Jul 15 11:25:07.868059 kernel: Linux version 5.15.188-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Tue Jul 15 10:04:37 -00 2025 Jul 15 11:25:07.868078 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=3fdbb2e3469f90ee764ea38c6fc4332d45967696e3c4fd4a8c65f8d0125b235b Jul 15 11:25:07.868086 kernel: BIOS-provided physical RAM map: Jul 15 11:25:07.868092 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Jul 15 11:25:07.868097 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Jul 15 11:25:07.868102 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Jul 15 11:25:07.868109 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable Jul 15 11:25:07.868114 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved Jul 15 11:25:07.868121 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Jul 15 11:25:07.868127 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Jul 15 11:25:07.868132 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Jul 15 11:25:07.868137 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Jul 15 11:25:07.868143 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Jul 15 11:25:07.868148 kernel: NX (Execute Disable) protection: active Jul 15 11:25:07.868156 kernel: SMBIOS 2.8 present. Jul 15 11:25:07.868163 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Jul 15 11:25:07.868168 kernel: Hypervisor detected: KVM Jul 15 11:25:07.868174 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Jul 15 11:25:07.868180 kernel: kvm-clock: cpu 0, msr 7719b001, primary cpu clock Jul 15 11:25:07.868186 kernel: kvm-clock: using sched offset of 2419059397 cycles Jul 15 11:25:07.868192 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Jul 15 11:25:07.868198 kernel: tsc: Detected 2794.750 MHz processor Jul 15 11:25:07.868205 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 15 11:25:07.868212 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 15 11:25:07.868218 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 Jul 15 11:25:07.868224 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 15 11:25:07.868230 kernel: Using GB pages for direct mapping Jul 15 11:25:07.868236 kernel: ACPI: Early table checksum verification disabled Jul 15 11:25:07.868242 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) Jul 15 11:25:07.868248 kernel: ACPI: RSDT 0x000000009CFE241A 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 15 11:25:07.868254 kernel: ACPI: FACP 0x000000009CFE21FA 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Jul 15 11:25:07.868260 kernel: ACPI: DSDT 0x000000009CFE0040 0021BA (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 15 11:25:07.868267 kernel: ACPI: FACS 0x000000009CFE0000 000040 Jul 15 11:25:07.868273 kernel: ACPI: APIC 0x000000009CFE22EE 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 15 11:25:07.868279 kernel: ACPI: HPET 0x000000009CFE237E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 15 11:25:07.868285 kernel: ACPI: MCFG 0x000000009CFE23B6 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 15 11:25:07.868291 kernel: ACPI: WAET 0x000000009CFE23F2 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 15 11:25:07.868297 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21fa-0x9cfe22ed] Jul 15 11:25:07.868303 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21f9] Jul 15 11:25:07.868310 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Jul 15 11:25:07.868319 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22ee-0x9cfe237d] Jul 15 11:25:07.868325 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe237e-0x9cfe23b5] Jul 15 11:25:07.868331 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23b6-0x9cfe23f1] Jul 15 11:25:07.868338 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23f2-0x9cfe2419] Jul 15 11:25:07.868344 kernel: No NUMA configuration found Jul 15 11:25:07.868351 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] Jul 15 11:25:07.868358 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] Jul 15 11:25:07.868364 kernel: Zone ranges: Jul 15 11:25:07.868371 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 15 11:25:07.868377 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] Jul 15 11:25:07.868384 kernel: Normal empty Jul 15 11:25:07.868390 kernel: Movable zone start for each node Jul 15 11:25:07.868426 kernel: Early memory node ranges Jul 15 11:25:07.868433 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Jul 15 11:25:07.868440 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] Jul 15 11:25:07.868448 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] Jul 15 11:25:07.868454 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 15 11:25:07.868461 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Jul 15 11:25:07.868467 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges Jul 15 11:25:07.868474 kernel: ACPI: PM-Timer IO Port: 0x608 Jul 15 11:25:07.868480 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Jul 15 11:25:07.868487 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Jul 15 11:25:07.868493 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jul 15 11:25:07.868500 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Jul 15 11:25:07.868506 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 15 11:25:07.868514 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Jul 15 11:25:07.868520 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Jul 15 11:25:07.868526 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 15 11:25:07.868533 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Jul 15 11:25:07.868539 kernel: TSC deadline timer available Jul 15 11:25:07.868546 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Jul 15 11:25:07.868552 kernel: kvm-guest: KVM setup pv remote TLB flush Jul 15 11:25:07.868559 kernel: kvm-guest: setup PV sched yield Jul 15 11:25:07.868565 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Jul 15 11:25:07.868572 kernel: Booting paravirtualized kernel on KVM Jul 15 11:25:07.868579 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 15 11:25:07.868586 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Jul 15 11:25:07.868592 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Jul 15 11:25:07.868599 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Jul 15 11:25:07.868605 kernel: pcpu-alloc: [0] 0 1 2 3 Jul 15 11:25:07.868611 kernel: kvm-guest: setup async PF for cpu 0 Jul 15 11:25:07.868618 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 Jul 15 11:25:07.868624 kernel: kvm-guest: PV spinlocks enabled Jul 15 11:25:07.868631 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Jul 15 11:25:07.868638 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632732 Jul 15 11:25:07.868644 kernel: Policy zone: DMA32 Jul 15 11:25:07.868652 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=3fdbb2e3469f90ee764ea38c6fc4332d45967696e3c4fd4a8c65f8d0125b235b Jul 15 11:25:07.868659 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 15 11:25:07.868665 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 15 11:25:07.868672 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 15 11:25:07.868678 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 15 11:25:07.868686 kernel: Memory: 2436696K/2571752K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47476K init, 4104K bss, 134796K reserved, 0K cma-reserved) Jul 15 11:25:07.868693 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Jul 15 11:25:07.868700 kernel: ftrace: allocating 34607 entries in 136 pages Jul 15 11:25:07.868706 kernel: ftrace: allocated 136 pages with 2 groups Jul 15 11:25:07.868719 kernel: rcu: Hierarchical RCU implementation. Jul 15 11:25:07.868726 kernel: rcu: RCU event tracing is enabled. Jul 15 11:25:07.868733 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Jul 15 11:25:07.868739 kernel: Rude variant of Tasks RCU enabled. Jul 15 11:25:07.868746 kernel: Tracing variant of Tasks RCU enabled. Jul 15 11:25:07.868754 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 15 11:25:07.868760 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Jul 15 11:25:07.868767 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Jul 15 11:25:07.868773 kernel: random: crng init done Jul 15 11:25:07.868779 kernel: Console: colour VGA+ 80x25 Jul 15 11:25:07.868786 kernel: printk: console [ttyS0] enabled Jul 15 11:25:07.868792 kernel: ACPI: Core revision 20210730 Jul 15 11:25:07.868799 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Jul 15 11:25:07.868805 kernel: APIC: Switch to symmetric I/O mode setup Jul 15 11:25:07.868813 kernel: x2apic enabled Jul 15 11:25:07.868819 kernel: Switched APIC routing to physical x2apic. Jul 15 11:25:07.868826 kernel: kvm-guest: setup PV IPIs Jul 15 11:25:07.868832 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Jul 15 11:25:07.868839 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Jul 15 11:25:07.868845 kernel: Calibrating delay loop (skipped) preset value.. 5589.50 BogoMIPS (lpj=2794750) Jul 15 11:25:07.868852 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Jul 15 11:25:07.868858 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Jul 15 11:25:07.868865 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Jul 15 11:25:07.868878 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 15 11:25:07.868885 kernel: Spectre V2 : Mitigation: Retpolines Jul 15 11:25:07.868891 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Jul 15 11:25:07.868899 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Jul 15 11:25:07.868906 kernel: RETBleed: Mitigation: untrained return thunk Jul 15 11:25:07.868913 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jul 15 11:25:07.868920 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Jul 15 11:25:07.868927 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 15 11:25:07.868934 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 15 11:25:07.868942 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 15 11:25:07.868949 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 15 11:25:07.868956 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Jul 15 11:25:07.868963 kernel: Freeing SMP alternatives memory: 32K Jul 15 11:25:07.868969 kernel: pid_max: default: 32768 minimum: 301 Jul 15 11:25:07.868976 kernel: LSM: Security Framework initializing Jul 15 11:25:07.868983 kernel: SELinux: Initializing. Jul 15 11:25:07.868991 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 15 11:25:07.868998 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 15 11:25:07.869005 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Jul 15 11:25:07.869011 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Jul 15 11:25:07.869018 kernel: ... version: 0 Jul 15 11:25:07.869025 kernel: ... bit width: 48 Jul 15 11:25:07.869032 kernel: ... generic registers: 6 Jul 15 11:25:07.869038 kernel: ... value mask: 0000ffffffffffff Jul 15 11:25:07.869045 kernel: ... max period: 00007fffffffffff Jul 15 11:25:07.869053 kernel: ... fixed-purpose events: 0 Jul 15 11:25:07.869059 kernel: ... event mask: 000000000000003f Jul 15 11:25:07.869066 kernel: signal: max sigframe size: 1776 Jul 15 11:25:07.869073 kernel: rcu: Hierarchical SRCU implementation. Jul 15 11:25:07.869079 kernel: smp: Bringing up secondary CPUs ... Jul 15 11:25:07.869086 kernel: x86: Booting SMP configuration: Jul 15 11:25:07.869093 kernel: .... node #0, CPUs: #1 Jul 15 11:25:07.869099 kernel: kvm-clock: cpu 1, msr 7719b041, secondary cpu clock Jul 15 11:25:07.869106 kernel: kvm-guest: setup async PF for cpu 1 Jul 15 11:25:07.869113 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 Jul 15 11:25:07.869121 kernel: #2 Jul 15 11:25:07.869128 kernel: kvm-clock: cpu 2, msr 7719b081, secondary cpu clock Jul 15 11:25:07.869134 kernel: kvm-guest: setup async PF for cpu 2 Jul 15 11:25:07.869141 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 Jul 15 11:25:07.869148 kernel: #3 Jul 15 11:25:07.869155 kernel: kvm-clock: cpu 3, msr 7719b0c1, secondary cpu clock Jul 15 11:25:07.869177 kernel: kvm-guest: setup async PF for cpu 3 Jul 15 11:25:07.869188 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 Jul 15 11:25:07.869195 kernel: smp: Brought up 1 node, 4 CPUs Jul 15 11:25:07.869203 kernel: smpboot: Max logical packages: 1 Jul 15 11:25:07.869210 kernel: smpboot: Total of 4 processors activated (22358.00 BogoMIPS) Jul 15 11:25:07.869217 kernel: devtmpfs: initialized Jul 15 11:25:07.869224 kernel: x86/mm: Memory block size: 128MB Jul 15 11:25:07.869231 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 15 11:25:07.869238 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Jul 15 11:25:07.869244 kernel: pinctrl core: initialized pinctrl subsystem Jul 15 11:25:07.869251 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 15 11:25:07.869258 kernel: audit: initializing netlink subsys (disabled) Jul 15 11:25:07.869266 kernel: audit: type=2000 audit(1752578708.288:1): state=initialized audit_enabled=0 res=1 Jul 15 11:25:07.869272 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 15 11:25:07.869279 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 15 11:25:07.869286 kernel: cpuidle: using governor menu Jul 15 11:25:07.869293 kernel: ACPI: bus type PCI registered Jul 15 11:25:07.869299 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 15 11:25:07.869306 kernel: dca service started, version 1.12.1 Jul 15 11:25:07.869313 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Jul 15 11:25:07.869320 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Jul 15 11:25:07.869328 kernel: PCI: Using configuration type 1 for base access Jul 15 11:25:07.869335 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 15 11:25:07.869346 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 15 11:25:07.869353 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 15 11:25:07.869360 kernel: ACPI: Added _OSI(Module Device) Jul 15 11:25:07.869367 kernel: ACPI: Added _OSI(Processor Device) Jul 15 11:25:07.869373 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 15 11:25:07.869380 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 15 11:25:07.869387 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 15 11:25:07.869395 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 15 11:25:07.869411 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 15 11:25:07.869418 kernel: ACPI: Interpreter enabled Jul 15 11:25:07.869425 kernel: ACPI: PM: (supports S0 S3 S5) Jul 15 11:25:07.869431 kernel: ACPI: Using IOAPIC for interrupt routing Jul 15 11:25:07.869438 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 15 11:25:07.869445 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Jul 15 11:25:07.869452 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 15 11:25:07.869564 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 15 11:25:07.869637 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Jul 15 11:25:07.869704 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Jul 15 11:25:07.869721 kernel: PCI host bridge to bus 0000:00 Jul 15 11:25:07.869796 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 15 11:25:07.869859 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jul 15 11:25:07.869919 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 15 11:25:07.874514 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Jul 15 11:25:07.874611 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Jul 15 11:25:07.874673 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] Jul 15 11:25:07.874748 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 15 11:25:07.874830 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Jul 15 11:25:07.874907 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Jul 15 11:25:07.874981 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Jul 15 11:25:07.875054 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Jul 15 11:25:07.875121 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Jul 15 11:25:07.875187 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jul 15 11:25:07.875261 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Jul 15 11:25:07.875331 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] Jul 15 11:25:07.875431 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Jul 15 11:25:07.875509 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Jul 15 11:25:07.875588 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Jul 15 11:25:07.875657 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] Jul 15 11:25:07.875736 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Jul 15 11:25:07.875804 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Jul 15 11:25:07.875877 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Jul 15 11:25:07.875945 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] Jul 15 11:25:07.876017 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Jul 15 11:25:07.876084 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Jul 15 11:25:07.876152 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Jul 15 11:25:07.876225 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Jul 15 11:25:07.876295 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Jul 15 11:25:07.876366 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Jul 15 11:25:07.876453 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] Jul 15 11:25:07.876525 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] Jul 15 11:25:07.876598 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Jul 15 11:25:07.876691 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Jul 15 11:25:07.876702 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Jul 15 11:25:07.876709 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Jul 15 11:25:07.876726 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Jul 15 11:25:07.876733 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Jul 15 11:25:07.876740 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Jul 15 11:25:07.876750 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Jul 15 11:25:07.876757 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Jul 15 11:25:07.876764 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Jul 15 11:25:07.876771 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Jul 15 11:25:07.876779 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Jul 15 11:25:07.876786 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Jul 15 11:25:07.876793 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Jul 15 11:25:07.876813 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Jul 15 11:25:07.876820 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Jul 15 11:25:07.876829 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Jul 15 11:25:07.876836 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Jul 15 11:25:07.876843 kernel: iommu: Default domain type: Translated Jul 15 11:25:07.876851 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 15 11:25:07.876949 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Jul 15 11:25:07.877033 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jul 15 11:25:07.877128 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Jul 15 11:25:07.877138 kernel: vgaarb: loaded Jul 15 11:25:07.877146 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 15 11:25:07.877156 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 15 11:25:07.877175 kernel: PTP clock support registered Jul 15 11:25:07.877182 kernel: PCI: Using ACPI for IRQ routing Jul 15 11:25:07.877190 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 15 11:25:07.877197 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Jul 15 11:25:07.877204 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] Jul 15 11:25:07.877212 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Jul 15 11:25:07.877219 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Jul 15 11:25:07.877228 kernel: clocksource: Switched to clocksource kvm-clock Jul 15 11:25:07.877235 kernel: VFS: Disk quotas dquot_6.6.0 Jul 15 11:25:07.877243 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 15 11:25:07.877250 kernel: pnp: PnP ACPI init Jul 15 11:25:07.877346 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Jul 15 11:25:07.877359 kernel: pnp: PnP ACPI: found 6 devices Jul 15 11:25:07.877367 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 15 11:25:07.877374 kernel: NET: Registered PF_INET protocol family Jul 15 11:25:07.877393 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 15 11:25:07.877415 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jul 15 11:25:07.877422 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 15 11:25:07.877430 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 15 11:25:07.877437 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jul 15 11:25:07.877444 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jul 15 11:25:07.877451 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 15 11:25:07.877458 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 15 11:25:07.877466 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 15 11:25:07.877474 kernel: NET: Registered PF_XDP protocol family Jul 15 11:25:07.877552 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jul 15 11:25:07.877629 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jul 15 11:25:07.877706 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jul 15 11:25:07.877794 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Jul 15 11:25:07.877872 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Jul 15 11:25:07.877975 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] Jul 15 11:25:07.877986 kernel: PCI: CLS 0 bytes, default 64 Jul 15 11:25:07.878006 kernel: Initialise system trusted keyrings Jul 15 11:25:07.878016 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jul 15 11:25:07.878023 kernel: Key type asymmetric registered Jul 15 11:25:07.878030 kernel: Asymmetric key parser 'x509' registered Jul 15 11:25:07.878037 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 15 11:25:07.878056 kernel: io scheduler mq-deadline registered Jul 15 11:25:07.878063 kernel: io scheduler kyber registered Jul 15 11:25:07.878070 kernel: io scheduler bfq registered Jul 15 11:25:07.878077 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 15 11:25:07.878085 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Jul 15 11:25:07.878106 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Jul 15 11:25:07.878113 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Jul 15 11:25:07.878120 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 15 11:25:07.878127 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 15 11:25:07.878134 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Jul 15 11:25:07.878153 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Jul 15 11:25:07.878160 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Jul 15 11:25:07.878167 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Jul 15 11:25:07.878277 kernel: rtc_cmos 00:04: RTC can wake from S4 Jul 15 11:25:07.878375 kernel: rtc_cmos 00:04: registered as rtc0 Jul 15 11:25:07.878476 kernel: rtc_cmos 00:04: setting system clock to 2025-07-15T11:25:07 UTC (1752578707) Jul 15 11:25:07.878568 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Jul 15 11:25:07.878579 kernel: NET: Registered PF_INET6 protocol family Jul 15 11:25:07.878593 kernel: Segment Routing with IPv6 Jul 15 11:25:07.878605 kernel: In-situ OAM (IOAM) with IPv6 Jul 15 11:25:07.878612 kernel: NET: Registered PF_PACKET protocol family Jul 15 11:25:07.878620 kernel: Key type dns_resolver registered Jul 15 11:25:07.878630 kernel: IPI shorthand broadcast: enabled Jul 15 11:25:07.878648 kernel: sched_clock: Marking stable (432539296, 97634845)->(545155877, -14981736) Jul 15 11:25:07.878656 kernel: registered taskstats version 1 Jul 15 11:25:07.878663 kernel: Loading compiled-in X.509 certificates Jul 15 11:25:07.878671 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.188-flatcar: c4b3a19d3bd6de5654dc12075428550cf6251289' Jul 15 11:25:07.878678 kernel: Key type .fscrypt registered Jul 15 11:25:07.878684 kernel: Key type fscrypt-provisioning registered Jul 15 11:25:07.878691 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 15 11:25:07.878700 kernel: ima: Allocated hash algorithm: sha1 Jul 15 11:25:07.878707 kernel: ima: No architecture policies found Jul 15 11:25:07.878725 kernel: clk: Disabling unused clocks Jul 15 11:25:07.878732 kernel: Freeing unused kernel image (initmem) memory: 47476K Jul 15 11:25:07.878740 kernel: Write protecting the kernel read-only data: 28672k Jul 15 11:25:07.878747 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 15 11:25:07.878754 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Jul 15 11:25:07.878761 kernel: Run /init as init process Jul 15 11:25:07.878768 kernel: with arguments: Jul 15 11:25:07.878775 kernel: /init Jul 15 11:25:07.878783 kernel: with environment: Jul 15 11:25:07.878790 kernel: HOME=/ Jul 15 11:25:07.878797 kernel: TERM=linux Jul 15 11:25:07.878804 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 15 11:25:07.878814 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 15 11:25:07.878823 systemd[1]: Detected virtualization kvm. Jul 15 11:25:07.878831 systemd[1]: Detected architecture x86-64. Jul 15 11:25:07.878840 systemd[1]: Running in initrd. Jul 15 11:25:07.878848 systemd[1]: No hostname configured, using default hostname. Jul 15 11:25:07.878855 systemd[1]: Hostname set to . Jul 15 11:25:07.878863 systemd[1]: Initializing machine ID from VM UUID. Jul 15 11:25:07.878871 systemd[1]: Queued start job for default target initrd.target. Jul 15 11:25:07.878878 systemd[1]: Started systemd-ask-password-console.path. Jul 15 11:25:07.878885 systemd[1]: Reached target cryptsetup.target. Jul 15 11:25:07.878893 systemd[1]: Reached target paths.target. Jul 15 11:25:07.878900 systemd[1]: Reached target slices.target. Jul 15 11:25:07.878910 systemd[1]: Reached target swap.target. Jul 15 11:25:07.878925 systemd[1]: Reached target timers.target. Jul 15 11:25:07.878935 systemd[1]: Listening on iscsid.socket. Jul 15 11:25:07.878943 systemd[1]: Listening on iscsiuio.socket. Jul 15 11:25:07.878951 systemd[1]: Listening on systemd-journald-audit.socket. Jul 15 11:25:07.878960 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 15 11:25:07.878968 systemd[1]: Listening on systemd-journald.socket. Jul 15 11:25:07.878976 systemd[1]: Listening on systemd-networkd.socket. Jul 15 11:25:07.878984 systemd[1]: Listening on systemd-udevd-control.socket. Jul 15 11:25:07.878991 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 15 11:25:07.878999 systemd[1]: Reached target sockets.target. Jul 15 11:25:07.879007 systemd[1]: Starting kmod-static-nodes.service... Jul 15 11:25:07.879014 systemd[1]: Finished network-cleanup.service. Jul 15 11:25:07.879022 systemd[1]: Starting systemd-fsck-usr.service... Jul 15 11:25:07.879032 systemd[1]: Starting systemd-journald.service... Jul 15 11:25:07.879039 systemd[1]: Starting systemd-modules-load.service... Jul 15 11:25:07.879047 systemd[1]: Starting systemd-resolved.service... Jul 15 11:25:07.879055 systemd[1]: Starting systemd-vconsole-setup.service... Jul 15 11:25:07.879063 systemd[1]: Finished kmod-static-nodes.service. Jul 15 11:25:07.879070 systemd[1]: Finished systemd-fsck-usr.service. Jul 15 11:25:07.879078 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 15 11:25:07.879086 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 15 11:25:07.879097 systemd-journald[197]: Journal started Jul 15 11:25:07.879143 systemd-journald[197]: Runtime Journal (/run/log/journal/a941fc835d2240908ed5d6503664b055) is 6.0M, max 48.5M, 42.5M free. Jul 15 11:25:07.864957 systemd-modules-load[198]: Inserted module 'overlay' Jul 15 11:25:07.907474 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 15 11:25:07.907496 kernel: Bridge firewalling registered Jul 15 11:25:07.885789 systemd-resolved[199]: Positive Trust Anchors: Jul 15 11:25:07.913284 kernel: audit: type=1130 audit(1752578707.907:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:07.913316 systemd[1]: Started systemd-journald.service. Jul 15 11:25:07.