47:21 np0005463759.novalocal sudo[113825]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:21 np0005463759.novalocal sudo[113825]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:21 np0005463759.novalocal sudo[113828]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json /var/log/weirdo-project/logs/etc/glance/metadefs/operating-system.json.txt Sep 30 23:47:21 np0005463759.novalocal sudo[113828]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:21 np0005463759.novalocal sudo[113828]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:21 np0005463759.novalocal sudo[113831]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-databases.json.txt Sep 30 23:47:21 np0005463759.novalocal sudo[113831]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:21 np0005463759.novalocal sudo[113831]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:21 np0005463759.novalocal sudo[113834]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-runtimes.json.txt Sep 30 23:47:21 np0005463759.novalocal sudo[113834]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:21 np0005463759.novalocal sudo[113834]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:21 np0005463759.novalocal sudo[113837]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json /var/log/weirdo-project/logs/etc/glance/metadefs/software-webservers.json.txt Sep 30 23:47:21 np0005463759.novalocal sudo[113837]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:21 np0005463759.novalocal sudo[113837]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:21 np0005463759.novalocal sudo[113840]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json /var/log/weirdo-project/logs/etc/glance/metadefs/storage-volume-type.json.txt Sep 30 23:47:21 np0005463759.novalocal sudo[113840]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:21 np0005463759.novalocal sudo[113840]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:21 np0005463759.novalocal sudo[113843]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/default_catalog.templates /var/log/weirdo-project/logs/etc/keystone/default_catalog.templates.txt Sep 30 23:47:21 np0005463759.novalocal sudo[113843]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:21 np0005463759.novalocal sudo[113843]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:21 np0005463759.novalocal sudo[113846]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/keystone.conf /var/log/weirdo-project/logs/etc/keystone/keystone.conf.txt Sep 30 23:47:21 np0005463759.novalocal sudo[113846]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:21 np0005463759.novalocal sudo[113846]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:21 np0005463759.novalocal sudo[113849]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/logging.conf /var/log/weirdo-project/logs/etc/keystone/logging.conf.txt Sep 30 23:47:21 np0005463759.novalocal sudo[113849]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:21 np0005463759.novalocal sudo[113849]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:21 np0005463759.novalocal sudo[113852]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html /var/log/weirdo-project/logs/etc/keystone/sso_callback_template.html.txt Sep 30 23:47:21 np0005463759.novalocal sudo[113852]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:21 np0005463759.novalocal sudo[113852]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:21 np0005463759.novalocal sudo[113855]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/policy.yaml /var/log/weirdo-project/logs/etc/keystone/policy.yaml.txt Sep 30 23:47:21 np0005463759.novalocal sudo[113855]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:21 np0005463759.novalocal sudo[113855]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:21 np0005463759.novalocal sudo[113858]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/1.txt Sep 30 23:47:21 np0005463759.novalocal sudo[113858]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:21 np0005463759.novalocal sudo[113858]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:21 np0005463759.novalocal sudo[113861]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/2 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/2.txt Sep 30 23:47:21 np0005463759.novalocal sudo[113861]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:21 np0005463759.novalocal sudo[113861]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:21 np0005463759.novalocal sudo[113864]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0 /var/log/weirdo-project/logs/etc/keystone/fernet-keys/0.txt Sep 30 23:47:21 np0005463759.novalocal sudo[113864]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:21 np0005463759.novalocal sudo[113864]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:22 np0005463759.novalocal sudo[113867]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/1 /var/log/weirdo-project/logs/etc/keystone/credential-keys/1.txt Sep 30 23:47:22 np0005463759.novalocal sudo[113867]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:22 np0005463759.novalocal sudo[113867]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:22 np0005463759.novalocal sudo[113870]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/credential-keys/0 /var/log/weirdo-project/logs/etc/keystone/credential-keys/0.txt Sep 30 23:47:22 np0005463759.novalocal sudo[113870]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:22 np0005463759.novalocal sudo[113870]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:22 np0005463759.novalocal sudo[113873]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005463759.novalocal.pem /var/log/weirdo-project/logs/etc/keystone/ssl/private/np0005463759.novalocal.pem.txt Sep 30 23:47:22 np0005463759.novalocal sudo[113873]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:22 np0005463759.novalocal sudo[113873]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:22 np0005463759.novalocal sudo[113876]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/api-paste.ini /var/log/weirdo-project/logs/etc/manila/api-paste.ini.txt Sep 30 23:47:22 np0005463759.novalocal sudo[113876]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:22 np0005463759.novalocal sudo[113876]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:22 np0005463759.novalocal sudo[113879]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/manila.conf /var/log/weirdo-project/logs/etc/manila/manila.conf.txt Sep 30 23:47:22 np0005463759.novalocal sudo[113879]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:22 np0005463759.novalocal sudo[113879]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:22 np0005463759.novalocal sudo[113882]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/rootwrap.conf /var/log/weirdo-project/logs/etc/manila/rootwrap.conf.txt Sep 30 23:47:22 np0005463759.novalocal sudo[113882]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:22 np0005463759.novalocal sudo[113882]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:22 np0005463759.novalocal sudo[113885]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/policy.yaml /var/log/weirdo-project/logs/etc/manila/policy.yaml.txt Sep 30 23:47:22 np0005463759.novalocal sudo[113885]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:22 np0005463759.novalocal sudo[113885]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:22 np0005463759.novalocal sudo[113888]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005463759.novalocal.pem /var/log/weirdo-project/logs/etc/manila/ssl/private/np0005463759.novalocal.pem.txt Sep 30 23:47:22 np0005463759.novalocal sudo[113888]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:22 np0005463759.novalocal sudo[113888]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:22 np0005463759.novalocal sudo[113891]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/conf.d/README /var/log/weirdo-project/logs/etc/neutron/conf.d/README.txt Sep 30 23:47:22 np0005463759.novalocal sudo[113891]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:22 np0005463759.novalocal sudo[113891]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:22 np0005463759.novalocal sudo[113894]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ml2_conf.ini.txt Sep 30 23:47:22 np0005463759.novalocal sudo[113894]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:22 np0005463759.novalocal sudo[113894]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:22 np0005463759.novalocal sudo[113897]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/ovn_agent.ini.txt