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:07.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:07.885796 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 15 11:25:07.919237 kernel: audit: type=1130 audit(1752578707.913:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:07.919254 kernel: SCSI subsystem initialized Jul 15 11:25:07.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:07.885823 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 15 11:25:07.928392 kernel: audit: type=1130 audit(1752578707.918:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:07.887877 systemd-resolved[199]: Defaulting to hostname 'linux'. Jul 15 11:25:07.936876 kernel: audit: type=1130 audit(1752578707.928:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:07.936891 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 15 11:25:07.936901 kernel: device-mapper: uevent: version 1.0.3 Jul 15 11:25:07.936910 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 15 11:25:07.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:07.896859 systemd-modules-load[198]: Inserted module 'br_netfilter' Jul 15 11:25:07.913575 systemd[1]: Started systemd-resolved.service. Jul 15 11:25:07.919562 systemd[1]: Finished systemd-vconsole-setup.service. Jul 15 11:25:07.944670 kernel: audit: type=1130 audit(1752578707.940:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:07.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:07.928709 systemd[1]: Reached target nss-lookup.target. Jul 15 11:25:07.937803 systemd[1]: Starting dracut-cmdline-ask.service... Jul 15 11:25:07.939513 systemd-modules-load[198]: Inserted module 'dm_multipath' Jul 15 11:25:07.940339 systemd[1]: Finished systemd-modules-load.service. Jul 15 11:25:07.941514 systemd[1]: Starting systemd-sysctl.service... Jul 15 11:25:07.949778 systemd[1]: Finished systemd-sysctl.service. Jul 15 11:25:07.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:07.953433 kernel: audit: type=1130 audit(1752578707.949:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:07.961126 systemd[1]: Finished dracut-cmdline-ask.service. Jul 15 11:25:07.966452 kernel: audit: type=1130 audit(1752578707.960:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:07.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:07.962184 systemd[1]: Starting dracut-cmdline.service... Jul 15 11:25:07.971307 dracut-cmdline[220]: dracut-dracut-053 Jul 15 11:25:07.973325 dracut-cmdline[220]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=3fdbb2e3469f90ee764ea38c6fc4332d45967696e3c4fd4a8c65f8d0125b235b Jul 15 11:25:08.033436 kernel: Loading iSCSI transport class v2.0-870. Jul 15 11:25:08.051425 kernel: iscsi: registered transport (tcp) Jul 15 11:25:08.072752 kernel: iscsi: registered transport (qla4xxx) Jul 15 11:25:08.072790 kernel: QLogic iSCSI HBA Driver Jul 15 11:25:08.100260 systemd[1]: Finished dracut-cmdline.service. Jul 15 11:25:08.105186 kernel: audit: type=1130 audit(1752578708.100:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:08.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:08.101995 systemd[1]: Starting dracut-pre-udev.service... Jul 15 11:25:08.147419 kernel: raid6: avx2x4 gen() 24458 MB/s Jul 15 11:25:08.164420 kernel: raid6: avx2x4 xor() 6823 MB/s Jul 15 11:25:08.181415 kernel: raid6: avx2x2 gen() 28624 MB/s Jul 15 11:25:08.198417 kernel: raid6: avx2x2 xor() 19154 MB/s Jul 15 11:25:08.215418 kernel: raid6: avx2x1 gen() 24099 MB/s Jul 15 11:25:08.232418 kernel: raid6: avx2x1 xor() 15287 MB/s Jul 15 11:25:08.249418 kernel: raid6: sse2x4 gen() 14726 MB/s Jul 15 11:25:08.266418 kernel: raid6: sse2x4 xor() 6974 MB/s Jul 15 11:25:08.283417 kernel: raid6: sse2x2 gen() 16249 MB/s Jul 15 11:25:08.300419 kernel: raid6: sse2x2 xor() 9702 MB/s Jul 15 11:25:08.317420 kernel: raid6: sse2x1 gen() 11960 MB/s Jul 15 11:25:08.334749 kernel: raid6: sse2x1 xor() 7769 MB/s Jul 15 11:25:08.334767 kernel: raid6: using algorithm avx2x2 gen() 28624 MB/s Jul 15 11:25:08.334775 kernel: raid6: .... xor() 19154 MB/s, rmw enabled Jul 15 11:25:08.335432 kernel: raid6: using avx2x2 recovery algorithm Jul 15 11:25:08.347415 kernel: xor: automatically using best checksumming function avx Jul 15 11:25:08.443432 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 15 11:25:08.451544 systemd[1]: Finished dracut-pre-udev.service. Jul 15 11:25:08.455949 kernel: audit: type=1130 audit(1752578708.452:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:08.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:08.455000 audit: BPF prog-id=7 op=LOAD Jul 15 11:25:08.455000 audit: BPF prog-id=8 op=LOAD Jul 15 11:25:08.456290 systemd[1]: Starting systemd-udevd.service... Jul 15 11:25:08.468245 systemd-udevd[400]: Using default interface naming scheme 'v252'. Jul 15 11:25:08.471753 systemd[1]: Started systemd-udevd.service. Jul 15 11:25:08.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:08.474912 systemd[1]: Starting dracut-pre-trigger.service... Jul 15 11:25:08.485679 dracut-pre-trigger[409]: rd.md=0: removing MD RAID activation Jul 15 11:25:08.512336 systemd[1]: Finished dracut-pre-trigger.service. Jul 15 11:25:08.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:08.513820 systemd[1]: Starting systemd-udev-trigger.service... Jul 15 11:25:08.553336 systemd[1]: Finished systemd-udev-trigger.service. Jul 15 11:25:08.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:08.586524 kernel: virtio_blk virtio1: [vda] 9289728 512-byte logical blocks (4.76 GB/4.43 GiB) Jul 15 11:25:08.606930 kernel: cryptd: max_cpu_qlen set to 1000 Jul 15 11:25:08.606948 kernel: libata version 3.00 loaded. Jul 15 11:25:08.606960 kernel: AVX2 version of gcm_enc/dec engaged. Jul 15 11:25:08.606975 kernel: AES CTR mode by8 optimization enabled Jul 15 11:25:08.606985 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 15 11:25:08.620414 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (444) Jul 15 11:25:08.627706 kernel: ahci 0000:00:1f.2: version 3.0 Jul 15 11:25:08.633933 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Jul 15 11:25:08.633951 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Jul 15 11:25:08.634046 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Jul 15 11:25:08.634128 kernel: scsi host0: ahci Jul 15 11:25:08.634230 kernel: scsi host1: ahci Jul 15 11:25:08.634313 kernel: scsi host2: ahci Jul 15 11:25:08.634412 kernel: scsi host3: ahci Jul 15 11:25:08.634497 kernel: scsi host4: ahci Jul 15 11:25:08.634581 kernel: scsi host5: ahci Jul 15 11:25:08.634671 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 Jul 15 11:25:08.634684 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 Jul 15 11:25:08.634703 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 Jul 15 11:25:08.634714 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 Jul 15 11:25:08.634724 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 Jul 15 11:25:08.634734 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 Jul 15 11:25:08.633735 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 15 11:25:08.658083 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 15 11:25:08.663343 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 15 11:25:08.668021 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 15 11:25:08.671735 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 15 11:25:08.674095 systemd[1]: Starting disk-uuid.service... Jul 15 11:25:08.684437 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 15 11:25:08.689427 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 15 11:25:08.947081 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Jul 15 11:25:08.947157 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Jul 15 11:25:08.947178 kernel: ata3.00: applying bridge limits Jul 15 11:25:08.947186 kernel: ata3.00: configured for UDMA/100 Jul 15 11:25:08.947195 kernel: ata1: SATA link down (SStatus 0 SControl 300) Jul 15 11:25:08.948423 kernel: ata5: SATA link down (SStatus 0 SControl 300) Jul 15 11:25:08.949419 kernel: ata2: SATA link down (SStatus 0 SControl 300) Jul 15 11:25:08.950653 kernel: ata4: SATA link down (SStatus 0 SControl 300) Jul 15 11:25:08.950674 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Jul 15 11:25:08.951431 kernel: ata6: SATA link down (SStatus 0 SControl 300) Jul 15 11:25:08.983651 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Jul 15 11:25:09.001138 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Jul 15 11:25:09.001158 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Jul 15 11:25:09.693441 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 15 11:25:09.693612 disk-uuid[526]: The operation has completed successfully. Jul 15 11:25:09.715512 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 15 11:25:09.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:09.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:09.715594 systemd[1]: Finished disk-uuid.service. Jul 15 11:25:09.721873 systemd[1]: Starting verity-setup.service... Jul 15 11:25:09.735428 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Jul 15 11:25:09.753874 systemd[1]: Found device dev-mapper-usr.device. Jul 15 11:25:09.756804 systemd[1]: Mounting sysusr-usr.mount... Jul 15 11:25:09.759634 systemd[1]: Finished verity-setup.service. Jul 15 11:25:09.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:09.821427 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 15 11:25:09.822170 systemd[1]: Mounted sysusr-usr.mount. Jul 15 11:25:09.823928 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 15 11:25:09.826355 systemd[1]: Starting ignition-setup.service... Jul 15 11:25:09.828647 systemd[1]: Starting parse-ip-for-networkd.service... Jul 15 11:25:09.836207 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 15 11:25:09.836267 kernel: BTRFS info (device vda6): using free space tree Jul 15 11:25:09.836280 kernel: BTRFS info (device vda6): has skinny extents Jul 15 11:25:09.844157 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 15 11:25:09.853420 systemd[1]: Finished ignition-setup.service. Jul 15 11:25:09.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:09.855781 systemd[1]: Starting ignition-fetch-offline.service... Jul 15 11:25:09.886634 systemd[1]: Finished parse-ip-for-networkd.service. Jul 15 11:25:09.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:09.888000 audit: BPF prog-id=9 op=LOAD Jul 15 11:25:09.889145 systemd[1]: Starting systemd-networkd.service... Jul 15 11:25:09.898050 ignition[654]: Ignition 2.14.0 Jul 15 11:25:09.898064 ignition[654]: Stage: fetch-offline Jul 15 11:25:09.898123 ignition[654]: no configs at "/usr/lib/ignition/base.d" Jul 15 11:25:09.898135 ignition[654]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 15 11:25:09.898280 ignition[654]: parsed url from cmdline: "" Jul 15 11:25:09.898284 ignition[654]: no config URL provided Jul 15 11:25:09.898291 ignition[654]: reading system config file "/usr/lib/ignition/user.ign" Jul 15 11:25:09.898301 ignition[654]: no config at "/usr/lib/ignition/user.ign" Jul 15 11:25:09.898322 ignition[654]: op(1): [started] loading QEMU firmware config module Jul 15 11:25:09.898344 ignition[654]: op(1): executing: "modprobe" "qemu_fw_cfg" Jul 15 11:25:09.902422 ignition[654]: op(1): [finished] loading QEMU firmware config module Jul 15 11:25:09.902442 ignition[654]: QEMU firmware config was not found. Ignoring... Jul 15 11:25:09.903652 ignition[654]: parsing config with SHA512: 411770e2863cb27cfa64004aa2b5809693a60c346b7ea91559815ff9568d556253c79bc282d41fcd6a621df65e11e8851a7391861b8b42249acce02299fae663 Jul 15 11:25:09.914524 systemd-networkd[719]: lo: Link UP Jul 15 11:25:09.914534 systemd-networkd[719]: lo: Gained carrier Jul 15 11:25:09.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:09.916251 ignition[654]: fetch-offline: fetch-offline passed Jul 15 11:25:09.915058 systemd-networkd[719]: Enumeration completed Jul 15 11:25:09.915307 systemd-networkd[719]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 15 11:25:09.922561 ignition[654]: Ignition finished successfully Jul 15 11:25:09.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:09.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:09.915823 unknown[654]: fetched base config from "system" Jul 15 11:25:09.915832 unknown[654]: fetched user config from "qemu" Jul 15 11:25:09.916712 systemd[1]: Started systemd-networkd.service. Jul 15 11:25:09.917221 systemd-networkd[719]: eth0: Link UP Jul 15 11:25:09.917225 systemd-networkd[719]: eth0: Gained carrier Jul 15 11:25:09.918556 systemd[1]: Reached target network.target. Jul 15 11:25:09.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:09.937636 iscsid[727]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 15 11:25:09.937636 iscsid[727]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 15 11:25:09.937636 iscsid[727]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 15 11:25:09.937636 iscsid[727]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 15 11:25:09.937636 iscsid[727]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 15 11:25:09.937636 iscsid[727]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 15 11:25:09.920934 systemd[1]: Starting iscsiuio.service... Jul 15 11:25:09.939235 ignition[726]: Ignition 2.14.0 Jul 15 11:25:09.923906 systemd[1]: Finished ignition-fetch-offline.service. Jul 15 11:25:09.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:09.939242 ignition[726]: Stage: kargs Jul 15 11:25:09.926349 systemd[1]: Started iscsiuio.service. Jul 15 11:25:09.939358 ignition[726]: no configs at "/usr/lib/ignition/base.d" Jul 15 11:25:09.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:09.927863 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Jul 15 11:25:09.939368 ignition[726]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 15 11:25:09.928757 systemd[1]: Starting ignition-kargs.service... Jul 15 11:25:09.940160 ignition[726]: kargs: kargs passed Jul 15 11:25:09.930486 systemd[1]: Starting iscsid.service... Jul 15 11:25:09.940196 ignition[726]: Ignition finished successfully Jul 15 11:25:09.934905 systemd[1]: Started iscsid.service. Jul 15 11:25:09.935825 systemd-networkd[719]: eth0: DHCPv4 address 10.0.0.5/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 15 11:25:09.937012 systemd[1]: Starting dracut-initqueue.service... Jul 15 11:25:09.950281 systemd[1]: Finished ignition-kargs.service. Jul 15 11:25:09.953771 systemd[1]: Finished dracut-initqueue.service. Jul 15 11:25:09.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:09.972171 ignition[743]: Ignition 2.14.0 Jul 15 11:25:09.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:09.955460 systemd[1]: Reached target remote-fs-pre.target. Jul 15 11:25:09.972178 ignition[743]: Stage: disks Jul 15 11:25:09.957166 systemd[1]: Reached target remote-cryptsetup.target. Jul 15 11:25:09.972275 ignition[743]: no configs at "/usr/lib/ignition/base.d" Jul 15 11:25:09.961216 systemd[1]: Reached target remote-fs.target. Jul 15 11:25:09.972283 ignition[743]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 15 11:25:09.963806 systemd[1]: Starting dracut-pre-mount.service... Jul 15 11:25:09.973333 ignition[743]: disks: disks passed Jul 15 11:25:09.964860 systemd[1]: Starting ignition-disks.service... Jul 15 11:25:09.973369 ignition[743]: Ignition finished successfully Jul 15 11:25:09.966557 systemd-resolved[199]: Detected conflict on linux IN A 10.0.0.5 Jul 15 11:25:09.966569 systemd-resolved[199]: Hostname conflict, changing published hostname from 'linux' to 'linux4'. Jul 15 11:25:09.973112 systemd[1]: Finished dracut-pre-mount.service. Jul 15 11:25:09.974286 systemd[1]: Finished ignition-disks.service. Jul 15 11:25:09.976831 systemd[1]: Reached target initrd-root-device.target. Jul 15 11:25:09.978460 systemd[1]: Reached target local-fs-pre.target. Jul 15 11:25:09.980192 systemd[1]: Reached target local-fs.target. Jul 15 11:25:09.981977 systemd[1]: Reached target sysinit.target. Jul 15 11:25:09.983613 systemd[1]: Reached target basic.target. Jul 15 11:25:09.996975 systemd[1]: Starting systemd-fsck-root.service... Jul 15 11:25:10.004770 systemd-fsck[756]: ROOT: clean, 619/553520 files, 56023/553472 blocks Jul 15 11:25:10.009956 systemd[1]: Finished systemd-fsck-root.service. Jul 15 11:25:10.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.013022 systemd[1]: Mounting sysroot.mount... Jul 15 11:25:10.020415 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 15 11:25:10.020900 systemd[1]: Mounted sysroot.mount. Jul 15 11:25:10.022258 systemd[1]: Reached target initrd-root-fs.target. Jul 15 11:25:10.024613 systemd[1]: Mounting sysroot-usr.mount... Jul 15 11:25:10.026171 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 15 11:25:10.026205 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 15 11:25:10.026223 systemd[1]: Reached target ignition-diskful.target. Jul 15 11:25:10.031426 systemd[1]: Mounted sysroot-usr.mount. Jul 15 11:25:10.033431 systemd[1]: Starting initrd-setup-root.service... Jul 15 11:25:10.037538 initrd-setup-root[766]: cut: /sysroot/etc/passwd: No such file or directory Jul 15 11:25:10.041563 initrd-setup-root[774]: cut: /sysroot/etc/group: No such file or directory Jul 15 11:25:10.045079 initrd-setup-root[782]: cut: /sysroot/etc/shadow: No such file or directory Jul 15 11:25:10.048610 initrd-setup-root[790]: cut: /sysroot/etc/gshadow: No such file or directory Jul 15 11:25:10.074179 systemd[1]: Finished initrd-setup-root.service. Jul 15 11:25:10.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.075989 systemd[1]: Starting ignition-mount.service... Jul 15 11:25:10.076974 systemd[1]: Starting sysroot-boot.service... Jul 15 11:25:10.084661 bash[808]: umount: /sysroot/usr/share/oem: not mounted. Jul 15 11:25:10.092891 systemd[1]: Finished sysroot-boot.service. Jul 15 11:25:10.093806 ignition[809]: INFO : Ignition 2.14.0 Jul 15 11:25:10.093806 ignition[809]: INFO : Stage: mount Jul 15 11:25:10.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.095916 ignition[809]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 15 11:25:10.095916 ignition[809]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 15 11:25:10.098566 ignition[809]: INFO : mount: mount passed Jul 15 11:25:10.099373 ignition[809]: INFO : Ignition finished successfully Jul 15 11:25:10.100765 systemd[1]: Finished ignition-mount.service. Jul 15 11:25:10.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.316826 systemd-resolved[199]: Detected conflict on linux4 IN A 10.0.0.5 Jul 15 11:25:10.316844 systemd-resolved[199]: Hostname conflict, changing published hostname from 'linux4' to 'linux5'. Jul 15 11:25:10.765866 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 15 11:25:10.772096 kernel: BTRFS: device label OEM devid 1 transid 10 /dev/vda6 scanned by mount (819) Jul 15 11:25:10.772118 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Jul 15 11:25:10.772128 kernel: BTRFS info (device vda6): using free space tree Jul 15 11:25:10.772834 kernel: BTRFS info (device vda6): has skinny extents Jul 15 11:25:10.776071 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 15 11:25:10.777393 systemd[1]: Starting ignition-files.service... Jul 15 11:25:10.788596 ignition[839]: INFO : Ignition 2.14.0 Jul 15 11:25:10.788596 ignition[839]: INFO : Stage: files Jul 15 11:25:10.790342 ignition[839]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 15 11:25:10.790342 ignition[839]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 15 11:25:10.790342 ignition[839]: DEBUG : files: compiled without relabeling support, skipping Jul 15 11:25:10.793957 ignition[839]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 15 11:25:10.793957 ignition[839]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 15 11:25:10.793957 ignition[839]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 15 11:25:10.793957 ignition[839]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 15 11:25:10.793957 ignition[839]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 15 11:25:10.793227 unknown[839]: wrote ssh authorized keys file for user: core Jul 15 11:25:10.803115 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 15 11:25:10.803115 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 15 11:25:10.803115 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/systemd/system-generators/torcx-generator" Jul 15 11:25:10.803115 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/systemd/system-generators/torcx-generator" Jul 15 11:25:10.803115 ignition[839]: INFO : files: op(5): [started] processing unit "coreos-metadata.service" Jul 15 11:25:10.803115 ignition[839]: INFO : files: op(5): op(6): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 15 11:25:10.803115 ignition[839]: INFO : files: op(5): op(6): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 15 11:25:10.803115 ignition[839]: INFO : files: op(5): [finished] processing unit "coreos-metadata.service" Jul 15 11:25:10.803115 ignition[839]: INFO : files: op(7): [started] setting preset to disabled for "coreos-metadata.service" Jul 15 11:25:10.803115 ignition[839]: INFO : files: op(7): op(8): [started] removing enablement symlink(s) for "coreos-metadata.service" Jul 15 11:25:10.822671 ignition[839]: INFO : files: op(7): op(8): [finished] removing enablement symlink(s) for "coreos-metadata.service" Jul 15 11:25:10.824926 ignition[839]: INFO : files: op(7): [finished] setting preset to disabled for "coreos-metadata.service" Jul 15 11:25:10.824926 ignition[839]: INFO : files: createResultFile: createFiles: op(9): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 15 11:25:10.824926 ignition[839]: INFO : files: createResultFile: createFiles: op(9): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 15 11:25:10.824926 ignition[839]: INFO : files: files passed Jul 15 11:25:10.824926 ignition[839]: INFO : Ignition finished successfully Jul 15 11:25:10.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.823717 systemd[1]: Finished ignition-files.service. Jul 15 11:25:10.825593 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 15 11:25:10.827195 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 15 11:25:10.840989 initrd-setup-root-after-ignition[863]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Jul 15 11:25:10.827803 systemd[1]: Starting ignition-quench.service... Jul 15 11:25:10.843781 initrd-setup-root-after-ignition[866]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 15 11:25:10.831444 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 15 11:25:10.831520 systemd[1]: Finished ignition-quench.service. Jul 15 11:25:10.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.833448 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 15 11:25:10.835394 systemd[1]: Reached target ignition-complete.target. Jul 15 11:25:10.836907 systemd[1]: Starting initrd-parse-etc.service... Jul 15 11:25:10.846976 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 15 11:25:10.847042 systemd[1]: Finished initrd-parse-etc.service. Jul 15 11:25:10.848187 systemd[1]: Reached target initrd-fs.target. Jul 15 11:25:10.849075 systemd[1]: Reached target initrd.target. Jul 15 11:25:10.849918 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 15 11:25:10.850508 systemd[1]: Starting dracut-pre-pivot.service... Jul 15 11:25:10.859347 systemd[1]: Finished dracut-pre-pivot.service. Jul 15 11:25:10.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.860859 systemd[1]: Starting initrd-cleanup.service... Jul 15 11:25:10.868686 systemd[1]: Stopped target nss-lookup.target. Jul 15 11:25:10.869588 systemd[1]: Stopped target remote-cryptsetup.target. Jul 15 11:25:10.871212 systemd[1]: Stopped target timers.target. Jul 15 11:25:10.872825 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 15 11:25:10.