Sep 30 23:47:22 np0005463759.novalocal sudo[113897]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:22 np0005463759.novalocal sudo[113897]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:22 np0005463759.novalocal sudo[113900]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini /var/log/weirdo-project/logs/etc/neutron/plugins/ml2/sriov_agent.ini.txt Sep 30 23:47:22 np0005463759.novalocal sudo[113900]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:22 np0005463759.novalocal sudo[113900]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:22 np0005463759.novalocal sudo[113903]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005463759.novalocal.pem /var/log/weirdo-project/logs/etc/neutron/ssl/private/np0005463759.novalocal.pem.txt Sep 30 23:47:22 np0005463759.novalocal sudo[113903]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:22 np0005463759.novalocal sudo[113903]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:22 np0005463759.novalocal sudo[113906]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron.conf /var/log/weirdo-project/logs/etc/neutron/neutron.conf.txt Sep 30 23:47:22 np0005463759.novalocal sudo[113906]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:22 np0005463759.novalocal sudo[113906]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:22 np0005463759.novalocal sudo[113909]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf /var/log/weirdo-project/logs/etc/neutron/rootwrap.conf.txt Sep 30 23:47:22 np0005463759.novalocal sudo[113909]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:22 np0005463759.novalocal sudo[113909]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:22 np0005463759.novalocal sudo[113912]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/api-paste.ini /var/log/weirdo-project/logs/etc/neutron/api-paste.ini.txt Sep 30 23:47:22 np0005463759.novalocal sudo[113912]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:22 np0005463759.novalocal sudo[113912]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:22 np0005463759.novalocal sudo[113915]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini /var/log/weirdo-project/logs/etc/neutron/dhcp_agent.ini.txt Sep 30 23:47:22 np0005463759.novalocal sudo[113915]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:22 np0005463759.novalocal sudo[113915]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:22 np0005463759.novalocal sudo[113918]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini /var/log/weirdo-project/logs/etc/neutron/l3_agent.ini.txt Sep 30 23:47:22 np0005463759.novalocal sudo[113918]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:22 np0005463759.novalocal sudo[113918]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:22 np0005463759.novalocal sudo[113921]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini /var/log/weirdo-project/logs/etc/neutron/metadata_agent.ini.txt Sep 30 23:47:22 np0005463759.novalocal sudo[113921]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:22 np0005463759.novalocal sudo[113921]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:22 np0005463759.novalocal sudo[113924]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovn_vpn_agent.ini /var/log/weirdo-project/logs/etc/neutron/ovn_vpn_agent.ini.txt Sep 30 23:47:22 np0005463759.novalocal sudo[113924]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:22 np0005463759.novalocal sudo[113924]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:22 np0005463759.novalocal sudo[113927]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/neutron_vpnaas.conf /var/log/weirdo-project/logs/etc/neutron/neutron_vpnaas.conf.txt Sep 30 23:47:22 np0005463759.novalocal sudo[113927]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:22 np0005463759.novalocal sudo[113927]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:22 np0005463759.novalocal sudo[113930]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/vpn_agent.ini /var/log/weirdo-project/logs/etc/neutron/vpn_agent.ini.txt Sep 30 23:47:22 np0005463759.novalocal sudo[113930]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:22 np0005463759.novalocal sudo[113930]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:22 np0005463759.novalocal sudo[113933]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-privkey.pem.txt Sep 30 23:47:22 np0005463759.novalocal sudo[113933]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:22 np0005463759.novalocal sudo[113933]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:22 np0005463759.novalocal sudo[113936]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnnb-cert.pem.txt Sep 30 23:47:22 np0005463759.novalocal sudo[113936]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:22 np0005463759.novalocal sudo[113936]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[113939]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-privkey.pem.txt Sep 30 23:47:23 np0005463759.novalocal sudo[113939]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[113939]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[113942]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/neutron/ovnsb-cert.pem.txt Sep 30 23:47:23 np0005463759.novalocal sudo[113942]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[113942]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[113945]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem /var/log/weirdo-project/logs/etc/neutron/switchcacert.pem.txt Sep 30 23:47:23 np0005463759.novalocal sudo[113945]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[113945]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[113948]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/neutron/policy.yaml /var/log/weirdo-project/logs/etc/neutron/policy.yaml.txt Sep 30 23:47:23 np0005463759.novalocal sudo[113948]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[113948]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[113951]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova-compute.conf /var/log/weirdo-project/logs/etc/nova/nova-compute.conf.txt Sep 30 23:47:23 np0005463759.novalocal sudo[113951]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[113951]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[113954]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/api-paste.ini /var/log/weirdo-project/logs/etc/nova/api-paste.ini.txt Sep 30 23:47:23 np0005463759.novalocal sudo[113954]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[113954]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[113957]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/nova.conf /var/log/weirdo-project/logs/etc/nova/nova.conf.txt Sep 30 23:47:23 np0005463759.novalocal sudo[113957]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[113957]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[113960]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/release /var/log/weirdo-project/logs/etc/nova/release.txt Sep 30 23:47:23 np0005463759.novalocal sudo[113960]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[113960]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[113963]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/rootwrap.conf /var/log/weirdo-project/logs/etc/nova/rootwrap.conf.txt Sep 30 23:47:23 np0005463759.novalocal sudo[113963]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[113963]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[113966]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/policy.yaml /var/log/weirdo-project/logs/etc/nova/policy.yaml.txt Sep 30 23:47:23 np0005463759.novalocal sudo[113966]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[113966]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[113969]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005463759.novalocal.pem /var/log/weirdo-project/logs/etc/nova/ssl/private/np0005463759.novalocal.pem.txt Sep 30 23:47:23 np0005463759.novalocal sudo[113969]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[113969]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[113972]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/octavia.conf /var/log/weirdo-project/logs/etc/octavia/octavia.conf.txt Sep 30 23:47:23 np0005463759.novalocal sudo[113972]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[113972]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[113975]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/policy.yaml /var/log/weirdo-project/logs/etc/octavia/policy.yaml.txt Sep 30 23:47:23 np0005463759.novalocal