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.872908 systemd[1]: Stopped dracut-pre-pivot.service. Jul 15 11:25:10.874379 systemd[1]: Stopped target initrd.target. Jul 15 11:25:10.875956 systemd[1]: Stopped target basic.target. Jul 15 11:25:10.877547 systemd[1]: Stopped target ignition-complete.target. Jul 15 11:25:10.879095 systemd[1]: Stopped target ignition-diskful.target. Jul 15 11:25:10.880605 systemd[1]: Stopped target initrd-root-device.target. Jul 15 11:25:10.882289 systemd[1]: Stopped target remote-fs.target. Jul 15 11:25:10.883952 systemd[1]: Stopped target remote-fs-pre.target. Jul 15 11:25:10.885584 systemd[1]: Stopped target sysinit.target. Jul 15 11:25:10.887087 systemd[1]: Stopped target local-fs.target. Jul 15 11:25:10.888657 systemd[1]: Stopped target local-fs-pre.target. Jul 15 11:25:10.890352 systemd[1]: Stopped target swap.target. Jul 15 11:25:10.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.892019 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 15 11:25:10.892108 systemd[1]: Stopped dracut-pre-mount.service. Jul 15 11:25:10.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.893831 systemd[1]: Stopped target cryptsetup.target. Jul 15 11:25:10.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.895345 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 15 11:25:10.895436 systemd[1]: Stopped dracut-initqueue.service. Jul 15 11:25:10.897295 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 15 11:25:10.897376 systemd[1]: Stopped ignition-fetch-offline.service. Jul 15 11:25:10.899058 systemd[1]: Stopped target paths.target. Jul 15 11:25:10.900603 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 15 11:25:10.904440 systemd[1]: Stopped systemd-ask-password-console.path. Jul 15 11:25:10.905361 systemd[1]: Stopped target slices.target. Jul 15 11:25:10.906784 systemd[1]: Stopped target sockets.target. Jul 15 11:25:10.908504 systemd[1]: iscsid.socket: Deactivated successfully. Jul 15 11:25:10.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.908583 systemd[1]: Closed iscsid.socket. Jul 15 11:25:10.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.909982 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 15 11:25:10.910062 systemd[1]: Closed iscsiuio.socket. Jul 15 11:25:10.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.911338 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 15 11:25:10.925992 ignition[879]: INFO : Ignition 2.14.0 Jul 15 11:25:10.925992 ignition[879]: INFO : Stage: umount Jul 15 11:25:10.925992 ignition[879]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 15 11:25:10.925992 ignition[879]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 15 11:25:10.925992 ignition[879]: INFO : umount: umount passed Jul 15 11:25:10.925992 ignition[879]: INFO : Ignition finished successfully Jul 15 11:25:10.930000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.911457 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 15 11:25:10.913136 systemd[1]: ignition-files.service: Deactivated successfully. Jul 15 11:25:10.913230 systemd[1]: Stopped ignition-files.service. Jul 15 11:25:10.915367 systemd[1]: Stopping ignition-mount.service... Jul 15 11:25:10.917134 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 15 11:25:10.917243 systemd[1]: Stopped kmod-static-nodes.service. Jul 15 11:25:10.919708 systemd[1]: Stopping sysroot-boot.service... Jul 15 11:25:10.920551 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 15 11:25:10.920694 systemd[1]: Stopped systemd-udev-trigger.service. Jul 15 11:25:10.921884 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 15 11:25:10.921994 systemd[1]: Stopped dracut-pre-trigger.service. Jul 15 11:25:10.929971 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 15 11:25:10.930048 systemd[1]: Stopped ignition-mount.service. Jul 15 11:25:10.945293 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 15 11:25:10.946558 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 15 11:25:10.947465 systemd[1]: Finished initrd-cleanup.service. Jul 15 11:25:10.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.948000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.949062 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 15 11:25:10.949970 systemd[1]: Stopped sysroot-boot.service. Jul 15 11:25:10.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.951447 systemd[1]: Stopped target network.target. Jul 15 11:25:10.952869 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 15 11:25:10.953770 systemd[1]: Stopped ignition-disks.service. Jul 15 11:25:10.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.955219 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 15 11:25:10.955248 systemd[1]: Stopped ignition-kargs.service. Jul 15 11:25:10.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.957480 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 15 11:25:10.957508 systemd[1]: Stopped ignition-setup.service. Jul 15 11:25:10.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.959118 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 15 11:25:10.959900 systemd[1]: Stopped initrd-setup-root.service. Jul 15 11:25:10.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.962366 systemd[1]: Stopping systemd-networkd.service... Jul 15 11:25:10.964018 systemd[1]: Stopping systemd-resolved.service... Jul 15 11:25:10.967437 systemd-networkd[719]: eth0: DHCPv6 lease lost Jul 15 11:25:10.968528 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 15 11:25:10.968604 systemd[1]: Stopped systemd-networkd.service. Jul 15 11:25:10.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.970449 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 15 11:25:10.970474 systemd[1]: Closed systemd-networkd.socket. Jul 15 11:25:10.972959 systemd[1]: Stopping network-cleanup.service... Jul 15 11:25:10.974430 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 15 11:25:10.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.974476 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 15 11:25:10.976000 audit: BPF prog-id=9 op=UNLOAD Jul 15 11:25:10.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.976123 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 15 11:25:10.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.976156 systemd[1]: Stopped systemd-sysctl.service. Jul 15 11:25:10.978873 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 15 11:25:10.978904 systemd[1]: Stopped systemd-modules-load.service. Jul 15 11:25:10.979197 systemd[1]: Stopping systemd-udevd.service... Jul 15 11:25:10.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.982093 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 15 11:25:10.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.984810 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 15 11:25:10.984894 systemd[1]: Stopped systemd-resolved.service. Jul 15 11:25:10.986443 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 15 11:25:10.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.991000 audit: BPF prog-id=6 op=UNLOAD Jul 15 11:25:10.986507 systemd[1]: Stopped network-cleanup.service. Jul 15 11:25:10.989843 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 15 11:25:10.989935 systemd[1]: Stopped systemd-udevd.service. Jul 15 11:25:10.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.992391 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 15 11:25:10.992449 systemd[1]: Closed systemd-udevd-control.socket. Jul 15 11:25:10.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.993929 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 15 11:25:10.993951 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 15 11:25:11.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.995586 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 15 11:25:10.995616 systemd[1]: Stopped dracut-pre-udev.service. Jul 15 11:25:10.997100 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 15 11:25:10.997128 systemd[1]: Stopped dracut-cmdline.service. Jul 15 11:25:11.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:10.998873 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 15 11:25:10.998904 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 15 11:25:11.000924 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 15 11:25:11.002214 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 15 11:25:11.002259 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 15 11:25:11.005677 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 15 11:25:11.005744 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 15 11:25:11.007516 systemd[1]: Reached target initrd-switch-root.target. Jul 15 11:25:11.009482 systemd[1]: Starting initrd-switch-root.service... Jul 15 11:25:11.024714 systemd[1]: Switching root. Jul 15 11:25:11.045337 iscsid[727]: iscsid shutting down. Jul 15 11:25:11.046125 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). Jul 15 11:25:11.046170 systemd-journald[197]: Journal stopped Jul 15 11:25:11.552834 kernel: SELinux: Class mctp_socket not defined in policy. Jul 15 11:25:11.552880 kernel: SELinux: Class anon_inode not defined in policy. Jul 15 11:25:11.552891 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 15 11:25:11.552901 kernel: SELinux: policy capability network_peer_controls=1 Jul 15 11:25:11.552911 kernel: SELinux: policy capability open_perms=1 Jul 15 11:25:11.552920 kernel: SELinux: policy capability extended_socket_class=1 Jul 15 11:25:11.552935 kernel: SELinux: policy capability always_check_network=0 Jul 15 11:25:11.552945 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 15 11:25:11.552959 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 15 11:25:11.552968 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 15 11:25:11.552977 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 15 11:25:11.552988 systemd[1]: Successfully loaded SELinux policy in 37.643ms. Jul 15 11:25:11.553003 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.591ms. Jul 15 11:25:11.553015 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 15 11:25:11.553025 systemd[1]: Detected virtualization kvm. Jul 15 11:25:11.553037 systemd[1]: Detected architecture x86-64. Jul 15 11:25:11.553047 systemd[1]: Detected first boot. Jul 15 11:25:11.553057 systemd[1]: Initializing machine ID from VM UUID. Jul 15 11:25:11.553067 systemd[1]: Populated /etc with preset unit settings. Jul 15 11:25:11.553080 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 15 11:25:11.553091 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 15 11:25:11.553101 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 15 11:25:11.553112 systemd[1]: Stopped iscsiuio.service. Jul 15 11:25:11.553122 systemd[1]: iscsid.service: Deactivated successfully. Jul 15 11:25:11.553131 systemd[1]: Stopped iscsid.service. Jul 15 11:25:11.553142 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 15 11:25:11.553152 systemd[1]: Stopped initrd-switch-root.service. Jul 15 11:25:11.553162 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 15 11:25:11.553172 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 15 11:25:11.553183 systemd[1]: Created slice system-addon\x2drun.slice. Jul 15 11:25:11.553193 systemd[1]: Created slice system-getty.slice. Jul 15 11:25:11.553204 systemd[1]: Created slice system-modprobe.slice. Jul 15 11:25:11.553214 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 15 11:25:11.553225 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 15 11:25:11.553235 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 15 11:25:11.553245 systemd[1]: Created slice user.slice. Jul 15 11:25:11.553256 systemd[1]: Started systemd-ask-password-console.path. Jul 15 11:25:11.553266 systemd[1]: Started systemd-ask-password-wall.path. Jul 15 11:25:11.553276 systemd[1]: Set up automount boot.automount. Jul 15 11:25:11.553286 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 15 11:25:11.553297 systemd[1]: Stopped target initrd-switch-root.target. Jul 15 11:25:11.553308 systemd[1]: Stopped target initrd-fs.target. Jul 15 11:25:11.553318 systemd[1]: Stopped target initrd-root-fs.target. Jul 15 11:25:11.553328 systemd[1]: Reached target integritysetup.target. Jul 15 11:25:11.553338 systemd[1]: Reached target remote-cryptsetup.target. Jul 15 11:25:11.553348 systemd[1]: Reached target remote-fs.target. Jul 15 11:25:11.553358 systemd[1]: Reached target slices.target. Jul 15 11:25:11.553367 systemd[1]: Reached target swap.target. Jul 15 11:25:11.553379 systemd[1]: Reached target veritysetup.target. Jul 15 11:25:11.553392 systemd[1]: Listening on systemd-coredump.socket. Jul 15 11:25:11.553413 systemd[1]: Listening on systemd-initctl.socket. Jul 15 11:25:11.553426 systemd[1]: Listening on systemd-networkd.socket. Jul 15 11:25:11.553437 systemd[1]: Listening on systemd-udevd-control.socket. Jul 15 11:25:11.553447 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 15 11:25:11.553462 systemd[1]: Listening on systemd-userdbd.socket. Jul 15 11:25:11.553478 systemd[1]: Mounting dev-hugepages.mount... Jul 15 11:25:11.553492 systemd[1]: Mounting dev-mqueue.mount... Jul 15 11:25:11.553505 systemd[1]: Mounting media.mount... Jul 15 11:25:11.553516 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:25:11.553528 systemd[1]: Mounting sys-kernel-debug.mount... Jul 15 11:25:11.553541 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 15 11:25:11.553554 systemd[1]: Mounting tmp.mount... Jul 15 11:25:11.553568 systemd[1]: Starting flatcar-tmpfiles.service... Jul 15 11:25:11.553584 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 15 11:25:11.553597 systemd[1]: Starting kmod-static-nodes.service... Jul 15 11:25:11.553619 systemd[1]: Starting modprobe@configfs.service... Jul 15 11:25:11.553633 systemd[1]: Starting modprobe@dm_mod.service... Jul 15 11:25:11.553647 systemd[1]: Starting modprobe@drm.service... Jul 15 11:25:11.553660 systemd[1]: Starting modprobe@efi_pstore.service... Jul 15 11:25:11.553673 systemd[1]: Starting modprobe@fuse.service... Jul 15 11:25:11.553686 systemd[1]: Starting modprobe@loop.service... Jul 15 11:25:11.553697 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 15 11:25:11.553710 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 15 11:25:11.553721 systemd[1]: Stopped systemd-fsck-root.service. Jul 15 11:25:11.553732 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 15 11:25:11.553742 kernel: fuse: init (API version 7.34) Jul 15 11:25:11.553752 kernel: loop: module loaded Jul 15 11:25:11.553762 systemd[1]: Stopped systemd-fsck-usr.service. Jul 15 11:25:11.553772 systemd[1]: Stopped systemd-journald.service. Jul 15 11:25:11.553781 systemd[1]: Starting systemd-journald.service... Jul 15 11:25:11.553791 systemd[1]: Starting systemd-modules-load.service... Jul 15 11:25:11.553802 systemd[1]: Starting systemd-network-generator.service... Jul 15 11:25:11.553813 systemd[1]: Starting systemd-remount-fs.service... Jul 15 11:25:11.553823 systemd[1]: Starting systemd-udev-trigger.service... Jul 15 11:25:11.553833 systemd[1]: verity-setup.service: Deactivated successfully. Jul 15 11:25:11.553844 systemd[1]: Stopped verity-setup.service. Jul 15 11:25:11.553854 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:25:11.553866 systemd-journald[991]: Journal started Jul 15 11:25:11.553902 systemd-journald[991]: Runtime Journal (/run/log/journal/a941fc835d2240908ed5d6503664b055) is 6.0M, max 48.5M, 42.5M free. Jul 15 11:25:11.101000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 15 11:25:11.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 15 11:25:11.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 15 11:25:11.132000 audit: BPF prog-id=10 op=LOAD Jul 15 11:25:11.132000 audit: BPF prog-id=10 op=UNLOAD Jul 15 11:25:11.133000 audit: BPF prog-id=11 op=LOAD Jul 15 11:25:11.133000 audit: BPF prog-id=11 op=UNLOAD Jul 15 11:25:11.424000 audit: BPF prog-id=12 op=LOAD Jul 15 11:25:11.424000 audit: BPF prog-id=3 op=UNLOAD Jul 15 11:25:11.424000 audit: BPF prog-id=13 op=LOAD Jul 15 11:25:11.424000 audit: BPF prog-id=14 op=LOAD Jul 15 11:25:11.424000 audit: BPF prog-id=4 op=UNLOAD Jul 15 11:25:11.425000 audit: BPF prog-id=5 op=UNLOAD Jul 15 11:25:11.425000 audit: BPF prog-id=15 op=LOAD Jul 15 11:25:11.425000 audit: BPF prog-id=12 op=UNLOAD Jul 15 11:25:11.425000 audit: BPF prog-id=16 op=LOAD Jul 15 11:25:11.426000 audit: BPF prog-id=17 op=LOAD Jul 15 11:25:11.426000 audit: BPF prog-id=13 op=UNLOAD Jul 15 11:25:11.426000 audit: BPF prog-id=14 op=UNLOAD Jul 15 11:25:11.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.432000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.440000 audit: BPF prog-id=15 op=UNLOAD Jul 15 11:25:11.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.537000 audit: BPF prog-id=18 op=LOAD Jul 15 11:25:11.537000 audit: BPF prog-id=19 op=LOAD Jul 15 11:25:11.537000 audit: BPF prog-id=20 op=LOAD Jul 15 11:25:11.537000 audit: BPF prog-id=16 op=UNLOAD Jul 15 11:25:11.537000 audit: BPF prog-id=17 op=UNLOAD Jul 15 11:25:11.551000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 15 11:25:11.551000 audit[991]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7fffc61d44c0 a2=4000 a3=7fffc61d455c items=0 ppid=1 pid=991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:11.551000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 15 11:25:11.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.423941 systemd[1]: Queued start job for default target multi-user.target. Jul 15 11:25:11.423951 systemd[1]: Unnecessary job was removed for dev-vda6.device. Jul 15 11:25:11.427309 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 15 11:25:11.559528 systemd[1]: Started systemd-journald.service. Jul 15 11:25:11.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.560215 systemd[1]: Mounted dev-hugepages.mount. Jul 15 11:25:11.561082 systemd[1]: Mounted dev-mqueue.mount. Jul 15 11:25:11.561908 systemd[1]: Mounted media.mount. Jul 15 11:25:11.562681 systemd[1]: Mounted sys-kernel-debug.mount. Jul 15 11:25:11.563551 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 15 11:25:11.564461 systemd[1]: Mounted tmp.mount. Jul 15 11:25:11.565378 systemd[1]: Finished flatcar-tmpfiles.service. Jul 15 11:25:11.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.566514 systemd[1]: Finished kmod-static-nodes.service. Jul 15 11:25:11.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.567589 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 15 11:25:11.567753 systemd[1]: Finished modprobe@configfs.service. Jul 15 11:25:11.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.568828 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 15 11:25:11.568983 systemd[1]: Finished modprobe@dm_mod.service. Jul 15 11:25:11.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.570056 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 15 11:25:11.570203 systemd[1]: Finished modprobe@drm.service. Jul 15 11:25:11.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.571237 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 15 11:25:11.571392 systemd[1]: Finished modprobe@efi_pstore.service. Jul 15 11:25:11.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.572513 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 15 11:25:11.572685 systemd[1]: Finished modprobe@fuse.service. Jul 15 11:25:11.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.573719 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 15 11:25:11.573876 systemd[1]: Finished modprobe@loop.service. Jul 15 11:25:11.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.574913 systemd[1]: Finished systemd-modules-load.service. Jul 15 11:25:11.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.575978 systemd[1]: Finished systemd-network-generator.service. Jul 15 11:25:11.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.577077 systemd[1]: Finished systemd-remount-fs.service. Jul 15 11:25:11.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.578219 systemd[1]: Reached target network-pre.target. Jul 15 11:25:11.579876 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 15 11:25:11.581364 systemd[1]: Mounting sys-kernel-config.mount... Jul 15 11:25:11.582247 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 15 11:25:11.583225 systemd[1]: Starting systemd-hwdb-update.service... Jul 15 11:25:11.584904 systemd[1]: Starting systemd-journal-flush.service... Jul 15 11:25:11.585806 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 15 11:25:11.586528 systemd[1]: Starting systemd-random-seed.service... Jul 15 11:25:11.587436 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 15 11:25:11.588105 systemd[1]: Starting systemd-sysctl.service... Jul 15 11:25:11.590815 systemd-journald[991]: Time spent on flushing to /var/log/journal/a941fc835d2240908ed5d6503664b055 is 14.675ms for 1021 entries. Jul 15 11:25:11.590815 systemd-journald[991]: System Journal (/var/log/journal/a941fc835d2240908ed5d6503664b055) is 8.0M, max 195.6M, 187.6M free. Jul 15 11:25:11.619566 systemd-journald[991]: Received client request to flush runtime journal. Jul 15 11:25:11.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.589760 systemd[1]: Starting systemd-sysusers.service... Jul 15 11:25:11.592604 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 15 11:25:11.593568 systemd[1]: Mounted sys-kernel-config.mount. Jul 15 11:25:11.595217 systemd[1]: Finished systemd-random-seed.service. Jul 15 11:25:11.596349 systemd[1]: Reached target first-boot-complete.target. Jul 15 11:25:11.602826 systemd[1]: Finished systemd-sysusers.service. Jul 15 11:25:11.607661 systemd[1]: Finished systemd-sysctl.service. Jul 15 11:25:11.611820 systemd[1]: Finished systemd-udev-trigger.service. Jul 15 11:25:11.613600 systemd[1]: Starting systemd-udev-settle.service... Jul 15 11:25:11.621185 systemd[1]: Finished systemd-journal-flush.service. Jul 15 11:25:11.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.622312 udevadm[1011]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Jul 15 11:25:11.991702 systemd[1]: Finished systemd-hwdb-update.service. Jul 15 11:25:11.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:11.992000 audit: BPF prog-id=21 op=LOAD Jul 15 11:25:11.992000 audit: BPF prog-id=22 op=LOAD Jul 15 11:25:11.992000 audit: BPF prog-id=7 op=UNLOAD Jul 15 11:25:11.992000 audit: BPF prog-id=8 op=UNLOAD Jul 15 11:25:11.993853 systemd[1]: Starting systemd-udevd.service... Jul 15 11:25:12.012486 systemd-udevd[1012]: Using default interface naming scheme 'v252'. Jul 15 11:25:12.025585 systemd[1]: Started systemd-udevd.service. Jul 15 11:25:12.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.027000 audit: BPF prog-id=23 op=LOAD Jul 15 11:25:12.029178 systemd[1]: Starting systemd-networkd.service... Jul 15 11:25:12.032000 audit: BPF prog-id=24 op=LOAD Jul 15 11:25:12.032000 audit: BPF prog-id=25 op=LOAD Jul 15 11:25:12.032000 audit: BPF prog-id=26 op=LOAD Jul 15 11:25:12.033775 systemd[1]: Starting systemd-userdbd.service... Jul 15 11:25:12.066187 systemd[1]: Started systemd-userdbd.service. Jul 15 11:25:12.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.067573 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Jul 15 11:25:12.081831 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 15 11:25:12.099423 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Jul 15 11:25:12.104422 kernel: ACPI: button: Power Button [PWRF] Jul 15 11:25:12.113175 systemd-networkd[1019]: lo: Link UP Jul 15 11:25:12.113487 systemd-networkd[1019]: lo: Gained carrier Jul 15 11:25:12.113993 systemd-networkd[1019]: Enumeration completed Jul 15 11:25:12.114177 systemd[1]: Started systemd-networkd.service. Jul 15 11:25:12.114190 systemd-networkd[1019]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 15 11:25:12.115348 systemd-networkd[1019]: eth0: Link UP Jul 15 11:25:12.115442 systemd-networkd[1019]: eth0: Gained carrier Jul 15 11:25:12.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.118000 audit[1014]: AVC avc: denied { confidentiality } for pid=1014 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 15 11:25:12.127573 systemd-networkd[1019]: eth0: DHCPv4 address 10.0.0.5/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 15 11:25:12.118000 audit[1014]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a80f6ab9a0 a1=338ac a2=7f7c28887bc5 a3=5 items=110 ppid=1012 pid=1014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:12.118000 audit: CWD cwd="/" Jul 15 11:25:12.118000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=1 name=(null) inode=11932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=2 name=(null) inode=11932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=3 name=(null) inode=11933 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=4 name=(null) inode=11932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=5 name=(null) inode=11934 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=6 name=(null) inode=11932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=7 name=(null) inode=11935 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=8 name=(null) inode=11935 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=9 name=(null) inode=11936 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=10 name=(null) inode=11935 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=11 name=(null) inode=11937 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=12 name=(null) inode=11935 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=13 name=(null) inode=11938 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=14 name=(null) inode=11935 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=15 name=(null) inode=11939 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=16 name=(null) inode=11935 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=17 name=(null) inode=11940 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=18 name=(null) inode=11932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=19 name=(null) inode=11941 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=20 name=(null) inode=11941 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=21 name=(null) inode=11942 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=22 name=(null) inode=11941 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=23 name=(null) inode=11943 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=24 name=(null) inode=11941 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=25 name=(null) inode=11944 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=26 name=(null) inode=11941 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=27 name=(null) inode=11945 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=28 name=(null) inode=11941 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=29 name=(null) inode=11946 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=30 name=(null) inode=11932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=31 name=(null) inode=11947 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=32 name=(null) inode=11947 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=33 name=(null) inode=11948 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=34 name=(null) inode=11947 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=35 name=(null) inode=11949 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=36 name=(null) inode=11947 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=37 name=(null) inode=11950 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=38 name=(null) inode=11947 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=39 name=(null) inode=11951 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=40 name=(null) inode=11947 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=41 name=(null) inode=11952 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=42 name=(null) inode=11932 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=43 name=(null) inode=11953 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=44 name=(null) inode=11953 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=45 name=(null) inode=11954 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=46 name=(null) inode=11953 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=47 name=(null) inode=11955 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=48 name=(null) inode=11953 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=49 name=(null) inode=11956 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=50 name=(null) inode=11953 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=51 name=(null) inode=11957 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=52 name=(null) inode=11953 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=53 name=(null) inode=11958 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=55 name=(null) inode=11959 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=56 name=(null) inode=11959 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=57 name=(null) inode=11960 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=58 name=(null) inode=11959 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=59 name=(null) inode=11961 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=60 name=(null) inode=11959 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=61 name=(null) inode=11962 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=62 name=(null) inode=11962 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=63 name=(null) inode=11963 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=64 name=(null) inode=11962 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=65 name=(null) inode=11964 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=66 name=(null) inode=11962 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=67 name=(null) inode=11965 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=68 name=(null) inode=11962 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=69 name=(null) inode=11966 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=70 name=(null) inode=11962 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=71 name=(null) inode=11967 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=72 name=(null) inode=11959 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=73 name=(null) inode=11968 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=74 name=(null) inode=11968 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=75 name=(null) inode=11969 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=76 name=(null) inode=11968 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=77 name=(null) inode=11970 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=78 name=(null) inode=11968 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=79 name=(null) inode=11971 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=80 name=(null) inode=11968 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=81 name=(null) inode=11972 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=82 name=(null) inode=11968 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=83 name=(null) inode=11973 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=84 name=(null) inode=11959 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=85 name=(null) inode=11974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=86 name=(null) inode=11974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=87 name=(null) inode=11975 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=88 name=(null) inode=11974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=89 name=(null) inode=11976 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=90 name=(null) inode=11974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=91 name=(null) inode=11977 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=92 name=(null) inode=11974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=93 name=(null) inode=11978 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=94 name=(null) inode=11974 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=95 name=(null) inode=11979 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=96 name=(null) inode=11959 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=97 name=(null) inode=11980 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=98 name=(null) inode=11980 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=99 name=(null) inode=11981 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=100 name=(null) inode=11980 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=101 name=(null) inode=11982 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=102 name=(null) inode=11980 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=103 name=(null) inode=11983 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=104 name=(null) inode=11980 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=105 name=(null) inode=11984 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=106 name=(null) inode=11980 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=107 name=(null) inode=11985 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PATH item=109 name=(null) inode=11986 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 15 11:25:12.118000 audit: PROCTITLE proctitle="(udev-worker)" Jul 15 11:25:12.144420 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Jul 15 11:25:12.144848 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Jul 15 11:25:12.144963 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Jul 15 11:25:12.169417 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Jul 15 11:25:12.173419 kernel: mousedev: PS/2 mouse device common for all mice Jul 15 11:25:12.208952 kernel: kvm: Nested Virtualization enabled Jul 15 11:25:12.209049 kernel: SVM: kvm: Nested Paging enabled Jul 15 11:25:12.209085 kernel: SVM: Virtual VMLOAD VMSAVE supported Jul 15 11:25:12.209580 kernel: SVM: Virtual GIF supported Jul 15 11:25:12.225477 kernel: EDAC MC: Ver: 3.0.0 Jul 15 11:25:12.254708 systemd[1]: Finished systemd-udev-settle.service. Jul 15 11:25:12.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.256555 systemd[1]: Starting lvm2-activation-early.service... Jul 15 11:25:12.259467 kernel: kauditd_printk_skb: 249 callbacks suppressed Jul 15 11:25:12.259504 kernel: audit: type=1130 audit(1752578712.255:145): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.263264 lvm[1048]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 15 11:25:12.288013 systemd[1]: Finished lvm2-activation-early.service. Jul 15 11:25:12.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.289003 systemd[1]: Reached target cryptsetup.target. Jul 15 11:25:12.292416 kernel: audit: type=1130 audit(1752578712.288:146): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.293478 systemd[1]: Starting lvm2-activation.service... Jul 15 11:25:12.296088 lvm[1049]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 15 11:25:12.317892 systemd[1]: Finished lvm2-activation.service. Jul 15 11:25:12.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.318813 systemd[1]: Reached target local-fs-pre.target. Jul 15 11:25:12.322428 kernel: audit: type=1130 audit(1752578712.318:147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.322422 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 15 11:25:12.322442 systemd[1]: Reached target local-fs.target. Jul 15 11:25:12.323218 systemd[1]: Reached target machines.target. Jul 15 11:25:12.324874 systemd[1]: Starting ldconfig.service... Jul 15 11:25:12.325867 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 15 11:25:12.325903 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:25:12.326543 systemd[1]: Starting systemd-boot-update.service... Jul 15 11:25:12.328013 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 15 11:25:12.329707 systemd[1]: Starting systemd-machine-id-commit.service... Jul 15 11:25:12.331279 systemd[1]: Starting systemd-sysext.service... Jul 15 11:25:12.332220 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1051 (bootctl) Jul 15 11:25:12.333047 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 15 11:25:12.338442 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 15 11:25:12.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.345603 kernel: audit: type=1130 audit(1752578712.339:148): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.352461 systemd[1]: Unmounting usr-share-oem.mount... Jul 15 11:25:12.357987 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 15 11:25:12.358694 systemd[1]: Finished systemd-machine-id-commit.service. Jul 15 11:25:12.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.360975 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 15 11:25:12.361130 systemd[1]: Unmounted usr-share-oem.mount. Jul 15 11:25:12.366435 kernel: audit: type=1130 audit(1752578712.360:149): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.370846 systemd-fsck[1058]: fsck.fat 4.2 (2021-01-31) Jul 15 11:25:12.370846 systemd-fsck[1058]: /dev/vda1: 790 files, 120725/258078 clusters Jul 15 11:25:12.372541 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 15 11:25:12.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.374971 systemd[1]: Mounting boot.mount... Jul 15 11:25:12.377574 (sd-sysext)[1062]: No suitable extensions found (2 ignored due to incompatible version). Jul 15 11:25:12.379442 kernel: audit: type=1130 audit(1752578712.373:150): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.381987 systemd[1]: Mounted boot.mount. Jul 15 11:25:12.388162 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:25:12.389248 systemd[1]: Mounting usr-share-oem.mount... Jul 15 11:25:12.390180 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 15 11:25:12.391035 systemd[1]: Starting modprobe@dm_mod.service... Jul 15 11:25:12.392655 systemd[1]: Starting modprobe@efi_pstore.service... Jul 15 11:25:12.394395 systemd[1]: Starting modprobe@loop.service... Jul 15 11:25:12.395302 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 15 11:25:12.395416 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:25:12.395512 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:25:12.397277 systemd[1]: Mounted usr-share-oem.mount. Jul 15 11:25:12.398631 systemd[1]: Finished systemd-boot-update.service. Jul 15 11:25:12.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.399903 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 15 11:25:12.399990 systemd[1]: Finished modprobe@dm_mod.service. Jul 15 11:25:12.404425 kernel: audit: type=1130 audit(1752578712.399:151): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.405416 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 15 11:25:12.405507 systemd[1]: Finished modprobe@efi_pstore.service. Jul 15 11:25:12.409415 kernel: audit: type=1130 audit(1752578712.404:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.409451 kernel: audit: type=1131 audit(1752578712.404:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.414517 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 15 11:25:12.414626 systemd[1]: Finished modprobe@loop.service. Jul 15 11:25:12.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.418428 kernel: audit: type=1130 audit(1752578712.413:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.419363 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 15 11:25:12.419454 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 15 11:25:12.420262 systemd[1]: Finished systemd-sysext.service. Jul 15 11:25:12.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.422268 systemd[1]: Starting ensure-sysext.service... Jul 15 11:25:12.424262 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 15 11:25:12.428151 systemd[1]: Reloading. Jul 15 11:25:12.434734 systemd-tmpfiles[1069]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 15 11:25:12.436217 systemd-tmpfiles[1069]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 15 11:25:12.438551 systemd-tmpfiles[1069]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 15 11:25:12.441326 ldconfig[1050]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 15 11:25:12.532482 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 15 11:25:12.532498 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 15 11:25:12.595000 audit: BPF prog-id=27 op=LOAD Jul 15 11:25:12.595000 audit: BPF prog-id=24 op=UNLOAD Jul 15 11:25:12.595000 audit: BPF prog-id=28 op=LOAD Jul 15 11:25:12.595000 audit: BPF prog-id=29 op=LOAD Jul 15 11:25:12.595000 audit: BPF prog-id=25 op=UNLOAD Jul 15 11:25:12.595000 audit: BPF prog-id=26 op=UNLOAD Jul 15 11:25:12.597000 audit: BPF prog-id=30 op=LOAD Jul 15 11:25:12.597000 audit: BPF prog-id=23 op=UNLOAD Jul 15 11:25:12.598000 audit: BPF prog-id=31 op=LOAD Jul 15 11:25:12.598000 audit: BPF prog-id=18 op=UNLOAD Jul 15 11:25:12.598000 audit: BPF prog-id=32 op=LOAD Jul 15 11:25:12.598000 audit: BPF prog-id=33 op=LOAD Jul 15 11:25:12.598000 audit: BPF prog-id=19 op=UNLOAD Jul 15 11:25:12.598000 audit: BPF prog-id=20 op=UNLOAD Jul 15 11:25:12.598000 audit: BPF prog-id=34 op=LOAD Jul 15 11:25:12.598000 audit: BPF prog-id=35 op=LOAD Jul 15 11:25:12.598000 audit: BPF prog-id=21 op=UNLOAD Jul 15 11:25:12.598000 audit: BPF prog-id=22 op=UNLOAD Jul 15 11:25:12.602054 systemd[1]: Finished ldconfig.service. Jul 15 11:25:12.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.603759 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 15 11:25:12.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.607026 systemd[1]: Starting audit-rules.service... Jul 15 11:25:12.608391 systemd[1]: Starting clean-ca-certificates.service... Jul 15 11:25:12.609938 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 15 11:25:12.611000 audit: BPF prog-id=36 op=LOAD Jul 15 11:25:12.612108 systemd[1]: Starting systemd-resolved.service... Jul 15 11:25:12.613000 audit: BPF prog-id=37 op=LOAD Jul 15 11:25:12.613977 systemd[1]: Starting systemd-timesyncd.service... Jul 15 11:25:12.615741 systemd[1]: Starting systemd-update-utmp.service... Jul 15 11:25:12.617290 systemd[1]: Finished clean-ca-certificates.service. Jul 15 11:25:12.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.619000 audit[1137]: SYSTEM_BOOT pid=1137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 15 11:25:12.619817 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 15 11:25:12.622964 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:25:12.623171 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 15 11:25:12.624558 systemd[1]: Starting modprobe@dm_mod.service... Jul 15 11:25:12.626222 systemd[1]: Starting modprobe@efi_pstore.service... Jul 15 11:25:12.627957 systemd[1]: Starting modprobe@loop.service... Jul 15 11:25:12.628699 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 15 11:25:12.628858 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:25:12.628985 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 15 11:25:12.629093 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:25:12.629000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 15 11:25:12.629573 augenrules[1149]: No rules Jul 15 11:25:12.629000 audit[1149]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe23cccd20 a2=420 a3=0 items=0 ppid=1126 pid=1149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:12.629000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 15 11:25:12.630686 systemd[1]: Finished audit-rules.service. Jul 15 11:25:12.631863 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 15 11:25:12.631963 systemd[1]: Finished modprobe@dm_mod.service. Jul 15 11:25:12.633084 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 15 11:25:12.633178 systemd[1]: Finished modprobe@efi_pstore.service. Jul 15 11:25:12.634482 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 15 11:25:12.634589 systemd[1]: Finished modprobe@loop.service. Jul 15 11:25:12.635761 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 15 11:25:12.635886 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 15 11:25:12.636919 systemd[1]: Finished systemd-update-utmp.service. Jul 15 11:25:12.638921 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:25:12.639082 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 15 11:25:12.640309 systemd[1]: Starting modprobe@dm_mod.service... Jul 15 11:25:12.642068 systemd[1]: Starting modprobe@efi_pstore.service... Jul 15 11:25:12.643807 systemd[1]: Starting modprobe@loop.service... Jul 15 11:25:12.644501 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 15 11:25:12.644603 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:25:12.644684 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 15 11:25:12.644744 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:25:12.645520 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 15 11:25:12.646780 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 15 11:25:12.646873 systemd[1]: Finished modprobe@dm_mod.service. Jul 15 11:25:12.647916 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 15 11:25:12.648008 systemd[1]: Finished modprobe@efi_pstore.service. Jul 15 11:25:12.649081 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 15 11:25:12.649170 systemd[1]: Finished modprobe@loop.service. Jul 15 11:25:12.650190 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 15 11:25:12.650275 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 15 11:25:12.651291 systemd[1]: Starting systemd-update-done.service... Jul 15 11:25:12.657528 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:25:12.657716 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 15 11:25:12.658619 systemd[1]: Starting modprobe@dm_mod.service... Jul 15 11:25:12.660195 systemd[1]: Starting modprobe@drm.service... Jul 15 11:25:12.661887 systemd[1]: Starting modprobe@efi_pstore.service... Jul 15 11:25:12.663530 systemd[1]: Starting modprobe@loop.service... Jul 15 11:25:12.664236 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 15 11:25:12.664327 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:25:12.664433 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 15 11:25:12.664499 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 15 11:25:12.665319 systemd[1]: Finished systemd-update-done.service. Jul 15 11:25:12.666642 systemd-resolved[1131]: Positive Trust Anchors: Jul 15 11:25:12.666653 systemd-resolved[1131]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 15 11:25:12.666680 systemd-resolved[1131]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 15 11:25:12.666705 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 15 11:25:12.666868 systemd[1]: Finished modprobe@dm_mod.service. Jul 15 11:25:12.668212 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 15 11:25:12.668342 systemd[1]: Finished modprobe@drm.service. Jul 15 11:25:12.669634 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 15 11:25:12.669780 systemd[1]: Finished modprobe@efi_pstore.service. Jul 15 11:25:12.671104 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 15 11:25:12.671364 systemd[1]: Finished modprobe@loop.service. Jul 15 11:25:12.672570 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 15 11:25:12.672667 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 15 11:25:12.673906 systemd[1]: Finished ensure-sysext.service. Jul 15 11:25:12.675120 systemd-resolved[1131]: Defaulting to hostname 'linux'. Jul 15 11:25:12.676377 systemd[1]: Started systemd-resolved.service. Jul 15 11:25:12.677186 systemd[1]: Reached target network.target. Jul 15 11:25:12.677903 systemd[1]: Reached target nss-lookup.target. Jul 15 11:25:12.684301 systemd[1]: Started systemd-timesyncd.service. Jul 15 11:25:12.685154 systemd[1]: Reached target sysinit.target. Jul 15 11:25:12.685954 systemd[1]: Started motdgen.path. Jul 15 11:25:12.686626 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 15 11:25:13.919237 systemd-timesyncd[1133]: Contacted time server 10.0.0.1:123 (10.0.0.1). Jul 15 11:25:13.919282 systemd-timesyncd[1133]: Initial clock synchronization to Tue 2025-07-15 11:25:13.919159 UTC. Jul 15 11:25:13.919799 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 15 11:25:13.919823 systemd-resolved[1131]: Clock change detected. Flushing caches. Jul 15 11:25:13.920618 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 15 11:25:13.920637 systemd[1]: Reached target paths.target. Jul 15 11:25:13.921304 systemd[1]: Reached target time-set.target. Jul 15 11:25:13.922132 systemd[1]: Started logrotate.timer. Jul 15 11:25:13.922887 systemd[1]: Started mdadm.timer. Jul 15 11:25:13.923523 systemd[1]: Reached target timers.target. Jul 15 11:25:13.924463 systemd[1]: Listening on dbus.socket. Jul 15 11:25:13.926777 systemd[1]: Listening on sshd.socket. Jul 15 11:25:13.927473 systemd[1]: Reached target sockets.target. Jul 15 11:25:13.928254 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:25:13.928274 systemd[1]: Reached target basic.target. Jul 15 11:25:13.929000 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 15 11:25:13.929022 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 15 11:25:13.929751 systemd[1]: Starting dbus.service... Jul 15 11:25:13.931121 systemd[1]: Starting enable-oem-cloudinit.service... Jul 15 11:25:13.932612 systemd[1]: Starting extend-filesystems.service... Jul 15 11:25:13.933519 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 15 11:25:13.934436 systemd[1]: Starting motdgen.service... Jul 15 11:25:13.935979 jq[1165]: false Jul 15 11:25:13.935899 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 15 11:25:13.937774 systemd[1]: Starting sshd-keygen.service... Jul 15 11:25:13.940452 systemd[1]: Starting systemd-logind.service... Jul 15 11:25:13.941153 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 15 11:25:13.941197 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 15 11:25:13.941608 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 15 11:25:13.942823 systemd[1]: Starting update-engine.service... Jul 15 11:25:13.944640 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 15 11:25:13.947852 extend-filesystems[1166]: Found sr0 Jul 15 11:25:13.947852 extend-filesystems[1166]: Found vda Jul 15 11:25:13.947852 extend-filesystems[1166]: Found vda1 Jul 15 11:25:13.947852 extend-filesystems[1166]: Found vda2 Jul 15 11:25:13.947852 extend-filesystems[1166]: Found vda3 Jul 15 11:25:13.947852 extend-filesystems[1166]: Found usr Jul 15 11:25:13.947852 extend-filesystems[1166]: Found vda4 Jul 15 11:25:13.947852 extend-filesystems[1166]: Found vda6 Jul 15 11:25:13.947852 extend-filesystems[1166]: Found vda7 Jul 15 11:25:13.947852 extend-filesystems[1166]: Found vda9 Jul 15 11:25:13.947852 extend-filesystems[1166]: Checking size of /dev/vda9 Jul 15 11:25:13.946452 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 15 11:25:13.954305 dbus-daemon[1164]: [system] SELinux support is enabled Jul 15 11:25:13.975148 extend-filesystems[1166]: Old size kept for /dev/vda9 Jul 15 11:25:13.976685 jq[1178]: true Jul 15 11:25:13.946606 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 15 11:25:13.976914 jq[1181]: true Jul 15 11:25:13.946823 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 15 11:25:13.946945 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 15 11:25:13.954487 systemd[1]: Started dbus.service. Jul 15 11:25:13.957020 systemd[1]: motdgen.service: Deactivated successfully. Jul 15 11:25:13.957143 systemd[1]: Finished motdgen.service. Jul 15 11:25:13.960016 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 15 11:25:13.960034 systemd[1]: Reached target system-config.target. Jul 15 11:25:13.960658 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 15 11:25:13.960670 systemd[1]: Reached target user-config.target. Jul 15 11:25:13.969991 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 15 11:25:13.975087 systemd[1]: Finished extend-filesystems.service. Jul 15 11:25:13.984595 update_engine[1176]: I0715 11:25:13.984474 1176 main.cc:92] Flatcar Update Engine starting Jul 15 11:25:13.987153 systemd[1]: Started update-engine.service. Jul 15 11:25:13.988184 update_engine[1176]: I0715 11:25:13.988166 1176 update_check_scheduler.cc:74] Next update check in 5m48s Jul 15 11:25:13.989429 systemd[1]: Started locksmithd.service. Jul 15 11:25:13.994880 bash[1204]: Updated "/home/core/.ssh/authorized_keys" Jul 15 11:25:13.995379 systemd-logind[1173]: Watching system buttons