sudo[113975]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[113975]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[113978]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-privkey.pem.txt Sep 30 23:47:23 np0005463759.novalocal sudo[113978]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[113978]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[113981]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnnb-cert.pem.txt Sep 30 23:47:23 np0005463759.novalocal sudo[113981]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[113981]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[113984]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-privkey.pem.txt Sep 30 23:47:23 np0005463759.novalocal sudo[113984]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[113984]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[113987]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/octavia/ovnsb-cert.pem.txt Sep 30 23:47:23 np0005463759.novalocal sudo[113987]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[113987]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[113990]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem /var/log/weirdo-project/logs/etc/octavia/switchcacert.pem.txt Sep 30 23:47:23 np0005463759.novalocal sudo[113990]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[113990]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[113993]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.cert.pem.txt Sep 30 23:47:23 np0005463759.novalocal sudo[113993]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[113993]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[113996]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem /var/log/weirdo-project/logs/etc/octavia/certs/server_ca.key.pem.txt Sep 30 23:47:23 np0005463759.novalocal sudo[113996]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[113996]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[113999]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem /var/log/weirdo-project/logs/etc/octavia/certs/client_ca.cert.pem.txt Sep 30 23:47:23 np0005463759.novalocal sudo[113999]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[113999]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[114002]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem /var/log/weirdo-project/logs/etc/octavia/certs/client.cert-and-key.pem.txt Sep 30 23:47:23 np0005463759.novalocal sudo[114002]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[114002]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[114005]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005463759.novalocal.pem /var/log/weirdo-project/logs/etc/octavia/ssl/private/np0005463759.novalocal.pem.txt Sep 30 23:47:23 np0005463759.novalocal sudo[114005]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[114005]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[114008]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/placement.conf /var/log/weirdo-project/logs/etc/placement/placement.conf.txt Sep 30 23:47:23 np0005463759.novalocal sudo[114008]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[114008]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[114011]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/policy.yaml /var/log/weirdo-project/logs/etc/placement/policy.yaml.txt Sep 30 23:47:23 np0005463759.novalocal sudo[114011]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[114011]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[114014]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005463759.novalocal.pem /var/log/weirdo-project/logs/etc/placement/ssl/private/np0005463759.novalocal.pem.txt Sep 30 23:47:23 np0005463759.novalocal sudo[114014]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[114014]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:23 np0005463759.novalocal sudo[114017]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/accounts.yaml.sample.txt Sep 30 23:47:23 np0005463759.novalocal sudo[114017]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:23 np0005463759.novalocal sudo[114017]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:24 np0005463759.novalocal sudo[114020]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml /var/log/weirdo-project/logs/etc/tempest/allow-list.yaml.txt Sep 30 23:47:24 np0005463759.novalocal sudo[114020]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:24 np0005463759.novalocal sudo[114020]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:24 np0005463759.novalocal sudo[114023]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample /var/log/weirdo-project/logs/etc/tempest/logging.conf.sample.txt Sep 30 23:47:24 np0005463759.novalocal sudo[114023]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:24 np0005463759.novalocal sudo[114023]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:24 np0005463759.novalocal sudo[114026]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample /var/log/weirdo-project/logs/etc/tempest/rbac-persona-accounts.yaml.sample.txt Sep 30 23:47:24 np0005463759.novalocal sudo[114026]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:24 np0005463759.novalocal sudo[114026]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:24 np0005463759.novalocal sudo[114029]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/tempest/tempest.conf /var/log/weirdo-project/logs/etc/tempest/tempest.conf.txt Sep 30 23:47:24 np0005463759.novalocal sudo[114029]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:24 np0005463759.novalocal sudo[114029]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:24 np0005463759.novalocal sudo[114032]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyslog.d/21-cloudinit.conf /var/log/weirdo-project/logs/etc/rsyslog.d/21-cloudinit.conf.txt Sep 30 23:47:24 np0005463759.novalocal sudo[114032]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:24 np0005463759.novalocal sudo[114032]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:24 np0005463759.novalocal sudo[114035]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyslog.conf /var/log/weirdo-project/logs/etc/rsyslog.conf.txt Sep 30 23:47:24 np0005463759.novalocal sudo[114035]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:24 np0005463759.novalocal sudo[114035]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:24 np0005463759.novalocal sudo[114038]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/inetrc /var/log/weirdo-project/logs/etc/rabbitmq/inetrc.txt Sep 30 23:47:24 np0005463759.novalocal sudo[114038]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:24 np0005463759.novalocal sudo[114038]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:24 np0005463759.novalocal sudo[114041]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmqadmin.conf.txt Sep 30 23:47:24 np0005463759.novalocal sudo[114041]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:24 np0005463759.novalocal sudo[114041]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:24 np0005463759.novalocal sudo[114044]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins /var/log/weirdo-project/logs/etc/rabbitmq/enabled_plugins.txt Sep 30 23:47:24 np0005463759.novalocal sudo[114044]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:24 np0005463759.novalocal sudo[114044]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:24 np0005463759.novalocal sudo[114047]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.config.txt Sep 30 23:47:24 np0005463759.novalocal sudo[114047]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:24 np0005463759.novalocal sudo[114047]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:24 np0005463759.novalocal sudo[114050]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq-env.conf.txt Sep 30 23:47:24 np0005463759.novalocal sudo[114050]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:24 np0005463759.novalocal sudo[114050]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:24 np0005463759.novalocal sudo[114053]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf /var/log/weirdo-project/logs/etc/rabbitmq/rabbitmq.conf.txt Sep 30 23:47:24 np0005463759.novalocal sudo[114053]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:24 np0005463759.novalocal sudo[114053]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:24 np0005463759.novalocal sudo[114056]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005463759.novalocal.pem /var/log/weirdo-project/logs/etc/rabbitmq/ssl/private/np0005463759.novalocal.pem.txt Sep 30 23:47:24 np0005463759.novalocal sudo[114056]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:24 np0005463759.novalocal sudo[114056]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:24 np0005463759.novalocal sudo[114059]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf /var/log/weirdo-project/logs/etc/my.cnf.txt Sep 30 23:47:24 np0005463759.novalocal sudo[114059]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:24 np0005463759.novalocal sudo[114059]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:24 np0005463759.novalocal sudo[114063]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/auth_gssapi.cnf.txt Sep 30 23:47:24 np0005463759.novalocal sudo[114063]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:24 np0005463759.novalocal sudo[114063]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:24 np0005463759.novalocal sudo[114067]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset /var/log/weirdo-project/logs/etc/my.cnf.d/enable_encryption.preset.txt Sep 30 23:47:24 np0005463759.novalocal sudo[114067]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:24 np0005463759.novalocal sudo[114067]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:24 np0005463759.novalocal sudo[114070]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mariadb-server.cnf.txt Sep 30 23:47:24 np0005463759.novalocal sudo[114070]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:24 np0005463759.novalocal sudo[114070]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:24 np0005463759.novalocal sudo[114073]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/spider.cnf.txt Sep 30 23:47:24 np0005463759.novalocal sudo[114073]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:24 np0005463759.novalocal sudo[114073]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:24 np0005463759.novalocal sudo[114076]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/mysql-clients.cnf.txt Sep 30 23:47:24 np0005463759.novalocal sudo[114076]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:24 np0005463759.novalocal sudo[114076]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:24 np0005463759.novalocal sudo[114079]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/server.cnf.txt Sep 30 23:47:24 np0005463759.novalocal sudo[114079]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:24 np0005463759.novalocal sudo[114079]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:24 np0005463759.novalocal sudo[114082]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf /var/log/weirdo-project/logs/etc/my.cnf.d/client.cnf.txt Sep 30 23:47:24 np0005463759.novalocal sudo[114082]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:24 np0005463759.novalocal sudo[114082]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:24 np0005463759.novalocal sudo[114085]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/my.cnf.d/np0005463759.novalocal.pem /var/log/weirdo-project/logs/etc/my.cnf.d/np0005463759.novalocal.pem.txt Sep 30 23:47:24 np0005463759.novalocal sudo[114085]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:24 np0005463759.novalocal sudo[114085]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114088]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf /var/log/weirdo-project/logs/etc/iscsi/iscsid.conf.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114088]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114088]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114091]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi /var/log/weirdo-project/logs/etc/iscsi/initiatorname.iscsi.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114091]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114091]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114094]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml /var/log/weirdo-project/logs/etc/libvirt/qemu/networks/default.xml.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114094]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114094]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114097]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/network.conf /var/log/weirdo-project/logs/etc/libvirt/network.conf.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114097]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114097]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114100]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnetworkd.conf.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114100]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114100]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114103]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnodedevd.conf.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114103]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114103]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114106]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf /var/log/weirdo-project/logs/etc/libvirt/virtnwfilterd.conf.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114106]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114106]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114109]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf /var/log/weirdo-project/logs/etc/libvirt/qemu-lockd.conf.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114109]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114109]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114112]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/qemu.conf /var/log/weirdo-project/logs/etc/libvirt/qemu.conf.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114112]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114112]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114115]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf /var/log/weirdo-project/logs/etc/libvirt/virtqemud.conf.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114115]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114115]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114118]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf /var/log/weirdo-project/logs/etc/libvirt/virtsecretd.conf.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114118]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114118]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114121]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt-admin.conf.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114121]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114121]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114124]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf /var/log/weirdo-project/logs/etc/libvirt/libvirt.conf.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114124]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114124]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114127]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlockd.conf.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114127]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114127]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114130]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf /var/log/weirdo-project/logs/etc/libvirt/virtlogd.conf.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114130]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114130]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114133]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf /var/log/weirdo-project/logs/etc/libvirt/virtproxyd.conf.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114133]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114133]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114136]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf /var/log/weirdo-project/logs/etc/libvirt/virtstoraged.conf.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114136]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114136]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114139]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf /var/log/weirdo-project/logs/etc/libvirt/libvirtd.conf.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114139]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114139]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114142]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf /var/log/weirdo-project/logs/etc/libvirt/virtinterfaced.conf.