on /dev/input/event1 (Power Button) Jul 15 11:25:13.995399 systemd-logind[1173]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Jul 15 11:25:13.995970 systemd-logind[1173]: New seat seat0. Jul 15 11:25:13.996747 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 15 11:25:13.999475 systemd[1]: Started systemd-logind.service. Jul 15 11:25:14.017169 locksmithd[1205]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 15 11:25:14.371845 sshd_keygen[1182]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 15 11:25:14.389153 systemd[1]: Finished sshd-keygen.service. Jul 15 11:25:14.391768 systemd[1]: Starting issuegen.service... Jul 15 11:25:14.396240 systemd[1]: issuegen.service: Deactivated successfully. Jul 15 11:25:14.396361 systemd[1]: Finished issuegen.service. Jul 15 11:25:14.398235 systemd[1]: Starting systemd-user-sessions.service... Jul 15 11:25:14.403020 systemd[1]: Finished systemd-user-sessions.service. Jul 15 11:25:14.404982 systemd[1]: Started getty@tty1.service. Jul 15 11:25:14.406683 systemd[1]: Started serial-getty@ttyS0.service. Jul 15 11:25:14.407652 systemd[1]: Reached target getty.target. Jul 15 11:25:14.408535 systemd[1]: Reached target multi-user.target. Jul 15 11:25:14.410149 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 15 11:25:14.416074 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 15 11:25:14.416183 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 15 11:25:14.417240 systemd[1]: Startup finished in 647ms (kernel) + 3.339s (initrd) + 2.122s (userspace) = 6.110s. Jul 15 11:25:14.522448 systemd-networkd[1019]: eth0: Gained IPv6LL Jul 15 11:25:21.884754 systemd[1]: Created slice system-sshd.slice. Jul 15 11:25:21.885731 systemd[1]: Started sshd@0-10.0.0.5:22-10.0.0.1:52482.service. Jul 15 11:25:21.925416 sshd[1225]: Accepted publickey for core from 10.0.0.1 port 52482 ssh2: RSA SHA256:HJCyX8JAQ9OMquuEIVT6BTeEdgkyUqyqBnxnhtHUsbo Jul 15 11:25:21.926802 sshd[1225]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:25:21.935211 systemd-logind[1173]: New session 1 of user core. Jul 15 11:25:21.936393 systemd[1]: Created slice user-500.slice. Jul 15 11:25:21.937601 systemd[1]: Starting user-runtime-dir@500.service... Jul 15 11:25:21.944871 systemd[1]: Finished user-runtime-dir@500.service. Jul 15 11:25:21.946002 systemd[1]: Starting user@500.service... Jul 15 11:25:21.948974 (systemd)[1228]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:25:22.012252 systemd[1228]: Queued start job for default target default.target. Jul 15 11:25:22.012795 systemd[1228]: Reached target paths.target. Jul 15 11:25:22.012820 systemd[1228]: Reached target sockets.target. Jul 15 11:25:22.012836 systemd[1228]: Reached target timers.target. Jul 15 11:25:22.012848 systemd[1228]: Reached target basic.target. Jul 15 11:25:22.012890 systemd[1228]: Reached target default.target. Jul 15 11:25:22.012919 systemd[1228]: Startup finished in 58ms. Jul 15 11:25:22.012980 systemd[1]: Started user@500.service. Jul 15 11:25:22.013989 systemd[1]: Started session-1.scope. Jul 15 11:25:22.064796 systemd[1]: Started sshd@1-10.0.0.5:22-10.0.0.1:52488.service. Jul 15 11:25:22.105712 sshd[1237]: Accepted publickey for core from 10.0.0.1 port 52488 ssh2: RSA SHA256:HJCyX8JAQ9OMquuEIVT6BTeEdgkyUqyqBnxnhtHUsbo Jul 15 11:25:22.106840 sshd[1237]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:25:22.109954 systemd-logind[1173]: New session 2 of user core. Jul 15 11:25:22.110669 systemd[1]: Started session-2.scope. Jul 15 11:25:22.162957 sshd[1237]: pam_unix(sshd:session): session closed for user core Jul 15 11:25:22.165479 systemd[1]: sshd@1-10.0.0.5:22-10.0.0.1:52488.service: Deactivated successfully. Jul 15 11:25:22.165953 systemd[1]: session-2.scope: Deactivated successfully. Jul 15 11:25:22.166400 systemd-logind[1173]: Session 2 logged out. Waiting for processes to exit. Jul 15 11:25:22.167285 systemd[1]: Started sshd@2-10.0.0.5:22-10.0.0.1:52504.service. Jul 15 11:25:22.167915 systemd-logind[1173]: Removed session 2. Jul 15 11:25:22.204806 sshd[1243]: Accepted publickey for core from 10.0.0.1 port 52504 ssh2: RSA SHA256:HJCyX8JAQ9OMquuEIVT6BTeEdgkyUqyqBnxnhtHUsbo Jul 15 11:25:22.205803 sshd[1243]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:25:22.208947 systemd-logind[1173]: New session 3 of user core. Jul 15 11:25:22.209740 systemd[1]: Started session-3.scope. Jul 15 11:25:22.258637 sshd[1243]: pam_unix(sshd:session): session closed for user core Jul 15 11:25:22.261418 systemd[1]: sshd@2-10.0.0.5:22-10.0.0.1:52504.service: Deactivated successfully. Jul 15 11:25:22.261992 systemd[1]: session-3.scope: Deactivated successfully. Jul 15 11:25:22.262522 systemd-logind[1173]: Session 3 logged out. Waiting for processes to exit. Jul 15 11:25:22.263427 systemd[1]: Started sshd@3-10.0.0.5:22-10.0.0.1:52516.service. Jul 15 11:25:22.263965 systemd-logind[1173]: Removed session 3. Jul 15 11:25:22.299551 sshd[1249]: Accepted publickey for core from 10.0.0.1 port 52516 ssh2: RSA SHA256:HJCyX8JAQ9OMquuEIVT6BTeEdgkyUqyqBnxnhtHUsbo Jul 15 11:25:22.300619 sshd[1249]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:25:22.303666 systemd-logind[1173]: New session 4 of user core. Jul 15 11:25:22.304380 systemd[1]: Started session-4.scope. Jul 15 11:25:22.356170 sshd[1249]: pam_unix(sshd:session): session closed for user core Jul 15 11:25:22.358717 systemd[1]: sshd@3-10.0.0.5:22-10.0.0.1:52516.service: Deactivated successfully. Jul 15 11:25:22.359296 systemd[1]: session-4.scope: Deactivated successfully. Jul 15 11:25:22.359852 systemd-logind[1173]: Session 4 logged out. Waiting for processes to exit. Jul 15 11:25:22.360808 systemd[1]: Started sshd@4-10.0.0.5:22-10.0.0.1:52528.service. Jul 15 11:25:22.361546 systemd-logind[1173]: Removed session 4. Jul 15 11:25:22.396544 sshd[1255]: Accepted publickey for core from 10.0.0.1 port 52528 ssh2: RSA SHA256:HJCyX8JAQ9OMquuEIVT6BTeEdgkyUqyqBnxnhtHUsbo Jul 15 11:25:22.397587 sshd[1255]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:25:22.400547 systemd-logind[1173]: New session 5 of user core. Jul 15 11:25:22.401263 systemd[1]: Started session-5.scope. Jul 15 11:25:22.455367 sudo[1258]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 15 11:25:22.455567 sudo[1258]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 15 11:25:22.464573 dbus-daemon[1164]: \xd0]vM\xb9U: received setenforce notice (enforcing=374102336) Jul 15 11:25:22.466690 sudo[1258]: pam_unix(sudo:session): session closed for user root Jul 15 11:25:22.468122 sshd[1255]: pam_unix(sshd:session): session closed for user core Jul 15 11:25:22.470934 systemd[1]: sshd@4-10.0.0.5:22-10.0.0.1:52528.service: Deactivated successfully. Jul 15 11:25:22.471472 systemd[1]: session-5.scope: Deactivated successfully. Jul 15 11:25:22.471914 systemd-logind[1173]: Session 5 logged out. Waiting for processes to exit. Jul 15 11:25:22.472895 systemd[1]: Started sshd@5-10.0.0.5:22-10.0.0.1:52538.service. Jul 15 11:25:22.473473 systemd-logind[1173]: Removed session 5. Jul 15 11:25:22.509366 sshd[1262]: Accepted publickey for core from 10.0.0.1 port 52538 ssh2: RSA SHA256:HJCyX8JAQ9OMquuEIVT6BTeEdgkyUqyqBnxnhtHUsbo Jul 15 11:25:22.510363 sshd[1262]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:25:22.513336 systemd-logind[1173]: New session 6 of user core. Jul 15 11:25:22.514019 systemd[1]: Started session-6.scope. Jul 15 11:25:22.564014 sudo[1266]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 15 11:25:22.564170 sudo[1266]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 15 11:25:22.566276 sudo[1266]: pam_unix(sudo:session): session closed for user root Jul 15 11:25:22.569515 sudo[1265]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 15 11:25:22.569665 sudo[1265]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 15 11:25:22.576946 systemd[1]: Stopping audit-rules.service... Jul 15 11:25:22.577000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 15 11:25:22.578429 auditctl[1269]: No rules Jul 15 11:25:22.578783 systemd[1]: audit-rules.service: Deactivated successfully. Jul 15 11:25:22.578950 systemd[1]: Stopped audit-rules.service. Jul 15 11:25:22.579056 kernel: kauditd_printk_skb: 31 callbacks suppressed Jul 15 11:25:22.579084 kernel: audit: type=1305 audit(1752578722.577:184): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 15 11:25:22.580496 systemd[1]: Starting audit-rules.service... Jul 15 11:25:22.577000 audit[1269]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe8180f0c0 a2=420 a3=0 items=0 ppid=1 pid=1269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:22.585056 kernel: audit: type=1300 audit(1752578722.577:184): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe8180f0c0 a2=420 a3=0 items=0 ppid=1 pid=1269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:22.585088 kernel: audit: type=1327 audit(1752578722.577:184): proctitle=2F7362696E2F617564697463746C002D44 Jul 15 11:25:22.577000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 15 11:25:22.586948 kernel: audit: type=1131 audit(1752578722.578:185): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:22.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:22.597676 augenrules[1286]: No rules Jul 15 11:25:22.598245 systemd[1]: Finished audit-rules.service. Jul 15 11:25:22.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:22.599108 sudo[1265]: pam_unix(sudo:session): session closed for user root Jul 15 11:25:22.600450 sshd[1262]: pam_unix(sshd:session): session closed for user core Jul 15 11:25:22.598000 audit[1265]: USER_END pid=1265 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:22.603123 systemd[1]: sshd@5-10.0.0.5:22-10.0.0.1:52538.service: Deactivated successfully. Jul 15 11:25:22.603586 systemd[1]: session-6.scope: Deactivated successfully. Jul 15 11:25:22.604092 systemd-logind[1173]: Session 6 logged out. Waiting for processes to exit. Jul 15 11:25:22.606367 kernel: audit: type=1130 audit(1752578722.598:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:22.606464 kernel: audit: type=1106 audit(1752578722.598:187): pid=1265 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:22.606482 kernel: audit: type=1104 audit(1752578722.598:188): pid=1265 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:22.598000 audit[1265]: CRED_DISP pid=1265 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:22.605185 systemd[1]: Started sshd@6-10.0.0.5:22-10.0.0.1:52546.service. Jul 15 11:25:22.606019 systemd-logind[1173]: Removed session 6. Jul 15 11:25:22.609089 kernel: audit: type=1106 audit(1752578722.598:189): pid=1262 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:22.598000 audit[1262]: USER_END pid=1262 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:22.613188 kernel: audit: type=1104 audit(1752578722.598:190): pid=1262 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:22.598000 audit[1262]: CRED_DISP pid=1262 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:22.616408 kernel: audit: type=1131 audit(1752578722.601:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.5:22-10.0.0.1:52538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:22.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.5:22-10.0.0.1:52538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:22.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.5:22-10.0.0.1:52546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:22.644000 audit[1292]: USER_ACCT pid=1292 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:22.645216 sshd[1292]: Accepted publickey for core from 10.0.0.1 port 52546 ssh2: RSA SHA256:HJCyX8JAQ9OMquuEIVT6BTeEdgkyUqyqBnxnhtHUsbo Jul 15 11:25:22.645000 audit[1292]: CRED_ACQ pid=1292 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:22.645000 audit[1292]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff93073010 a2=3 a3=0 items=0 ppid=1 pid=1292 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:22.645000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 15 11:25:22.646246 sshd[1292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:25:22.649706 systemd-logind[1173]: New session 7 of user core. Jul 15 11:25:22.650389 systemd[1]: Started session-7.scope. Jul 15 11:25:22.653000 audit[1292]: USER_START pid=1292 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:22.654000 audit[1294]: CRED_ACQ pid=1294 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:22.700060 sshd[1292]: pam_unix(sshd:session): session closed for user core Jul 15 11:25:22.700000 audit[1292]: USER_END pid=1292 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:22.700000 audit[1292]: CRED_DISP pid=1292 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:22.702798 systemd[1]: sshd@6-10.0.0.5:22-10.0.0.1:52546.service: Deactivated successfully. Jul 15 11:25:22.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.5:22-10.0.0.1:52546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:22.703280 systemd[1]: session-7.scope: Deactivated successfully. Jul 15 11:25:22.703738 systemd-logind[1173]: Session 7 logged out. Waiting for processes to exit. Jul 15 11:25:22.704726 systemd[1]: Started sshd@7-10.0.0.5:22-10.0.0.1:52556.service. Jul 15 11:25:22.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.5:22-10.0.0.1:52556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:22.705457 systemd-logind[1173]: Removed session 7. Jul 15 11:25:22.741000 audit[1299]: USER_ACCT pid=1299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:22.741475 sshd[1299]: Accepted publickey for core from 10.0.0.1 port 52556 ssh2: RSA SHA256:HJCyX8JAQ9OMquuEIVT6BTeEdgkyUqyqBnxnhtHUsbo Jul 15 11:25:22.741000 audit[1299]: CRED_ACQ pid=1299 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:22.741000 audit[1299]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5a4719e0 a2=3 a3=0 items=0 ppid=1 pid=1299 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:22.741000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 15 11:25:22.742385 sshd[1299]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:25:22.745352 systemd-logind[1173]: New session 8 of user core. Jul 15 11:25:22.746049 systemd[1]: Started session-8.scope. Jul 15 11:25:22.748000 audit[1299]: USER_START pid=1299 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:22.749000 audit[1301]: CRED_ACQ pid=1301 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:23.378712 sshd[1299]: pam_unix(sshd:session): session closed for user core Jul 15 11:25:23.379000 audit[1299]: USER_END pid=1299 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:23.379000 audit[1299]: CRED_DISP pid=1299 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:23.381768 systemd[1]: sshd@7-10.0.0.5:22-10.0.0.1:52556.service: Deactivated successfully. Jul 15 11:25:23.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.5:22-10.0.0.1:52556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:23.382414 systemd[1]: session-8.scope: Deactivated successfully. Jul 15 11:25:23.382851 systemd-logind[1173]: Session 8 logged out. Waiting for processes to exit. Jul 15 11:25:23.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.5:22-10.0.0.1:52560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:23.384028 systemd[1]: Started sshd@8-10.0.0.5:22-10.0.0.1:52560.service. Jul 15 11:25:23.384785 systemd-logind[1173]: Removed session 8. Jul 15 11:25:23.419000 audit[1314]: USER_ACCT pid=1314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:23.420162 sshd[1314]: Accepted publickey for core from 10.0.0.1 port 52560 ssh2: RSA SHA256:HJCyX8JAQ9OMquuEIVT6BTeEdgkyUqyqBnxnhtHUsbo Jul 15 11:25:23.420000 audit[1314]: CRED_ACQ pid=1314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:23.420000 audit[1314]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4d85a5d0 a2=3 a3=0 items=0 ppid=1 pid=1314 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:23.420000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 15 11:25:23.421133 sshd[1314]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:25:23.424054 systemd-logind[1173]: New session 9 of user core. Jul 15 11:25:23.424765 systemd[1]: Started session-9.scope. Jul 15 11:25:23.427000 audit[1314]: USER_START pid=1314 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:23.428000 audit[1316]: CRED_ACQ pid=1316 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:29.369000 audit[1317]: USER_ACCT pid=1317 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.370005 sudo[1317]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/mv docker.raw containerd.raw /etc/extensions/ Jul 15 11:25:29.370164 sudo[1317]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 15 11:25:29.370757 kernel: kauditd_printk_skb: 30 callbacks suppressed Jul 15 11:25:29.370793 kernel: audit: type=1101 audit(1752578729.369:216): pid=1317 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.372465 sudo[1317]: pam_unix(sudo:session): session closed for user root Jul 15 11:25:29.373283 sshd[1314]: pam_unix(sshd:session): session closed for user core Jul 15 11:25:29.377232 kernel: audit: type=1110 audit(1752578729.369:217): pid=1317 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.377287 kernel: audit: type=1105 audit(1752578729.371:218): pid=1317 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.369000 audit[1317]: CRED_REFR pid=1317 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.371000 audit[1317]: USER_START pid=1317 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.376139 systemd[1]: Started sshd@9-10.0.0.5:22-10.0.0.1:52568.service. Jul 15 11:25:29.376506 systemd[1]: sshd@8-10.0.0.5:22-10.0.0.1:52560.service: Deactivated successfully. Jul 15 11:25:29.376944 systemd[1]: session-9.scope: Deactivated successfully. Jul 15 11:25:29.377036 systemd[1]: session-9.scope: Consumed 3.747s CPU time. Jul 15 11:25:29.377932 systemd-logind[1173]: Session 9 logged out. Waiting for processes to exit. Jul 15 11:25:29.378748 systemd-logind[1173]: Removed session 9. Jul 15 11:25:29.380559 kernel: audit: type=1106 audit(1752578729.372:219): pid=1317 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.372000 audit[1317]: USER_END pid=1317 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.383949 kernel: audit: type=1104 audit(1752578729.372:220): pid=1317 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.372000 audit[1317]: CRED_DISP pid=1317 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.386961 kernel: audit: type=1106 audit(1752578729.373:221): pid=1314 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:29.373000 audit[1314]: USER_END pid=1314 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:29.374000 audit[1314]: CRED_DISP pid=1314 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:29.394306 kernel: audit: type=1104 audit(1752578729.374:222): pid=1314 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:29.394363 kernel: audit: type=1130 audit(1752578729.375:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.5:22-10.0.0.1:52568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.5:22-10.0.0.1:52568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.397422 kernel: audit: type=1131 audit(1752578729.376:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.5:22-10.0.0.1:52560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.5:22-10.0.0.1:52560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.415000 audit[1373]: USER_ACCT pid=1373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:29.415575 sshd[1373]: Accepted publickey for core from 10.0.0.1 port 52568 ssh2: RSA SHA256:HJCyX8JAQ9OMquuEIVT6BTeEdgkyUqyqBnxnhtHUsbo Jul 15 11:25:29.417763 sshd[1373]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:25:29.415000 audit[1373]: CRED_ACQ pid=1373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:29.415000 audit[1373]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9d78faa0 a2=3 a3=0 items=0 ppid=1 pid=1373 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:29.415000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 15 11:25:29.419363 kernel: audit: type=1101 audit(1752578729.415:225): pid=1373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:29.420923 systemd-logind[1173]: New session 10 of user core. Jul 15 11:25:29.421671 systemd[1]: Started session-10.scope. Jul 15 11:25:29.424000 audit[1373]: USER_START pid=1373 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:29.425000 audit[1376]: CRED_ACQ pid=1376 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:29.471000 audit[1377]: USER_ACCT pid=1377 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.471000 audit[1377]: CRED_REFR pid=1377 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.472085 sudo[1377]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart systemd-sysext Jul 15 11:25:29.472242 sudo[1377]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 15 11:25:29.473000 audit[1377]: USER_START pid=1377 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.478613 systemd[1]: ensure-sysext.service: Deactivated successfully. Jul 15 11:25:29.478765 systemd[1]: Stopped ensure-sysext.service. Jul 15 11:25:29.478814 systemd[1]: Stopping ensure-sysext.service... Jul 15 11:25:29.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.479926 systemd[1]: Stopping systemd-sysext.service... Jul 15 11:25:29.488731 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 15 11:25:29.488912 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 15 11:25:29.490477 systemd[1]: systemd-sysext.service: Deactivated successfully. Jul 15 11:25:29.490644 systemd[1]: Stopped systemd-sysext.service. Jul 15 11:25:29.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.491975 systemd[1]: Starting systemd-sysext.service... Jul 15 11:25:29.496652 systemd[1]: Unmounting usr-share-oem.mount... Jul 15 11:25:29.500161 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 15 11:25:29.500307 systemd[1]: Unmounted usr-share-oem.mount. Jul 15 11:25:29.507342 kernel: loop0: detected capacity change from 0 to 301320 Jul 15 11:25:29.512340 kernel: EXT4-fs (loop0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 15 11:25:29.525337 kernel: loop1: detected capacity change from 0 to 322896 Jul 15 11:25:29.529349 kernel: EXT4-fs (loop1): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 15 11:25:29.541356 kernel: loop2: detected capacity change from 0 to 301320 Jul 15 11:25:29.546787 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 15 11:25:29.546832 kernel: loop3: detected capacity change from 0 to 322896 Jul 15 11:25:29.551961 (sd-sysext)[1390]: Using extensions 'containerd', 'docker'. Jul 15 11:25:29.552353 kernel: EXT4-fs (loop3): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 15 11:25:29.552359 (sd-sysext)[1390]: Merged extensions into '/usr'. Jul 15 11:25:29.569224 systemd[1]: Mounting usr-share-oem.mount... Jul 15 11:25:29.574254 systemd[1]: Mounted usr-share-oem.mount. Jul 15 11:25:29.575205 systemd[1]: Finished systemd-sysext.service. Jul 15 11:25:29.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.575997 sudo[1377]: pam_unix(sudo:session): session closed for user root Jul 15 11:25:29.576029 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 15 11:25:29.576114 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 15 11:25:29.575000 audit[1377]: USER_END pid=1377 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.575000 audit[1377]: CRED_DISP pid=1377 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.577126 systemd[1]: Starting ensure-sysext.service... Jul 15 11:25:29.578039 sshd[1373]: pam_unix(sshd:session): session closed for user core Jul 15 11:25:29.578000 audit[1373]: USER_END pid=1373 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:29.578000 audit[1373]: CRED_DISP pid=1373 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:29.580776 systemd[1]: Started sshd@10-10.0.0.5:22-10.0.0.1:52574.service. Jul 15 11:25:29.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.5:22-10.0.0.1:52574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.581236 systemd[1]: sshd@9-10.0.0.5:22-10.0.0.1:52568.service: Deactivated successfully. Jul 15 11:25:29.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.5:22-10.0.0.1:52568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.581754 systemd[1]: session-10.scope: Deactivated successfully. Jul 15 11:25:29.583656 systemd-logind[1173]: Session 10 logged out. Waiting for processes to exit. Jul 15 11:25:29.583689 systemd[1]: Reloading. Jul 15 11:25:29.707851 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 15 11:25:29.707873 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 15 11:25:29.726950 systemd[1]: /usr/lib/systemd/system/docker.socket:5: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit: BPF prog-id=43 op=LOAD Jul 15 11:25:29.789000 audit: BPF prog-id=27 op=UNLOAD Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit: BPF prog-id=44 op=LOAD Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.789000 audit: BPF prog-id=45 op=LOAD Jul 15 11:25:29.789000 audit: BPF prog-id=28 op=UNLOAD Jul 15 11:25:29.789000 audit: BPF prog-id=29 op=UNLOAD Jul 15 11:25:29.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.790000 audit: BPF prog-id=46 op=LOAD Jul 15 11:25:29.790000 audit: BPF prog-id=36 op=UNLOAD Jul 15 11:25:29.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.791000 audit: BPF prog-id=47 op=LOAD Jul 15 11:25:29.791000 audit: BPF prog-id=37 op=UNLOAD Jul 15 11:25:29.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.792000 audit: BPF prog-id=48 op=LOAD Jul 15 11:25:29.792000 audit: BPF prog-id=41 op=UNLOAD Jul 15 11:25:29.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.793000 audit: BPF prog-id=49 op=LOAD Jul 15 11:25:29.793000 audit: BPF prog-id=30 op=UNLOAD Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit: BPF prog-id=50 op=LOAD Jul 15 11:25:29.794000 audit: BPF prog-id=31 op=UNLOAD Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit: BPF prog-id=51 op=LOAD Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.794000 audit: BPF prog-id=52 op=LOAD Jul 15 11:25:29.794000 audit: BPF prog-id=32 op=UNLOAD Jul 15 11:25:29.794000 audit: BPF prog-id=33 op=UNLOAD Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit: BPF prog-id=53 op=LOAD Jul 15 11:25:29.795000 audit: BPF prog-id=38 op=UNLOAD Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit: BPF prog-id=54 op=LOAD Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.795000 audit: BPF prog-id=55 op=LOAD Jul 15 11:25:29.795000 audit: BPF prog-id=39 op=UNLOAD Jul 15 11:25:29.795000 audit: BPF prog-id=40 op=UNLOAD Jul 15 11:25:29.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.796000 audit: BPF prog-id=56 op=LOAD Jul 15 11:25:29.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:29.796000 audit: BPF prog-id=57 op=LOAD Jul 15 11:25:29.796000 audit: BPF prog-id=34 op=UNLOAD Jul 15 11:25:29.796000 audit: BPF prog-id=35 op=UNLOAD Jul 15 11:25:29.803898 systemd-logind[1173]: Removed session 10. Jul 15 11:25:29.805049 systemd[1]: Starting docker.socket... Jul 15 11:25:29.806027 systemd[1]: Starting containerd.service... Jul 15 11:25:29.806293 systemd[1]: Listening on docker.socket. Jul 15 11:25:29.809627 systemd[1]: Stopped target sockets.target. Jul 15 11:25:29.809649 systemd[1]: Stopping sockets.target... Jul 15 11:25:29.809724 systemd[1]: Reached target sockets.target. Jul 15 11:25:29.810598 systemd[1]: Started containerd.service. Jul 15 11:25:29.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=containerd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.811774 systemd[1]: Stopped target timers.target. Jul 15 11:25:29.811792 systemd[1]: Stopping timers.target... Jul 15 11:25:29.811861 systemd[1]: Reached target timers.target. Jul 15 11:25:29.813571 systemd[1]: Stopped target multi-user.target. Jul 15 11:25:29.813586 systemd[1]: Stopping multi-user.target... Jul 15 11:25:29.813603 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 15 11:25:29.814708 systemd[1]: Starting enable-oem-cloudinit.service... Jul 15 11:25:29.815788 systemd[1]: Starting extend-filesystems.service... Jul 15 11:25:29.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=enable-oem-cloudinit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=enable-oem-cloudinit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.820952 jq[1460]: false Jul 15 11:25:29.816838 systemd[1]: Starting issuegen.service... Jul 15 11:25:29.817872 systemd[1]: Starting motdgen.service... Jul 15 11:25:29.818928 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 15 11:25:29.818966 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 15 11:25:29.820144 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 15 11:25:29.820253 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 15 11:25:29.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.821794 systemd[1]: Finished ensure-sysext.service. Jul 15 11:25:29.823727 systemd[1]: issuegen.service: Deactivated successfully. Jul 15 11:25:29.823845 systemd[1]: Finished issuegen.service. Jul 15 11:25:29.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=issuegen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=issuegen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.824203 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 15 11:25:29.824660 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 15 11:25:29.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ssh-key-proc-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ssh-key-proc-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.825295 extend-filesystems[1461]: Found loop2 Jul 15 11:25:29.825576 extend-filesystems[1461]: Found loop3 Jul 15 11:25:29.825576 extend-filesystems[1461]: Found sr0 Jul 15 11:25:29.825576 extend-filesystems[1461]: Found vda Jul 15 11:25:29.825576 extend-filesystems[1461]: Found vda1 Jul 15 11:25:29.825576 extend-filesystems[1461]: Found vda2 Jul 15 11:25:29.825576 extend-filesystems[1461]: Found vda3 Jul 15 11:25:29.825576 extend-filesystems[1461]: Found usr Jul 15 11:25:29.825576 extend-filesystems[1461]: Found vda4 Jul 15 11:25:29.825576 extend-filesystems[1461]: Found vda6 Jul 15 11:25:29.827184 extend-filesystems[1461]: Found vda7 Jul 15 11:25:29.827184 extend-filesystems[1461]: Found vda9 Jul 15 11:25:29.827184 extend-filesystems[1461]: Checking size of /dev/vda9 Jul 15 11:25:29.837864 systemd[1]: motdgen.service: Deactivated successfully. Jul 15 11:25:29.837994 systemd[1]: Finished motdgen.service. Jul 15 11:25:29.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=motdgen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=motdgen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.844482 extend-filesystems[1461]: Old size kept for /dev/vda9 Jul 15 11:25:29.844375 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 15 11:25:29.844497 systemd[1]: Finished extend-filesystems.service. Jul 15 11:25:29.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=extend-filesystems comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=extend-filesystems comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.844728 systemd[1]: Reached target multi-user.target. Jul 15 11:25:29.845884 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 15 11:25:29.854555 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 15 11:25:29.854670 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 15 11:25:29.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.859000 audit[1397]: USER_ACCT pid=1397 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:29.860019 sshd[1397]: Accepted publickey for core from 10.0.0.1 port 52574 ssh2: RSA SHA256:HJCyX8JAQ9OMquuEIVT6BTeEdgkyUqyqBnxnhtHUsbo Jul 15 11:25:29.860000 audit[1397]: CRED_ACQ pid=1397 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:29.860000 audit[1397]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7e1acfe0 a2=3 a3=0 items=0 ppid=1 pid=1397 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:29.860000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 15 11:25:29.861203 sshd[1397]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:25:29.866379 systemd-logind[1173]: New session 11 of user core. Jul 15 11:25:29.866944 systemd[1]: Started session-11.scope. Jul 15 11:25:29.871000 audit[1397]: USER_START pid=1397 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:29.872000 audit[1492]: CRED_ACQ pid=1492 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:29.876580 containerd[1459]: time="2025-07-15T11:25:29.876514833Z" level=info msg="starting containerd" revision=1c90a442489720eec95342e1789ee8a5e1b9536f version=v1.6.9 Jul 15 11:25:29.892274 containerd[1459]: time="2025-07-15T11:25:29.892240649Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 15 11:25:29.892373 containerd[1459]: time="2025-07-15T11:25:29.892347850Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 15 11:25:29.893621 containerd[1459]: time="2025-07-15T11:25:29.893582575Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.188-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 15 11:25:29.893621 containerd[1459]: time="2025-07-15T11:25:29.893611739Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 15 11:25:29.893780 containerd[1459]: time="2025-07-15T11:25:29.893755890Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 15 11:25:29.893780 containerd[1459]: time="2025-07-15T11:25:29.893774635Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 15 11:25:29.893850 containerd[1459]: time="2025-07-15T11:25:29.893786537Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 15 11:25:29.893850 containerd[1459]: time="2025-07-15T11:25:29.893795514Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 15 11:25:29.893894 containerd[1459]: time="2025-07-15T11:25:29.893853152Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 15 11:25:29.894354 containerd[1459]: time="2025-07-15T11:25:29.894316861Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 15 11:25:29.894472 containerd[1459]: time="2025-07-15T11:25:29.894441766Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 15 11:25:29.894472 containerd[1459]: time="2025-07-15T11:25:29.894460370Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 15 11:25:29.894541 containerd[1459]: time="2025-07-15T11:25:29.894498662Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 15 11:25:29.894541 containerd[1459]: time="2025-07-15T11:25:29.894510164Z" level=info msg="metadata content store policy set" policy=shared Jul 15 11:25:29.900523 containerd[1459]: time="2025-07-15T11:25:29.900490287Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 15 11:25:29.900566 containerd[1459]: time="2025-07-15T11:25:29.900524901Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 15 11:25:29.900566 containerd[1459]: time="2025-07-15T11:25:29.900543717Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 15 11:25:29.900605 containerd[1459]: time="2025-07-15T11:25:29.900575136Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 15 11:25:29.900605 containerd[1459]: time="2025-07-15T11:25:29.900593159Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 15 11:25:29.900651 containerd[1459]: time="2025-07-15T11:25:29.900607386Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 15 11:25:29.900651 containerd[1459]: time="2025-07-15T11:25:29.900619729Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 15 11:25:29.901013 containerd[1459]: time="2025-07-15T11:25:29.900987689Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 15 11:25:29.901013 containerd[1459]: time="2025-07-15T11:25:29.901007396Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 15 11:25:29.901064 containerd[1459]: time="2025-07-15T11:25:29.901019198Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 15 11:25:29.901064 containerd[1459]: time="2025-07-15T11:25:29.901032323Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 15 11:25:29.901064 containerd[1459]: time="2025-07-15T11:25:29.901044035Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 15 11:25:29.901148 containerd[1459]: time="2025-07-15T11:25:29.901125197Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 15 11:25:29.901211 containerd[1459]: time="2025-07-15T11:25:29.901189127Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 15 11:25:29.901678 containerd[1459]: time="2025-07-15T11:25:29.901652586Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 15 11:25:29.901707 containerd[1459]: time="2025-07-15T11:25:29.901681149Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 15 11:25:29.901707 containerd[1459]: time="2025-07-15T11:25:29.901693603Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 15 11:25:29.901752 containerd[1459]: time="2025-07-15T11:25:29.901736463Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 15 11:25:29.901752 containerd[1459]: time="2025-07-15T11:25:29.901748987Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 15 11:25:29.901794 containerd[1459]: time="2025-07-15T11:25:29.901760148Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 15 11:25:29.901794 containerd[1459]: time="2025-07-15T11:25:29.901771429Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 15 11:25:29.901794 containerd[1459]: time="2025-07-15T11:25:29.901782149Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 15 11:25:29.901794 containerd[1459]: time="2025-07-15T11:25:29.901793009Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 15 11:25:29.901867 containerd[1459]: time="2025-07-15T11:25:29.901804120Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 15 11:25:29.901867 containerd[1459]: time="2025-07-15T11:25:29.901814860Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 15 11:25:29.901867 containerd[1459]: time="2025-07-15T11:25:29.901829968Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 15 11:25:29.901979 containerd[1459]: time="2025-07-15T11:25:29.901956806Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 15 11:25:29.901979 containerd[1459]: time="2025-07-15T11:25:29.901974289Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 15 11:25:29.902027 containerd[1459]: time="2025-07-15T11:25:29.901985911Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 15 11:25:29.902027 containerd[1459]: time="2025-07-15T11:25:29.901997052Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 15 11:25:29.902027 containerd[1459]: time="2025-07-15T11:25:29.902009325Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 15 11:25:29.902027 containerd[1459]: time="2025-07-15T11:25:29.902019183Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 15 11:25:29.902115 containerd[1459]: time="2025-07-15T11:25:29.902042687Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 15 11:25:29.902115 containerd[1459]: time="2025-07-15T11:25:29.902085327Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 15 11:25:29.902305 containerd[1459]: time="2025-07-15T11:25:29.902256598Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 15 11:25:29.902844 containerd[1459]: time="2025-07-15T11:25:29.902306843Z" level=info msg="Connect containerd service" Jul 15 11:25:29.902844 containerd[1459]: time="2025-07-15T11:25:29.902353149Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 15 11:25:29.902929 containerd[1459]: time="2025-07-15T11:25:29.902907779Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 15 11:25:29.903384 containerd[1459]: time="2025-07-15T11:25:29.903359286Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 15 11:25:29.903429 containerd[1459]: time="2025-07-15T11:25:29.903397217Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 15 11:25:29.903429 containerd[1459]: time="2025-07-15T11:25:29.903409390Z" level=info msg="containerd successfully booted in 0.028207s" Jul 15 11:25:29.903569 containerd[1459]: time="2025-07-15T11:25:29.903506512Z" level=info msg="Start subscribing containerd event" Jul 15 11:25:29.903679 containerd[1459]: time="2025-07-15T11:25:29.903585700Z" level=info msg="Start recovering state" Jul 15 11:25:29.903750 containerd[1459]: time="2025-07-15T11:25:29.903732526Z" level=info msg="Start event monitor" Jul 15 11:25:29.903826 containerd[1459]: time="2025-07-15T11:25:29.903754757Z" level=info msg="Start snapshots syncer" Jul 15 11:25:29.903826 containerd[1459]: time="2025-07-15T11:25:29.903765437Z" level=info msg="Start cni network conf syncer for default" Jul 15 11:25:29.903826 containerd[1459]: time="2025-07-15T11:25:29.903773783Z" level=info msg="Start streaming server" Jul 15 11:25:29.954361 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 15 11:25:29.959485 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 15 11:25:29.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:29.959793 systemd[1]: Reached target network-online.target. Jul 15 11:25:29.960895 systemd[1]: Starting docker.service... Jul 15 11:25:30.019377 dockerd[1507]: time="2025-07-15T11:25:30.019316365Z" level=info msg="Starting up" Jul 15 11:25:30.021219 dockerd[1507]: time="2025-07-15T11:25:30.021177215Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 15 11:25:30.021219 dockerd[1507]: time="2025-07-15T11:25:30.021207341Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 15 11:25:30.021389 dockerd[1507]: time="2025-07-15T11:25:30.021371749Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc Jul 15 11:25:30.021415 dockerd[1507]: time="2025-07-15T11:25:30.021390324Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 15 11:25:30.024411 dockerd[1507]: time="2025-07-15T11:25:30.024388836Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 15 11:25:30.024411 dockerd[1507]: time="2025-07-15T11:25:30.024406299Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 15 11:25:30.024483 dockerd[1507]: time="2025-07-15T11:25:30.024420496Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc Jul 15 11:25:30.024483 dockerd[1507]: time="2025-07-15T11:25:30.024430615Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 15 11:25:30.053388 dockerd[1507]: time="2025-07-15T11:25:30.053354697Z" level=info msg="Loading containers: start." Jul 15 11:25:30.101000 audit[1540]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1540 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:30.101000 audit[1540]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffce5a7e0c0 a2=0 a3=7ffce5a7e0ac items=0 ppid=1507 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:30.101000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 15 11:25:30.103000 audit[1542]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1542 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:30.103000 audit[1542]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc1d6e23d0 a2=0 a3=7ffc1d6e23bc items=0 ppid=1507 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:30.103000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Jul 15 11:25:30.104000 audit[1544]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1544 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:30.104000 audit[1544]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd5363baf0 a2=0 a3=7ffd5363badc items=0 ppid=1507 pid=1544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:30.104000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 15 11:25:30.106000 audit[1546]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1546 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:30.106000 audit[1546]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffea40ecff0 a2=0 a3=7ffea40ecfdc items=0 ppid=1507 pid=1546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:30.106000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 15 11:25:30.108000 audit[1548]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1548 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:30.108000 audit[1548]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffaca965c0 a2=0 a3=7fffaca965ac items=0 ppid=1507 pid=1548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:30.108000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 15 11:25:30.123000 audit[1553]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1553 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:30.123000 audit[1553]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffca31876e0 a2=0 a3=7ffca31876cc items=0 ppid=1507 pid=1553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:30.123000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 15 11:25:30.131000 audit[1555]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1555 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:30.131000 audit[1555]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe869fddd0 a2=0 a3=7ffe869fddbc items=0 ppid=1507 pid=1555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:30.131000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Jul 15 11:25:30.132000 audit[1557]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1557 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:30.132000 audit[1557]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffde5ab5700 a2=0 a3=7ffde5ab56ec items=0 ppid=1507 pid=1557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:30.132000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Jul 15 11:25:30.134000 audit[1559]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1559 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:30.134000 audit[1559]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffdaa528890 a2=0 a3=7ffdaa52887c items=0 ppid=1507 pid=1559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:30.134000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 15 11:25:30.142000 audit[1563]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1563 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:30.142000 audit[1563]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd8add09c0 a2=0 a3=7ffd8add09ac items=0 ppid=1507 pid=1563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:30.142000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 15 11:25:30.146000 audit[1564]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1564 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:30.146000 audit[1564]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe6102b680 a2=0 a3=7ffe6102b66c items=0 ppid=1507 pid=1564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:30.146000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 15 11:25:30.155351 kernel: Initializing XFRM netlink socket Jul 15 11:25:30.180875 dockerd[1507]: time="2025-07-15T11:25:30.180849650Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 15 11:25:30.195000 audit[1571]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1571 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:30.195000 audit[1571]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffd4fa4cb50 a2=0 a3=7ffd4fa4cb3c items=0 ppid=1507 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:30.195000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 15 11:25:30.208000 audit[1574]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1574 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:30.208000 audit[1574]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fffd42a56c0 a2=0 a3=7fffd42a56ac items=0 ppid=1507 pid=1574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:30.208000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 15 11:25:30.211000 audit[1577]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1577 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:30.211000 audit[1577]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffcd78df7d0 a2=0 a3=7ffcd78df7bc items=0 ppid=1507 pid=1577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:30.211000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 15 11:25:30.214000 audit[1579]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1579 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:30.214000 audit[1579]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffa79f0a70 a2=0 a3=7fffa79f0a5c items=0 ppid=1507 pid=1579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:30.214000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 15 11:25:30.215000 audit[1581]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1581 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:30.215000 audit[1581]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd2cb94690 a2=0 a3=7ffd2cb9467c items=0 ppid=1507 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:30.215000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 15 11:25:30.217000 audit[1583]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1583 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:30.217000 audit[1583]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe983d7660 a2=0 a3=7ffe983d764c items=0 ppid=1507 pid=1583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:30.217000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 15 11:25:30.219000 audit[1585]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1585 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:30.219000 audit[1585]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffdd9ed07e0 a2=0 a3=7ffdd9ed07cc items=0 ppid=1507 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:30.219000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 15 11:25:30.225000 audit[1588]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1588 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:30.225000 audit[1588]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc3d3d9b90 a2=0 a3=7ffc3d3d9b7c items=0 ppid=1507 pid=1588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:30.225000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 15 11:25:30.227000 audit[1590]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1590 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:30.227000 audit[1590]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffcf448a9a0 a2=0 a3=7ffcf448a98c items=0 ppid=1507 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:30.227000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 15 11:25:30.229000 audit[1592]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1592 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:30.229000 audit[1592]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe68ed3fa0 a2=0 a3=7ffe68ed3f8c items=0 ppid=1507 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:30.229000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 15 11:25:30.231000 audit[1594]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1594 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:30.231000 audit[1594]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe932bb3e0 a2=0 a3=7ffe932bb3cc items=0 ppid=1507 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:30.231000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 15 11:25:30.231668 systemd-networkd[1019]: docker0: Link UP Jul 15 11:25:30.239000 audit[1598]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1598 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:30.239000 audit[1598]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffde64bda30 a2=0 a3=7ffde64bda1c items=0 ppid=1507 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:30.239000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 15 11:25:30.245000 audit[1599]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1599 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:30.245000 audit[1599]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd5f4f1180 a2=0 a3=7ffd5f4f116c items=0 ppid=1507 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:30.245000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 15 11:25:30.245671 dockerd[1507]: time="2025-07-15T11:25:30.245642367Z" level=info msg="Loading containers: done." Jul 15 11:25:30.268269 dockerd[1507]: time="2025-07-15T11:25:30.268206104Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 15 11:25:30.268512 dockerd[1507]: time="2025-07-15T11:25:30.268481099Z" level=info msg="Docker daemon" commit=3056208 graphdriver(s)=overlay2 version=20.10.21 Jul 15 11:25:30.268645 dockerd[1507]: time="2025-07-15T11:25:30.268616673Z" level=info msg="Daemon has completed initialization" Jul 15 11:25:30.289140 systemd[1]: Started docker.service. Jul 15 11:25:30.