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114142]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114142]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114145]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/default.conf /var/log/weirdo-project/logs/etc/openvswitch/default.conf.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114145]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114145]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114148]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~ /var/log/weirdo-project/logs/etc/openvswitch/.conf.db.~lock~.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114148]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114148]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114151]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/conf.db /var/log/weirdo-project/logs/etc/openvswitch/conf.db.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114151]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114151]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114154]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf /var/log/weirdo-project/logs/etc/openvswitch/system-id.conf.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114154]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114154]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114157]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-req.pem.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114157]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114157]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114160]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-cert.pem.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114160]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114160]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114163]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-req.pem.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114163]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114163]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:25 np0005463759.novalocal sudo[114166]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-cert.pem.txt Sep 30 23:47:25 np0005463759.novalocal sudo[114166]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:25 np0005463759.novalocal sudo[114166]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:26 np0005463759.novalocal sudo[114169]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-req.pem.txt Sep 30 23:47:26 np0005463759.novalocal sudo[114169]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:26 np0005463759.novalocal sudo[114169]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:26 np0005463759.novalocal sudo[114172]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-cert.pem.txt Sep 30 23:47:26 np0005463759.novalocal sudo[114172]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:26 np0005463759.novalocal sudo[114172]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:26 np0005463759.novalocal sudo[114175]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnnb-privkey.pem.txt Sep 30 23:47:26 np0005463759.novalocal sudo[114175]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:26 np0005463759.novalocal sudo[114175]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:26 np0005463759.novalocal sudo[114178]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovnsb-privkey.pem.txt Sep 30 23:47:26 np0005463759.novalocal sudo[114178]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:26 np0005463759.novalocal sudo[114178]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:26 np0005463759.novalocal sudo[114181]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem /var/log/weirdo-project/logs/etc/openvswitch/ovncontroller-privkey.pem.txt Sep 30 23:47:26 np0005463759.novalocal sudo[114181]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:26 np0005463759.novalocal sudo[114181]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:26 np0005463759.novalocal sudo[114184]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf /var/log/weirdo-project/logs/etc/httpd/conf/httpd.conf.txt Sep 30 23:47:26 np0005463759.novalocal sudo[114184]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:26 np0005463759.novalocal sudo[114184]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:26 np0005463759.novalocal sudo[114187]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/magic /var/log/weirdo-project/logs/etc/httpd/conf/magic.txt Sep 30 23:47:26 np0005463759.novalocal sudo[114187]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:26 np0005463759.novalocal sudo[114187]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:26 np0005463759.novalocal sudo[114190]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf /var/log/weirdo-project/logs/etc/httpd/conf/ports.conf.txt Sep 30 23:47:26 np0005463759.novalocal sudo[114190]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:26 np0005463759.novalocal sudo[114190]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:26 np0005463759.novalocal sudo[114193]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-cinder_wsgi.conf.txt Sep 30 23:47:26 np0005463759.novalocal sudo[114193]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:26 np0005463759.novalocal sudo[114193]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:26 np0005463759.novalocal sudo[114196]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-glance_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-glance_wsgi.conf.txt Sep 30 23:47:26 np0005463759.novalocal sudo[114196]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:26 np0005463759.novalocal sudo[114196]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:26 np0005463759.novalocal sudo[114199]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-keystone_wsgi.conf.txt Sep 30 23:47:26 np0005463759.novalocal sudo[114199]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:26 np0005463759.novalocal sudo[114199]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:26 np0005463759.novalocal sudo[114202]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-manila_wsgi.conf.txt Sep 30 23:47:26 np0005463759.novalocal sudo[114202]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:26 np0005463759.novalocal sudo[114202]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:26 np0005463759.novalocal sudo[114205]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_api_wsgi.conf.txt Sep 30 23:47:26 np0005463759.novalocal sudo[114205]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:26 np0005463759.novalocal sudo[114205]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:26 np0005463759.novalocal sudo[114208]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-nova_metadata_wsgi.conf.txt Sep 30 23:47:26 np0005463759.novalocal sudo[114208]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:26 np0005463759.novalocal sudo[114208]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:26 np0005463759.novalocal sudo[114211]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-octavia_wsgi.conf.txt Sep 30 23:47:26 np0005463759.novalocal sudo[114211]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:26 np0005463759.novalocal sudo[114211]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:26 np0005463759.novalocal sudo[114214]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/10-placement_wsgi.conf.txt Sep 30 23:47:26 np0005463759.novalocal sudo[114214]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:26 np0005463759.novalocal sudo[114214]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:26 np0005463759.novalocal sudo[114217]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_ssl_vhost.conf.txt Sep 30 23:47:26 np0005463759.novalocal sudo[114217]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:26 np0005463759.novalocal sudo[114217]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:26 np0005463759.novalocal sudo[114220]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/15-horizon_vhost.conf.txt Sep 30 23:47:26 np0005463759.novalocal sudo[114220]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:26 np0005463759.novalocal sudo[114220]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:26 np0005463759.novalocal sudo[114223]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf /var/log/weirdo-project/logs/etc/httpd/conf.d/openstack-dashboard.conf.txt Sep 30 23:47:26 np0005463759.novalocal sudo[114223]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:26 np0005463759.novalocal