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:30.296695 dockerd[1507]: time="2025-07-15T11:25:30.296635389Z" level=info msg="API listen on /run/docker.sock" Jul 15 11:25:30.500445 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1710880285-merged.mount: Deactivated successfully. Jul 15 11:25:32.105269 systemd[1]: var-lib-docker-overlay2-2ac5077b842db416782190239bfbfe3bee0a121878fe394e90bcbed2d180fe7f\x2dinit-merged.mount: Deactivated successfully. Jul 15 11:25:32.308046 kernel: docker0: port 1(veth0b63189) entered blocking state Jul 15 11:25:32.308170 kernel: docker0: port 1(veth0b63189) entered disabled state Jul 15 11:25:32.308190 kernel: device veth0b63189 entered promiscuous mode Jul 15 11:25:32.305000 audit: ANOM_PROMISCUOUS dev=veth0b63189 prom=256 old_prom=0 auid=4294967295 uid=0 gid=0 ses=4294967295 Jul 15 11:25:32.305000 audit[1507]: SYSCALL arch=c000003e syscall=44 success=yes exit=40 a0=f a1=c0002737a0 a2=28 a3=0 items=0 ppid=1 pid=1507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:32.305000 audit: PROCTITLE proctitle=2F7573722F62696E2F646F636B657264002D2D686F73743D66643A2F2F002D2D636F6E7461696E6572643D2F72756E2F636F6E7461696E6572642F636F6E7461696E6572642E736F636B002D2D73656C696E75782D656E61626C65643D74727565 Jul 15 11:25:32.309767 systemd-networkd[1019]: veth0b63189: Link UP Jul 15 11:25:32.348796 containerd[1459]: time="2025-07-15T11:25:32.348724134Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 15 11:25:32.348796 containerd[1459]: time="2025-07-15T11:25:32.348760102Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 15 11:25:32.348796 containerd[1459]: time="2025-07-15T11:25:32.348770752Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 15 11:25:32.349161 containerd[1459]: time="2025-07-15T11:25:32.348910484Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/062072f9a52117309e668d751f7cc917dd9c18d620de863c13f22420a23f23d2 pid=1638 runtime=io.containerd.runc.v2 Jul 15 11:25:32.359780 systemd[1]: Started docker-062072f9a52117309e668d751f7cc917dd9c18d620de863c13f22420a23f23d2.scope. Jul 15 11:25:32.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.368000 audit: BPF prog-id=58 op=LOAD Jul 15 11:25:32.368000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.368000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=1638 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:32.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F30363230373266396135323131373330396536363864373531 Jul 15 11:25:32.368000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.368000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=c items=0 ppid=1638 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:32.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F30363230373266396135323131373330396536363864373531 Jul 15 11:25:32.368000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.368000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.368000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.368000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.368000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.368000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.368000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.368000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.368000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.368000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.368000 audit: BPF prog-id=59 op=LOAD Jul 15 11:25:32.368000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c00039bb40 items=0 ppid=1638 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:32.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F30363230373266396135323131373330396536363864373531 Jul 15 11:25:32.368000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.368000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.368000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.368000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.368000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.368000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.368000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.368000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.368000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.368000 audit: BPF prog-id=60 op=LOAD Jul 15 11:25:32.368000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c00039bb88 items=0 ppid=1638 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:32.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F30363230373266396135323131373330396536363864373531 Jul 15 11:25:32.368000 audit: BPF prog-id=60 op=UNLOAD Jul 15 11:25:32.368000 audit: BPF prog-id=59 op=UNLOAD Jul 15 11:25:32.369000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.369000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.369000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.369000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.369000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.369000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.369000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.369000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.369000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.369000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:32.369000 audit: BPF prog-id=61 op=LOAD Jul 15 11:25:32.369000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c00039bfe8 items=0 ppid=1638 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:32.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F30363230373266396135323131373330396536363864373531 Jul 15 11:25:32.431362 kernel: eth0: renamed from vethc843726 Jul 15 11:25:32.436433 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): veth0b63189: link becomes ready Jul 15 11:25:32.436473 kernel: docker0: port 1(veth0b63189) entered blocking state Jul 15 11:25:32.436493 kernel: docker0: port 1(veth0b63189) entered forwarding state Jul 15 11:25:32.437478 systemd-networkd[1019]: veth0b63189: Gained carrier Jul 15 11:25:32.438641 systemd-networkd[1019]: docker0: Gained carrier Jul 15 11:25:32.439350 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready Jul 15 11:25:32.439870 systemd-resolved[1131]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 15 11:25:32.460612 systemd[1]: docker-062072f9a52117309e668d751f7cc917dd9c18d620de863c13f22420a23f23d2.scope: Deactivated successfully. Jul 15 11:25:32.460000 audit: BPF prog-id=58 op=UNLOAD Jul 15 11:25:32.462026 containerd[1459]: time="2025-07-15T11:25:32.461909637Z" level=warning msg="error from *cgroupsv2.Manager.EventChan" error="failed to add inotify watch for \"/sys/fs/cgroup/system.slice/docker-062072f9a52117309e668d751f7cc917dd9c18d620de863c13f22420a23f23d2.scope/memory.events\": no such file or directory" Jul 15 11:25:32.475236 containerd[1459]: time="2025-07-15T11:25:32.475163739Z" level=info msg="shim disconnected" id=062072f9a52117309e668d751f7cc917dd9c18d620de863c13f22420a23f23d2 Jul 15 11:25:32.475236 containerd[1459]: time="2025-07-15T11:25:32.475229792Z" level=warning msg="cleaning up after shim disconnected" id=062072f9a52117309e668d751f7cc917dd9c18d620de863c13f22420a23f23d2 namespace=moby Jul 15 11:25:32.475371 containerd[1459]: time="2025-07-15T11:25:32.475242436Z" level=info msg="cleaning up dead shim" Jul 15 11:25:32.475423 dockerd[1507]: time="2025-07-15T11:25:32.475188405Z" level=info msg="ignoring event" container=062072f9a52117309e668d751f7cc917dd9c18d620de863c13f22420a23f23d2 module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Jul 15 11:25:32.481272 containerd[1459]: time="2025-07-15T11:25:32.481242727Z" level=warning msg="cleanup warnings time=\"2025-07-15T11:25:32Z\" level=info msg=\"starting signal loop\" namespace=moby pid=1691 runtime=io.containerd.runc.v2\n" Jul 15 11:25:32.485254 systemd-networkd[1019]: veth0b63189: Lost carrier Jul 15 11:25:32.485362 kernel: docker0: port 1(veth0b63189) entered disabled state Jul 15 11:25:32.485400 kernel: vethc843726: renamed from eth0 Jul 15 11:25:32.501542 systemd-networkd[1019]: veth0b63189: Link DOWN Jul 15 11:25:32.503479 kernel: docker0: port 1(veth0b63189) entered disabled state Jul 15 11:25:32.503561 kernel: device veth0b63189 left promiscuous mode Jul 15 11:25:32.503582 kernel: docker0: port 1(veth0b63189) entered disabled state Jul 15 11:25:32.501000 audit: ANOM_PROMISCUOUS dev=veth0b63189 prom=0 old_prom=256 auid=4294967295 uid=0 gid=0 ses=4294967295 Jul 15 11:25:32.501000 audit[1507]: SYSCALL arch=c000003e syscall=44 success=yes exit=32 a0=f a1=c000fc0880 a2=20 a3=0 items=0 ppid=1 pid=1507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:32.501000 audit: PROCTITLE proctitle=2F7573722F62696E2F646F636B657264002D2D686F73743D66643A2F2F002D2D636F6E7461696E6572643D2F72756E2F636F6E7461696E6572642F636F6E7461696E6572642E736F636B002D2D73656C696E75782D656E61626C65643D74727565 Jul 15 11:25:32.570000 audit: BPF prog-id=61 op=UNLOAD Jul 15 11:25:32.597195 sshd[1397]: pam_unix(sshd:session): session closed for user core Jul 15 11:25:32.597000 audit[1397]: USER_END pid=1397 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:32.597000 audit[1397]: CRED_DISP pid=1397 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:32.603603 systemd[1]: sshd@10-10.0.0.5:22-10.0.0.1:52574.service: Deactivated successfully. Jul 15 11:25:32.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.5:22-10.0.0.1:52574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:32.604087 systemd[1]: session-11.scope: Deactivated successfully. Jul 15 11:25:32.604629 systemd-logind[1173]: Session 11 logged out. Waiting for processes to exit. Jul 15 11:25:32.605575 systemd[1]: Started sshd@11-10.0.0.5:22-10.0.0.1:45944.service. Jul 15 11:25:32.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.5:22-10.0.0.1:45944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:32.606429 systemd-logind[1173]: Removed session 11. Jul 15 11:25:32.642000 audit[1709]: USER_ACCT pid=1709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:32.643294 sshd[1709]: Accepted publickey for core from 10.0.0.1 port 45944 ssh2: RSA SHA256:HJCyX8JAQ9OMquuEIVT6BTeEdgkyUqyqBnxnhtHUsbo Jul 15 11:25:32.643000 audit[1709]: CRED_ACQ pid=1709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:32.644000 audit[1709]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeff68fae0 a2=3 a3=0 items=0 ppid=1 pid=1709 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:32.644000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 15 11:25:32.644662 sshd[1709]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:25:32.647724 systemd-logind[1173]: New session 12 of user core. Jul 15 11:25:32.648429 systemd[1]: Started session-12.scope. Jul 15 11:25:32.651000 audit[1709]: USER_START pid=1709 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:32.652000 audit[1711]: CRED_ACQ pid=1711 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:32.715888 sshd[1709]: pam_unix(sshd:session): session closed for user core Jul 15 11:25:32.716000 audit[1709]: USER_END pid=1709 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:32.716000 audit[1709]: CRED_DISP pid=1709 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:32.718488 systemd[1]: sshd@11-10.0.0.5:22-10.0.0.1:45944.service: Deactivated successfully. Jul 15 11:25:32.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.5:22-10.0.0.1:45944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:32.718999 systemd[1]: session-12.scope: Deactivated successfully. Jul 15 11:25:32.719465 systemd-logind[1173]: Session 12 logged out. Waiting for processes to exit. Jul 15 11:25:32.720448 systemd[1]: Started sshd@12-10.0.0.5:22-10.0.0.1:45948.service. Jul 15 11:25:32.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.5:22-10.0.0.1:45948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:32.721028 systemd-logind[1173]: Removed session 12. Jul 15 11:25:32.755000 audit[1718]: USER_ACCT pid=1718 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:32.756426 sshd[1718]: Accepted publickey for core from 10.0.0.1 port 45948 ssh2: RSA SHA256:HJCyX8JAQ9OMquuEIVT6BTeEdgkyUqyqBnxnhtHUsbo Jul 15 11:25:32.756000 audit[1718]: CRED_ACQ pid=1718 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:32.756000 audit[1718]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd097b7450 a2=3 a3=0 items=0 ppid=1 pid=1718 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:32.756000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 15 11:25:32.757300 sshd[1718]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:25:32.760115 systemd-logind[1173]: New session 13 of user core. Jul 15 11:25:32.760814 systemd[1]: Started session-13.scope. Jul 15 11:25:32.763000 audit[1718]: USER_START pid=1718 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:32.764000 audit[1720]: CRED_ACQ pid=1720 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:33.103206 systemd[1]: var-lib-docker-overlay2-2ac5077b842db416782190239bfbfe3bee0a121878fe394e90bcbed2d180fe7f-merged.mount: Deactivated successfully. Jul 15 11:25:33.338528 systemd-networkd[1019]: docker0: Lost carrier Jul 15 11:25:33.860390 systemd-networkd[1019]: docker0: Gained IPv6LL Jul 15 11:25:40.544000 audit[1721]: USER_ACCT pid=1721 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:40.545196 sudo[1721]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/mv docker.raw containerd.raw /etc/extensions/ Jul 15 11:25:40.545385 sudo[1721]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 15 11:25:40.546026 kernel: kauditd_printk_skb: 372 callbacks suppressed Jul 15 11:25:40.546068 kernel: audit: type=1101 audit(1752578740.544:499): pid=1721 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:40.548108 sudo[1721]: pam_unix(sudo:session): session closed for user root Jul 15 11:25:40.544000 audit[1721]: CRED_REFR pid=1721 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:40.549285 sshd[1718]: pam_unix(sshd:session): session closed for user core Jul 15 11:25:40.552487 systemd[1]: Started sshd@13-10.0.0.5:22-10.0.0.1:42738.service. Jul 15 11:25:40.553056 kernel: audit: type=1110 audit(1752578740.544:500): pid=1721 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:40.553088 kernel: audit: type=1105 audit(1752578740.545:501): pid=1721 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:40.545000 audit[1721]: USER_START pid=1721 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:40.554273 systemd[1]: sshd@12-10.0.0.5:22-10.0.0.1:45948.service: Deactivated successfully. Jul 15 11:25:40.554765 systemd[1]: session-13.scope: Deactivated successfully. Jul 15 11:25:40.554888 systemd[1]: session-13.scope: Consumed 3.850s CPU time. Jul 15 11:25:40.555292 systemd-logind[1173]: Session 13 logged out. Waiting for processes to exit. Jul 15 11:25:40.556016 systemd-logind[1173]: Removed session 13. Jul 15 11:25:40.556781 kernel: audit: type=1106 audit(1752578740.545:502): pid=1721 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:40.545000 audit[1721]: USER_END pid=1721 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:40.560471 kernel: audit: type=1104 audit(1752578740.545:503): pid=1721 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:40.545000 audit[1721]: CRED_DISP pid=1721 uid=500 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:40.549000 audit[1718]: USER_END pid=1718 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:40.569057 kernel: audit: type=1106 audit(1752578740.549:504): pid=1718 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:40.569094 kernel: audit: type=1104 audit(1752578740.549:505): pid=1718 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:40.549000 audit[1718]: CRED_DISP pid=1718 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:40.572630 kernel: audit: type=1130 audit(1752578740.549:506): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.5:22-10.0.0.1:42738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:40.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.5:22-10.0.0.1:42738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:40.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.5:22-10.0.0.1:45948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:40.579766 kernel: audit: type=1131 audit(1752578740.552:507): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.5:22-10.0.0.1:45948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:40.597000 audit[1777]: USER_ACCT pid=1777 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:40.597689 sshd[1777]: Accepted publickey for core from 10.0.0.1 port 42738 ssh2: RSA SHA256:HJCyX8JAQ9OMquuEIVT6BTeEdgkyUqyqBnxnhtHUsbo Jul 15 11:25:40.599798 sshd[1777]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:25:40.603230 systemd-logind[1173]: New session 14 of user core. Jul 15 11:25:40.603477 systemd[1]: Started session-14.scope. Jul 15 11:25:40.599000 audit[1777]: CRED_ACQ pid=1777 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:40.599000 audit[1777]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd600fdf20 a2=3 a3=0 items=0 ppid=1 pid=1777 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:40.599000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 15 11:25:40.605356 kernel: audit: type=1101 audit(1752578740.597:508): pid=1777 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:40.607000 audit[1777]: USER_START pid=1777 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:40.608000 audit[1780]: CRED_ACQ pid=1780 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:40.655000 audit[1782]: USER_ACCT pid=1782 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:40.656111 sudo[1782]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart systemd-sysext Jul 15 11:25:40.655000 audit[1782]: CRED_REFR pid=1782 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:40.656301 sudo[1782]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 15 11:25:40.657000 audit[1782]: USER_START pid=1782 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:40.663135 systemd[1]: ensure-sysext.service: Deactivated successfully. Jul 15 11:25:40.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:40.663293 systemd[1]: Stopped ensure-sysext.service. Jul 15 11:25:40.663365 systemd[1]: Stopping ensure-sysext.service... Jul 15 11:25:40.664426 systemd[1]: Stopping systemd-sysext.service... Jul 15 11:25:40.667309 systemd-sysext[1784]: Unmerged '/usr'. Jul 15 11:25:40.671367 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 15 11:25:40.680595 systemd[1]: Mounting usr-share-oem.mount... Jul 15 11:25:40.685818 systemd[1]: Mounted usr-share-oem.mount. Jul 15 11:25:40.687573 systemd[1]: systemd-sysext.service: Deactivated successfully. Jul 15 11:25:40.687834 systemd[1]: Stopped systemd-sysext.service. Jul 15 11:25:40.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:40.688173 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 15 11:25:40.688380 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 15 11:25:40.690364 systemd[1]: Starting systemd-sysext.service... Jul 15 11:25:40.696988 systemd[1]: Unmounting usr-share-oem.mount... Jul 15 11:25:40.701786 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 15 11:25:40.701997 systemd[1]: Unmounted usr-share-oem.mount. Jul 15 11:25:40.719349 kernel: loop4: detected capacity change from 0 to 322896 Jul 15 11:25:40.731347 kernel: EXT4-fs (loop4): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 15 11:25:40.748337 kernel: loop5: detected capacity change from 0 to 301320 Jul 15 11:25:40.771357 kernel: EXT4-fs (loop5): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 15 11:25:40.783357 kernel: loop6: detected capacity change from 0 to 322896 Jul 15 11:25:40.787359 kernel: EXT4-fs (loop6): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 15 11:25:40.788348 kernel: loop7: detected capacity change from 0 to 301320 Jul 15 11:25:40.792340 kernel: EXT4-fs (loop7): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 15 11:25:40.792347 (sd-sysext)[1796]: Using extensions 'containerd', 'docker'. Jul 15 11:25:40.792634 (sd-sysext)[1796]: Merged extensions into '/usr'. Jul 15 11:25:40.811207 systemd[1]: Mounting usr-share-oem.mount... Jul 15 11:25:40.816529 systemd[1]: Mounted usr-share-oem.mount. Jul 15 11:25:40.817666 systemd[1]: Finished systemd-sysext.service. Jul 15 11:25:40.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:40.818460 sudo[1782]: pam_unix(sudo:session): session closed for user root Jul 15 11:25:40.818000 audit[1782]: USER_END pid=1782 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:40.818000 audit[1782]: CRED_DISP pid=1782 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:40.819552 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 15 11:25:40.819640 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 15 11:25:40.820870 systemd[1]: Starting ensure-sysext.service... Jul 15 11:25:40.822000 audit[1781]: USER_ACCT pid=1781 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:40.822727 sudo[1781]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart docker containerd Jul 15 11:25:40.822000 audit[1781]: CRED_REFR pid=1781 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:40.822954 sudo[1781]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 15 11:25:40.824000 audit[1781]: USER_START pid=1781 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:40.825800 systemd[1]: Reloading. Jul 15 11:25:40.950223 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 15 11:25:40.950240 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 15 11:25:40.965925 systemd[1]: /usr/lib/systemd/system/docker.socket:5: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit: BPF prog-id=62 op=LOAD Jul 15 11:25:41.026000 audit: BPF prog-id=43 op=UNLOAD Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit: BPF prog-id=63 op=LOAD Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.026000 audit: BPF prog-id=64 op=LOAD Jul 15 11:25:41.026000 audit: BPF prog-id=44 op=UNLOAD Jul 15 11:25:41.027000 audit: BPF prog-id=45 op=UNLOAD Jul 15 11:25:41.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.028000 audit: BPF prog-id=65 op=LOAD Jul 15 11:25:41.028000 audit: BPF prog-id=46 op=UNLOAD Jul 15 11:25:41.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.028000 audit: BPF prog-id=66 op=LOAD Jul 15 11:25:41.028000 audit: BPF prog-id=47 op=UNLOAD Jul 15 11:25:41.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.029000 audit: BPF prog-id=67 op=LOAD Jul 15 11:25:41.029000 audit: BPF prog-id=48 op=UNLOAD Jul 15 11:25:41.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.030000 audit: BPF prog-id=68 op=LOAD Jul 15 11:25:41.030000 audit: BPF prog-id=49 op=UNLOAD Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit: BPF prog-id=69 op=LOAD Jul 15 11:25:41.031000 audit: BPF prog-id=50 op=UNLOAD Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit: BPF prog-id=70 op=LOAD Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.031000 audit: BPF prog-id=71 op=LOAD Jul 15 11:25:41.031000 audit: BPF prog-id=51 op=UNLOAD Jul 15 11:25:41.031000 audit: BPF prog-id=52 op=UNLOAD Jul 15 11:25:41.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.032000 audit: BPF prog-id=72 op=LOAD Jul 15 11:25:41.032000 audit: BPF prog-id=53 op=UNLOAD Jul 15 11:25:41.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit: BPF prog-id=73 op=LOAD Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit: BPF prog-id=74 op=LOAD Jul 15 11:25:41.033000 audit: BPF prog-id=54 op=UNLOAD Jul 15 11:25:41.033000 audit: BPF prog-id=55 op=UNLOAD Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit: BPF prog-id=75 op=LOAD Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:41.033000 audit: BPF prog-id=76 op=LOAD Jul 15 11:25:41.033000 audit: BPF prog-id=56 op=UNLOAD Jul 15 11:25:41.033000 audit: BPF prog-id=57 op=UNLOAD Jul 15 11:25:41.042864 systemd[1]: Stopping docker.service... Jul 15 11:25:41.043143 dockerd[1507]: time="2025-07-15T11:25:41.042870787Z" level=info msg="Processing signal 'terminated'" Jul 15 11:25:41.044248 dockerd[1507]: time="2025-07-15T11:25:41.044156989Z" level=info msg="Daemon shutdown complete" Jul 15 11:25:41.045737 systemd[1]: docker.service: Deactivated successfully. Jul 15 11:25:41.045984 systemd[1]: Stopped docker.service. Jul 15 11:25:41.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:41.046408 systemd[1]: Stopped target sockets.target. Jul 15 11:25:41.046421 systemd[1]: Stopping sockets.target... Jul 15 11:25:41.046520 systemd[1]: docker.socket: Deactivated successfully. Jul 15 11:25:41.046762 systemd[1]: Closed docker.socket. Jul 15 11:25:41.046792 systemd[1]: Stopping docker.socket... Jul 15 11:25:41.047871 systemd[1]: Starting docker.socket... Jul 15 11:25:41.048184 systemd[1]: Stopping containerd.service... Jul 15 11:25:41.048567 containerd[1459]: time="2025-07-15T11:25:41.048527874Z" level=info msg="Stop CRI service" Jul 15 11:25:41.048774 systemd[1]: Listening on docker.socket. Jul 15 11:25:41.049269 systemd[1]: Reached target sockets.target. Jul 15 11:25:41.050102 systemd[1]: Stopped target timers.target. Jul 15 11:25:41.050114 systemd[1]: Stopping timers.target... Jul 15 11:25:41.050205 systemd[1]: Reached target timers.target. Jul 15 11:25:41.052317 systemd[1]: Stopped target multi-user.target. Jul 15 11:25:41.052613 systemd[1]: Stopping multi-user.target... Jul 15 11:25:41.052633 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 15 11:25:41.053520 containerd[1459]: time="2025-07-15T11:25:41.053396062Z" level=info msg="Stop CRI service" Jul 15 11:25:41.053842 systemd[1]: Starting enable-oem-cloudinit.service... Jul 15 11:25:41.054902 systemd[1]: Starting extend-filesystems.service... Jul 15 11:25:41.059714 jq[1860]: false Jul 15 11:25:41.056031 systemd[1]: Starting issuegen.service... Jul 15 11:25:41.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=containerd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:41.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=enable-oem-cloudinit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:41.