sudo[114223]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:26 np0005463759.novalocal sudo[114226]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.conf.txt Sep 30 23:47:26 np0005463759.novalocal sudo[114226]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:26 np0005463759.novalocal sudo[114226]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:26 np0005463759.novalocal sudo[114229]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/alias.load.txt Sep 30 23:47:26 np0005463759.novalocal sudo[114229]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:26 np0005463759.novalocal sudo[114229]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:26 np0005463759.novalocal sudo[114232]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_core.load.txt Sep 30 23:47:26 np0005463759.novalocal sudo[114232]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:26 np0005463759.novalocal sudo[114232]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:26 np0005463759.novalocal sudo[114235]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/authz_host.load.txt Sep 30 23:47:26 np0005463759.novalocal sudo[114235]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:26 np0005463759.novalocal sudo[114235]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:26 np0005463759.novalocal sudo[114238]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/filter.load.txt Sep 30 23:47:27 np0005463759.novalocal sudo[114238]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:27 np0005463759.novalocal sudo[114238]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:27 np0005463759.novalocal sudo[114241]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/log_config.load.txt Sep 30 23:47:27 np0005463759.novalocal sudo[114241]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:27 np0005463759.novalocal sudo[114241]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:27 np0005463759.novalocal sudo[114244]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.conf.txt Sep 30 23:47:27 np0005463759.novalocal sudo[114244]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:27 np0005463759.novalocal sudo[114244]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:27 np0005463759.novalocal sudo[114247]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/mime.load.txt Sep 30 23:47:27 np0005463759.novalocal sudo[114247]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:27 np0005463759.novalocal sudo[114247]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:27 np0005463759.novalocal sudo[114250]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.conf.txt Sep 30 23:47:27 np0005463759.novalocal sudo[114250]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:27 np0005463759.novalocal sudo[114250]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:27 np0005463759.novalocal sudo[114253]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/prefork.load.txt Sep 30 23:47:27 np0005463759.novalocal sudo[114253]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:27 np0005463759.novalocal sudo[114253]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:27 np0005463759.novalocal sudo[114256]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.conf.txt Sep 30 23:47:27 np0005463759.novalocal sudo[114256]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:27 np0005463759.novalocal sudo[114256]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:27 np0005463759.novalocal sudo[114259]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/setenvif.load.txt Sep 30 23:47:27 np0005463759.novalocal sudo[114259]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:27 np0005463759.novalocal sudo[114259]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:27 np0005463759.novalocal sudo[114262]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/socache_shmcb.load.txt Sep 30 23:47:27 np0005463759.novalocal sudo[114262]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:27 np0005463759.novalocal sudo[114262]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:27 np0005463759.novalocal sudo[114265]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.conf.txt Sep 30 23:47:27 np0005463759.novalocal sudo[114265]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:27 np0005463759.novalocal sudo[114265]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:27 np0005463759.novalocal sudo[114268]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/ssl.load.txt Sep 30 23:47:27 np0005463759.novalocal sudo[114268]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:27 np0005463759.novalocal sudo[114268]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:27 np0005463759.novalocal sudo[114271]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/systemd.load.txt Sep 30 23:47:27 np0005463759.novalocal sudo[114271]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:27 np0005463759.novalocal sudo[114271]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:27 np0005463759.novalocal sudo[114274]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/unixd.load.txt Sep 30 23:47:27 np0005463759.novalocal sudo[114274]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:27 np0005463759.novalocal sudo[114274]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:27 np0005463759.novalocal sudo[114277]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.conf.txt Sep 30 23:47:27 np0005463759.novalocal sudo[114277]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:27 np0005463759.novalocal sudo[114277]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:27 np0005463759.novalocal sudo[114280]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load /var/log/weirdo-project/logs/etc/httpd/conf.modules.d/wsgi.load.txt Sep 30 23:47:27 np0005463759.novalocal sudo[114280]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:27 np0005463759.novalocal sudo[114280]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:27 np0005463759.novalocal sudo[114283]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/ssl/private/np0005463759.novalocal.pem /var/log/weirdo-project/logs/etc/redis/ssl/private/np0005463759.novalocal.pem.txt Sep 30 23:47:27 np0005463759.novalocal sudo[114283]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:27 np0005463759.novalocal sudo[114283]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:27 np0005463759.novalocal sudo[114286]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/redis.conf.puppet /var/log/weirdo-project/logs/etc/redis/redis.conf.puppet.txt Sep 30 23:47:27 np0005463759.novalocal sudo[114286]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:27 np0005463759.novalocal sudo[114286]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:27 np0005463759.novalocal sudo[114289]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/sentinel.conf /var/log/weirdo-project/logs/etc/redis/sentinel.conf.txt Sep 30 23:47:27 np0005463759.novalocal sudo[114289]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:27 np0005463759.novalocal sudo[114289]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:27 np0005463759.novalocal sudo[114292]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/redis.conf /var/log/weirdo-project/logs/etc/redis/redis.conf.txt Sep 30 23:47:27 np0005463759.novalocal sudo[114292]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:27 np0005463759.novalocal sudo[114292]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:27 np0005463759.novalocal sudo[114295]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/redis/sentinel.conf.puppet /var/log/weirdo-project/logs/etc/redis/sentinel.conf.puppet.txt Sep 30 23:47:27 np0005463759.novalocal sudo[114295]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:27 np0005463759.novalocal sudo[114295]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:27 np0005463759.novalocal sudo[114298]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/.secret_key_store /var/log/weirdo-project/logs/etc/openstack-dashboard/.secret_key_store.txt Sep 30 23:47:27 np0005463759.novalocal sudo[114298]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:27 np0005463759.novalocal sudo[114298]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:27 np0005463759.novalocal sudo[114301]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/cinder_policy.yaml.txt.txt Sep 30 23:47:27 np0005463759.novalocal sudo[114301]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:27 np0005463759.novalocal sudo[114301]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:27 np0005463759.novalocal sudo[114304]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/README.txt.txt Sep 30 23:47:27 np0005463759.novalocal sudo[114304]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:27 np0005463759.novalocal sudo[114304]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:27 np0005463759.novalocal sudo[114307]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/cinder.yaml.txt Sep 30 23:47:27 np0005463759.novalocal sudo[114307]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:27 np0005463759.novalocal sudo[114307]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:27 np0005463759.novalocal sudo[114310]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/glance.yaml.txt Sep 30 23:47:27 np0005463759.novalocal sudo[114310]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:27 np0005463759.novalocal sudo[114310]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:27 np0005463759.novalocal sudo[114313]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/keystone.yaml.txt Sep 30 23:47:27 np0005463759.novalocal sudo[114313]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:27 np0005463759.novalocal sudo[114313]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:27 np0005463759.novalocal sudo[114316]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/neutron.yaml.txt Sep 30 23:47:28 np0005463759.novalocal sudo[114316]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:28 np0005463759.novalocal sudo[114316]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:28 np0005463759.novalocal sudo[114319]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/nova.yaml.txt Sep 30 23:47:28 np0005463759.novalocal sudo[114319]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:28 np0005463759.novalocal sudo[114319]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:28 np0005463759.novalocal sudo[114322]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/manila.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/default_policies.txt/manila.yaml.txt Sep 30 23:47:28 np0005463759.novalocal sudo[114322]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:28 np0005463759.novalocal sudo[114322]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:28 np0005463759.novalocal sudo[114325]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/glance_policy.yaml.txt.txt Sep 30 23:47:28 np0005463759.novalocal sudo[114325]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:28 np0005463759.novalocal sudo[114325]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:28 np0005463759.novalocal sudo[114328]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/keystone_policy.yaml.txt.txt Sep 30 23:47:28 np0005463759.novalocal sudo[114328]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:28 np0005463759.novalocal sudo[114328]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:28 np0005463759.novalocal sudo[114331]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.txt.txt Sep 30 23:47:28 np0005463759.novalocal sudo[114331]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:28 np0005463759.novalocal sudo[114331]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:28 np0005463759.novalocal sudo[114334]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_90_manila_shares.py.txt Sep 30 23:47:28 np0005463759.novalocal sudo[114334]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:28 np0005463759.novalocal sudo[114334]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:28 np0005463759.novalocal sudo[114337]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_10_set_custom_theme.py.example.txt Sep 30 23:47:28 np0005463759.novalocal sudo[114337]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:28 np0005463759.novalocal sudo[114337]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:28 np0005463759.novalocal sudo[114340]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_11_toggle_angular_features.py.example.txt Sep 30 23:47:28 np0005463759.novalocal sudo[114340]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:28 np0005463759.novalocal sudo[114340]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:28 np0005463759.novalocal sudo[114343]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_2010_integration_tests_deprecated.py.example.txt Sep 30 23:47:28 np0005463759.novalocal sudo[114343]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:28 np0005463759.novalocal sudo[114343]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:28 np0005463759.novalocal sudo[114346]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_20_integration_tests_scaffolds.py.example.txt Sep 30 23:47:28 np0005463759.novalocal sudo[114346]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:28 np0005463759.novalocal sudo[114346]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:28 np0005463759.novalocal sudo[114349]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example /var/log/weirdo-project/logs/etc/openstack-dashboard/local_settings.d.txt/_9030_profiler_settings.py.example.txt Sep 30 23:47:28 np0005463759.novalocal sudo[114349]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:28 np0005463759.novalocal sudo[114349]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:28 np0005463759.novalocal sudo[114352]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/manila_policy.yaml.txt.txt Sep 30 23:47:28 np0005463759.novalocal sudo[114352]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:28 np0005463759.novalocal sudo[114352]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:28 np0005463759.novalocal sudo[114355]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/neutron_policy.yaml.txt.txt Sep 30 23:47:28 np0005463759.novalocal sudo[114355]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:28 np0005463759.novalocal sudo[114355]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:28 np0005463759.novalocal sudo[114358]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.d.txt/api-extensions.yaml.txt Sep 30 23:47:28 np0005463759.novalocal sudo[114358]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:28 np0005463759.novalocal sudo[114358]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:28 np0005463759.novalocal sudo[114361]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt /var/log/weirdo-project/logs/etc/openstack-dashboard/nova_policy.yaml.txt.txt Sep 30 23:47:28 np0005463759.novalocal sudo[114361]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:28 np0005463759.novalocal sudo[114361]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:28 np0005463759.novalocal sudo[114364]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005463759.novalocal.pem /var/log/weirdo-project/logs/etc/openstack-dashboard/ssl.txt/private/np0005463759.novalocal.pem.txt Sep 30 23:47:28 np0005463759.novalocal sudo[114364]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:28 np0005463759.novalocal sudo[114364]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:28 np0005463759.novalocal sudo[114367]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/rsyncd.conf /var/log/weirdo-project/logs/etc/rsyncd.conf.txt Sep 30 23:47:28 np0005463759.novalocal sudo[114367]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:28 np0005463759.novalocal sudo[114367]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:28 np0005463759.novalocal sudo[114370]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos-addons.repo.txt Sep 30 23:47:28 np0005463759.novalocal sudo[114370]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:28 np0005463759.novalocal sudo[114370]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:28 np0005463759.novalocal sudo[114373]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo /var/log/weirdo-project/logs/etc/yum.repos.d/centos.repo.txt Sep 30 23:47:28 np0005463759.novalocal sudo[114373]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:28 np0005463759.novalocal sudo[114373]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:28 np0005463759.novalocal sudo[114376]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-deps.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean-deps.repo.txt Sep 30 23:47:28 np0005463759.novalocal sudo[114376]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:28 np0005463759.novalocal sudo[114376]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:28 np0005463759.novalocal sudo[114379]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/delorean.repo /var/log/weirdo-project/logs/etc/yum.repos.d/delorean.repo.txt Sep 30 23:47:28 np0005463759.novalocal sudo[114379]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:28 np0005463759.novalocal sudo[114379]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:28 np0005463759.novalocal sudo[114382]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo /var/log/weirdo-project/logs/etc/yum.repos.d/redhat.repo.txt Sep 30 23:47:28 np0005463759.novalocal sudo[114382]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:28 np0005463759.novalocal sudo[114382]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:28 np0005463759.novalocal sudo[114385]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/passwd /var/log/weirdo-project/logs/etc/passwd.txt Sep 30 23:47:28 np0005463759.novalocal sudo[114385]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:28 np0005463759.novalocal sudo[114385]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:29 np0005463759.novalocal sudo[114388]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/group /var/log/weirdo-project/logs/etc/group.txt Sep 30 23:47:29 np0005463759.novalocal sudo[114388]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:29 np0005463759.novalocal sudo[114388]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:29 np0005463759.novalocal sudo[114391]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml /var/log/weirdo-project/logs/etc/openstack/puppet/admin-clouds.yaml.txt Sep 30 23:47:29 np0005463759.novalocal sudo[114391]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:29 np0005463759.novalocal sudo[114391]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:29 np0005463759.novalocal sudo[114394]: root : PWD=/tmp/puppet-openstack ; USER=root ; COMMAND=/bin/mv /var/log/weirdo-project/logs/etc/fstab /var/log/weirdo-project/logs/etc/fstab.txt Sep 30 23:47:29 np0005463759.novalocal sudo[114394]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=0) Sep 30 23:47:29 np0005463759.novalocal sudo[114394]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:29 np0005463759.novalocal sudo[111098]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:29 np0005463759.novalocal sudo[114504]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-synxxbfbtbcwnmprffmnvfzbsxgkccol ; /usr/bin/python3' Sep 30 23:47:29 np0005463759.novalocal sudo[114504]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:47:29 np0005463759.novalocal python3[114506]: ansible-command Invoked with creates=/var/log/weirdo/cpuinfo.txt _raw_params=cat /proc/cpuinfo >/var/log/weirdo/cpuinfo.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Sep 30 23:47:29 np0005463759.novalocal sudo[114504]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:29 np0005463759.novalocal sudo[114512]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-tzohohvtkiprkrxpmtujceqgjlfnutxn ; /usr/bin/python3' Sep 30 23:47:29 np0005463759.novalocal sudo[114512]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:47:29 np0005463759.novalocal python3[114514]: ansible-command Invoked with creates=/var/log/weirdo/df.txt _raw_params=df -h >/var/log/weirdo/df.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Sep 30 23:47:29 np0005463759.novalocal sudo[114512]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:29 np0005463759.novalocal sudo[114519]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ublsjcsnaokgicwhcgeyvrpdhsrweowt ; /usr/bin/python3' Sep 30 23:47:29 np0005463759.novalocal sudo[114519]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:47:30 np0005463759.novalocal python3[114521]: ansible-command Invoked with creates=/var/log/weirdo/dmesg.txt _raw_params=dmesg -T >/var/log/weirdo/dmesg.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Sep 30 23:47:30 np0005463759.novalocal sudo[114519]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:30 np0005463759.novalocal sudo[114526]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-vburkuihsbqmhagnheunupyxselmojtz ; /usr/bin/python3' Sep 30 23:47:30 np0005463759.novalocal sudo[114526]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:47:30 np0005463759.novalocal python3[114528]: ansible-command Invoked with creates=/var/log/weirdo/fdisk.txt _raw_params=fdisk -l >/var/log/weirdo/fdisk.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Sep 30 23:47:30 np0005463759.novalocal sudo[114526]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:30 np0005463759.novalocal sudo[114534]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-dkmhhpyblzfqryktbwcoaaawyhfxrubb ; /usr/bin/python3' Sep 30 23:47:30 np0005463759.novalocal sudo[114534]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:47:30 np0005463759.novalocal python3[114536]: ansible-command Invoked with creates=/var/log/weirdo/getenforce.txt _raw_params=getenforce >/var/log/weirdo/getenforce.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Sep 30 23:47:30 np0005463759.novalocal sudo[114534]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:30 np0005463759.novalocal sudo[114541]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-wqqnnbmjumzinzmocdwiasvrvwmqbcod ; /usr/bin/python3' Sep 30 23:47:30 np0005463759.novalocal sudo[114541]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:47:30 np0005463759.novalocal python3[114545]: ansible-command Invoked with creates=/var/log/weirdo/hosts.txt _raw_params=cat /etc/hosts >/var/log/weirdo/hosts.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Sep 30 23:47:30 np0005463759.novalocal sudo[114541]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:31 np0005463759.novalocal sudo[114550]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-zuhqrgkncmozzxvyugqpuhzzflcmtefn ; /usr/bin/python3' Sep 30 23:47:31 np0005463759.novalocal sudo[114550]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:47:31 np0005463759.novalocal python3[114552]: ansible-command Invoked with creates=/var/log/weirdo/ip.txt _raw_params=ip a >/var/log/weirdo/ip.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Sep 30 23:47:31 np0005463759.novalocal sudo[114550]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:31 np0005463759.novalocal sudo[114557]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-fconxistogppjyjvfiudeljbzchdhmva ; /usr/bin/python3' Sep 30 23:47:31 np0005463759.novalocal sudo[114557]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:47:31 np0005463759.novalocal python3[114559]: ansible-command Invoked with creates=/var/log/weirdo/iptables.txt _raw_params=iptables -vnL >/var/log/weirdo/iptables.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Sep 30 23:47:31 np0005463759.novalocal sudo[114557]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:31 np0005463759.novalocal sudo[114564]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-znniuoppyqvjynzqopbzgmsluxguxifo ; /usr/bin/python3' Sep 30 23:47:31 np0005463759.novalocal sudo[114564]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:47:31 np0005463759.novalocal python3[114566]: ansible-command Invoked with creates=/var/log/weirdo/iptables_nat.txt _raw_params=iptables -vnL -t nat >/var/log/weirdo/iptables_nat.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Sep 30 23:47:31 np0005463759.novalocal sudo[114564]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:31 np0005463759.novalocal sudo[114571]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-yjctqnltazznyjhyqziflilmbcxbohxg ; /usr/bin/python3' Sep 30 23:47:31 np0005463759.novalocal sudo[114571]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:47:31 np0005463759.novalocal python3[114573]: ansible-command Invoked with creates=/var/log/weirdo/iptables_mangle.txt _raw_params=iptables -vnL -t mangle >/var/log/weirdo/iptables_mangle.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None Sep 30 23:47:31 np0005463759.novalocal sudo[114571]: pam_unix(sudo:session): session closed for user root Sep 30 23:47:31 np0005463759.novalocal sudo[114578]: zuul-worker : PWD=/home/zuul-worker/src/review.rdoproject.org/rdo-infra/weirdo/playbooks ; USER=root ; COMMAND=/bin/sh -c 'echo BECOME-SUCCESS-ruqwnxmiifxqmurhrhrscrklxieutzuv ; /usr/bin/python3' Sep 30 23:47:32 np0005463759.novalocal sudo[114578]: pam_unix(sudo:session): session opened for user root(uid=0) by zuul-worker(uid=1000) Sep 30 23:47:32 np0005463759.novalocal python3[114580]: ansible-command Invoked with creates=/var/log/weirdo/journalctl.txt _raw_params=journalctl --no-pager >/var/log/weirdo/journalctl.txt _uses_shell=True warn=True stdin_add_newline=True strip_empty_ends=True argv=None chdir=None executable=None removes=None stdin=None