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=enable-oem-cloudinit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:41.057105 systemd[1]: Starting motdgen.service... Jul 15 11:25:41.058116 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 15 11:25:41.058152 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 15 11:25:41.059806 systemd[1]: containerd.service: Deactivated successfully. Jul 15 11:25:41.059972 systemd[1]: Stopped containerd.service. Jul 15 11:25:41.060364 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 15 11:25:41.060479 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 15 11:25:41.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=issuegen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:41.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=issuegen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:41.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:41.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ssh-key-proc-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:41.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ssh-key-proc-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:41.061030 systemd[1]: issuegen.service: Deactivated successfully. Jul 15 11:25:41.061142 systemd[1]: Finished issuegen.service. Jul 15 11:25:41.063291 systemd[1]: Starting containerd.service... Jul 15 11:25:41.065137 systemd[1]: Finished ensure-sysext.service. Jul 15 11:25:41.065604 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 15 11:25:41.065721 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 15 11:25:41.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=containerd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:41.068635 systemd[1]: Started containerd.service. Jul 15 11:25:41.069309 systemd[1]: motdgen.service: Deactivated successfully. Jul 15 11:25:41.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=motdgen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:41.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=motdgen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:41.069923 systemd[1]: Finished motdgen.service. Jul 15 11:25:41.071715 systemd[1]: Starting docker.service... Jul 15 11:25:41.074426 extend-filesystems[1861]: Found loop2 Jul 15 11:25:41.076717 extend-filesystems[1861]: Found loop3 Jul 15 11:25:41.076717 extend-filesystems[1861]: Found loop6 Jul 15 11:25:41.076717 extend-filesystems[1861]: Found loop7 Jul 15 11:25:41.076717 extend-filesystems[1861]: Found sr0 Jul 15 11:25:41.076717 extend-filesystems[1861]: Found vda Jul 15 11:25:41.076717 extend-filesystems[1861]: Found vda1 Jul 15 11:25:41.076717 extend-filesystems[1861]: Found vda2 Jul 15 11:25:41.076717 extend-filesystems[1861]: Found vda3 Jul 15 11:25:41.076717 extend-filesystems[1861]: Found usr Jul 15 11:25:41.076717 extend-filesystems[1861]: Found vda4 Jul 15 11:25:41.076717 extend-filesystems[1861]: Found vda6 Jul 15 11:25:41.076717 extend-filesystems[1861]: Found vda7 Jul 15 11:25:41.076717 extend-filesystems[1861]: Found vda9 Jul 15 11:25:41.076717 extend-filesystems[1861]: Checking size of /dev/vda9 Jul 15 11:25:41.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=extend-filesystems comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:41.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=extend-filesystems comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:41.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:41.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp-runlevel comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:41.080225 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 15 11:25:41.107459 extend-filesystems[1861]: Old size kept for /dev/vda9 Jul 15 11:25:41.080454 systemd[1]: Finished extend-filesystems.service. Jul 15 11:25:41.081076 systemd[1]: Reached target multi-user.target. Jul 15 11:25:41.082801 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 15 11:25:41.098364 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 15 11:25:41.098499 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 15 11:25:41.136301 containerd[1877]: time="2025-07-15T11:25:41.136246947Z" level=info msg="starting containerd" revision=5b842e528e99d4d4c1686467debf2bd4b88ecd86 version=v1.6.15 Jul 15 11:25:41.154364 containerd[1877]: time="2025-07-15T11:25:41.154314133Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 15 11:25:41.154364 containerd[1877]: time="2025-07-15T11:25:41.154361462Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 15 11:25:41.155104 dockerd[1878]: time="2025-07-15T11:25:41.155061424Z" level=info msg="Starting up" Jul 15 11:25:41.155670 containerd[1877]: time="2025-07-15T11:25:41.155621254Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.188-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 15 11:25:41.155670 containerd[1877]: time="2025-07-15T11:25:41.155648145Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 15 11:25:41.155787 containerd[1877]: time="2025-07-15T11:25:41.155762008Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 15 11:25:41.155787 containerd[1877]: time="2025-07-15T11:25:41.155781154Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 15 11:25:41.155857 containerd[1877]: time="2025-07-15T11:25:41.155792906Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 15 11:25:41.155857 containerd[1877]: time="2025-07-15T11:25:41.155801973Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 15 11:25:41.155857 containerd[1877]: time="2025-07-15T11:25:41.155819917Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 15 11:25:41.156281 containerd[1877]: time="2025-07-15T11:25:41.156262366Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 15 11:25:41.156395 containerd[1877]: time="2025-07-15T11:25:41.156376430Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 15 11:25:41.156395 containerd[1877]: time="2025-07-15T11:25:41.156393562Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 15 11:25:41.156495 containerd[1877]: time="2025-07-15T11:25:41.156407759Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 15 11:25:41.156495 containerd[1877]: time="2025-07-15T11:25:41.156416365Z" level=info msg="metadata content store policy set" policy=shared Jul 15 11:25:41.156620 containerd[1877]: time="2025-07-15T11:25:41.156602915Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 15 11:25:41.156646 containerd[1877]: time="2025-07-15T11:25:41.156623914Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 15 11:25:41.156646 containerd[1877]: time="2025-07-15T11:25:41.156634885Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 15 11:25:41.156783 containerd[1877]: time="2025-07-15T11:25:41.156766321Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 15 11:25:41.156813 containerd[1877]: time="2025-07-15T11:25:41.156783293Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 15 11:25:41.156813 containerd[1877]: time="2025-07-15T11:25:41.156796217Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 15 11:25:41.156813 containerd[1877]: time="2025-07-15T11:25:41.156806707Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 15 11:25:41.157084 containerd[1877]: time="2025-07-15T11:25:41.157068949Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 15 11:25:41.157084 containerd[1877]: time="2025-07-15T11:25:41.157083837Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 15 11:25:41.157152 containerd[1877]: time="2025-07-15T11:25:41.157094857Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 15 11:25:41.157152 containerd[1877]: time="2025-07-15T11:25:41.157106299Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 15 11:25:41.157152 containerd[1877]: time="2025-07-15T11:25:41.157117089Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 15 11:25:41.157152 containerd[1877]: time="2025-07-15T11:25:41.157146143Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 15 11:25:41.157230 containerd[1877]: time="2025-07-15T11:25:41.157201006Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 15 11:25:41.157419 dockerd[1878]: time="2025-07-15T11:25:41.157388718Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 15 11:25:41.157419 dockerd[1878]: time="2025-07-15T11:25:41.157414486Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 15 11:25:41.157586 dockerd[1878]: time="2025-07-15T11:25:41.157441207Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc Jul 15 11:25:41.157586 dockerd[1878]: time="2025-07-15T11:25:41.157458299Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 15 11:25:41.157662 containerd[1877]: time="2025-07-15T11:25:41.157590537Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 15 11:25:41.157662 containerd[1877]: time="2025-07-15T11:25:41.157618519Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 15 11:25:41.157662 containerd[1877]: time="2025-07-15T11:25:41.157629289Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 15 11:25:41.157662 containerd[1877]: time="2025-07-15T11:25:41.157662882Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 15 11:25:41.157662 containerd[1877]: time="2025-07-15T11:25:41.157674744Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 15 11:25:41.157875 containerd[1877]: time="2025-07-15T11:25:41.157685354Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 15 11:25:41.157875 containerd[1877]: time="2025-07-15T11:25:41.157695002Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 15 11:25:41.157875 containerd[1877]: time="2025-07-15T11:25:41.157704570Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 15 11:25:41.157875 containerd[1877]: time="2025-07-15T11:25:41.157714319Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 15 11:25:41.157875 containerd[1877]: time="2025-07-15T11:25:41.157723456Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 15 11:25:41.157875 containerd[1877]: time="2025-07-15T11:25:41.157732994Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 15 11:25:41.157875 containerd[1877]: time="2025-07-15T11:25:41.157753923Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 15 11:25:41.157875 containerd[1877]: time="2025-07-15T11:25:41.157801442Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 15 11:25:41.157875 containerd[1877]: time="2025-07-15T11:25:41.157813224Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 15 11:25:41.157875 containerd[1877]: time="2025-07-15T11:25:41.157822962Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 15 11:25:41.157875 containerd[1877]: time="2025-07-15T11:25:41.157832641Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 15 11:25:41.157875 containerd[1877]: time="2025-07-15T11:25:41.157846476Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 15 11:25:41.157875 containerd[1877]: time="2025-07-15T11:25:41.157855043Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 15 11:25:41.157875 containerd[1877]: time="2025-07-15T11:25:41.157878126Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 15 11:25:41.158453 containerd[1877]: time="2025-07-15T11:25:41.157905828Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 15 11:25:41.158500 containerd[1877]: time="2025-07-15T11:25:41.158060808Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 15 11:25:41.158500 containerd[1877]: time="2025-07-15T11:25:41.158104761Z" level=info msg="Connect containerd service" Jul 15 11:25:41.158500 containerd[1877]: time="2025-07-15T11:25:41.158131090Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 15 11:25:41.158718 containerd[1877]: time="2025-07-15T11:25:41.158528656Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 15 11:25:41.159018 containerd[1877]: time="2025-07-15T11:25:41.158999138Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 15 11:25:41.159110 containerd[1877]: time="2025-07-15T11:25:41.159048991Z" level=info msg="Start subscribing containerd event" Jul 15 11:25:41.159141 containerd[1877]: time="2025-07-15T11:25:41.159126607Z" level=info msg="Start recovering state" Jul 15 11:25:41.159206 containerd[1877]: time="2025-07-15T11:25:41.159190957Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 15 11:25:41.159254 containerd[1877]: time="2025-07-15T11:25:41.159207308Z" level=info msg="containerd successfully booted in 0.023756s" Jul 15 11:25:41.159281 containerd[1877]: time="2025-07-15T11:25:41.159266749Z" level=info msg="Start event monitor" Jul 15 11:25:41.159304 containerd[1877]: time="2025-07-15T11:25:41.159284272Z" level=info msg="Start snapshots syncer" Jul 15 11:25:41.159304 containerd[1877]: time="2025-07-15T11:25:41.159293009Z" level=info msg="Start cni network conf syncer for default" Jul 15 11:25:41.159304 containerd[1877]: time="2025-07-15T11:25:41.159299090Z" level=info msg="Start streaming server" Jul 15 11:25:41.170669 dockerd[1878]: time="2025-07-15T11:25:41.170637600Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 15 11:25:41.170669 dockerd[1878]: time="2025-07-15T11:25:41.170661374Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 15 11:25:41.170806 dockerd[1878]: time="2025-07-15T11:25:41.170678096Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///run/containerd/containerd.sock 0 }] }" module=grpc Jul 15 11:25:41.170806 dockerd[1878]: time="2025-07-15T11:25:41.170690549Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 15 11:25:41.473022 dockerd[1878]: time="2025-07-15T11:25:41.472901194Z" level=info msg="[graphdriver] using prior storage driver: overlay2" Jul 15 11:25:41.595043 dockerd[1878]: time="2025-07-15T11:25:41.595009337Z" level=info msg="Loading containers: start." Jul 15 11:25:41.599000 audit[1910]: NETFILTER_CFG table=nat:26 family=2 entries=1 op=nft_unregister_rule pid=1910 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.599000 audit[1910]: SYSCALL arch=c000003e syscall=46 success=yes exit=268 a0=3 a1=7ffed30f5f70 a2=0 a3=7ffed30f5f5c items=0 ppid=1878 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.599000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4400505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 15 11:25:41.605000 audit[1911]: NETFILTER_CFG table=nat:27 family=2 entries=1 op=nft_unregister_rule pid=1911 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.605000 audit[1911]: SYSCALL arch=c000003e syscall=46 success=yes exit=360 a0=3 a1=7ffc31586a70 a2=0 a3=7ffc31586a5c items=0 ppid=1878 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.605000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D44004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C0000002D2D647374003132372E302E302E302F38002D6A00444F434B4552 Jul 15 11:25:41.611000 audit[1915]: NETFILTER_CFG table=nat:28 family=2 entries=1 op=nft_unregister_rule pid=1915 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.611000 audit[1915]: SYSCALL arch=c000003e syscall=46 success=yes exit=88 a0=3 a1=7ffc72a0d7e0 a2=0 a3=7ffc72a0d7cc items=0 ppid=1878 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.611000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4600444F434B4552 Jul 15 11:25:41.619000 audit[1916]: NETFILTER_CFG table=nat:29 family=2 entries=1 op=nft_unregister_chain pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.619000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcc847f020 a2=0 a3=7ffcc847f00c items=0 ppid=1878 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.619000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D5800444F434B4552 Jul 15 11:25:41.634000 audit[1919]: NETFILTER_CFG table=filter:30 family=2 entries=2 op=nft_unregister_rule pid=1919 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.634000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcc346fbd0 a2=0 a3=7ffcc346fbbc items=0 ppid=1878 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.634000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4600444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 15 11:25:41.645000 audit[1921]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_unregister_rule pid=1921 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.645000 audit[1921]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcc664ecd0 a2=0 a3=7ffcc664ecbc items=0 ppid=1878 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.645000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4600444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 15 11:25:41.649000 audit[1922]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_unregister_chain pid=1922 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.649000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=120 a0=3 a1=7fff5c241600 a2=0 a3=7fff5c2415ec items=0 ppid=1878 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.649000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D5800444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 15 11:25:41.661000 audit[1926]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1926 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.661000 audit[1926]: SYSCALL arch=c000003e syscall=46 success=yes exit=88 a0=3 a1=7ffde380b180 a2=0 a3=7ffde380b16c items=0 ppid=1878 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.661000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 15 11:25:41.664000 audit[1930]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1930 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.664000 audit[1930]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc1fd127e0 a2=0 a3=7ffc1fd127cc items=0 ppid=1878 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.664000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 15 11:25:41.665000 audit[1932]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=1932 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.665000 audit[1932]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff5af9e3d0 a2=0 a3=7fff5af9e3bc items=0 ppid=1878 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.665000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 15 11:25:41.667000 audit[1934]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=1934 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.667000 audit[1934]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff74983a10 a2=0 a3=7fff749839fc items=0 ppid=1878 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.667000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 15 11:25:41.672000 audit[1939]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=1939 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.672000 audit[1939]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc9f7a7530 a2=0 a3=7ffc9f7a751c items=0 ppid=1878 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.672000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 15 11:25:41.676000 audit[1944]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=1944 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.676000 audit[1944]: SYSCALL arch=c000003e syscall=46 success=yes exit=276 a0=3 a1=7ffee87ed520 a2=0 a3=7ffee87ed50c items=0 ppid=1878 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.676000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 15 11:25:41.678000 audit[1946]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=1946 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.678000 audit[1946]: SYSCALL arch=c000003e syscall=46 success=yes exit=368 a0=3 a1=7ffc146de4a0 a2=0 a3=7ffc146de48c items=0 ppid=1878 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.678000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 15 11:25:41.682000 audit[1952]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_unregister_rule pid=1952 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.682000 audit[1952]: SYSCALL arch=c000003e syscall=46 success=yes exit=244 a0=3 a1=7ffc34880af0 a2=0 a3=7ffc34880adc items=0 ppid=1878 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.682000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 15 11:25:41.686000 audit[1953]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_rule pid=1953 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.686000 audit[1953]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffcc3f77010 a2=0 a3=7ffcc3f76ffc items=0 ppid=1878 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.686000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 15 11:25:41.688000 audit[1955]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_rule pid=1955 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.688000 audit[1955]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe210677d0 a2=0 a3=7ffe210677bc items=0 ppid=1878 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.688000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 15 11:25:41.689000 audit[1957]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_rule pid=1957 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.689000 audit[1957]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd11ebe790 a2=0 a3=7ffd11ebe77c items=0 ppid=1878 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.689000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 15 11:25:41.783000 audit[1959]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_unregister_rule pid=1959 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.783000 audit[1959]: SYSCALL arch=c000003e syscall=46 success=yes exit=404 a0=3 a1=7ffd164451b0 a2=0 a3=7ffd1644519c items=0 ppid=1878 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.783000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4400504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 15 11:25:41.790000 audit[1961]: NETFILTER_CFG table=nat:45 family=2 entries=1 op=nft_unregister_rule pid=1961 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.790000 audit[1961]: SYSCALL arch=c000003e syscall=46 success=yes exit=280 a0=3 a1=7ffc778af280 a2=0 a3=7ffc778af26c items=0 ppid=1878 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.790000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4400444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 15 11:25:41.796000 audit[1963]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_unregister_rule pid=1963 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.796000 audit[1963]: SYSCALL arch=c000003e syscall=46 success=yes exit=380 a0=3 a1=7ffc123847d0 a2=0 a3=7ffc123847bc items=0 ppid=1878 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.796000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 15 11:25:41.801000 audit[1965]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_unregister_rule pid=1965 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.801000 audit[1965]: SYSCALL arch=c000003e syscall=46 success=yes exit=380 a0=3 a1=7ffe29516080 a2=0 a3=7ffe2951606c items=0 ppid=1878 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.801000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 15 11:25:41.808000 audit[1968]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_unregister_rule pid=1968 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.808000 audit[1968]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd17dc2910 a2=0 a3=7ffd17dc28fc items=0 ppid=1878 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.808000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 15 11:25:41.815000 audit[1971]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_unregister_rule pid=1971 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.815000 audit[1971]: SYSCALL arch=c000003e syscall=46 success=yes exit=512 a0=3 a1=7ffda296a1a0 a2=0 a3=7ffda296a18c items=0 ppid=1878 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.815000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 15 11:25:41.821000 audit[1973]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_unregister_rule pid=1973 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.821000 audit[1973]: SYSCALL arch=c000003e syscall=46 success=yes exit=420 a0=3 a1=7fff0161c610 a2=0 a3=7fff0161c5fc items=0 ppid=1878 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.821000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4400444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 15 11:25:41.828000 audit[1975]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_unregister_rule pid=1975 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.828000 audit[1975]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffd1170cf0 a2=0 a3=7fffd1170cdc items=0 ppid=1878 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.828000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4400444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 15 11:25:41.992003 dockerd[1878]: time="2025-07-15T11:25:41.991942376Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 15 11:25:41.993000 audit[1977]: NETFILTER_CFG table=nat:52 family=2 entries=1 op=nft_register_rule pid=1977 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.993000 audit[1977]: SYSCALL arch=c000003e syscall=46 success=yes exit=412 a0=3 a1=7ffe57f492d0 a2=0 a3=7ffe57f492bc items=0 ppid=1878 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.993000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 15 11:25:41.995000 audit[1979]: NETFILTER_CFG table=nat:53 family=2 entries=1 op=nft_register_rule pid=1979 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.995000 audit[1979]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffeac2e5fe0 a2=0 a3=7ffeac2e5fcc items=0 ppid=1878 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.995000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 15 11:25:41.997000 audit[1982]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=1982 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.997000 audit[1982]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe9038f510 a2=0 a3=7ffe9038f4fc items=0 ppid=1878 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.997000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 15 11:25:41.999000 audit[1984]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=1984 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:41.999000 audit[1984]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc51ea9d10 a2=0 a3=7ffc51ea9cfc items=0 ppid=1878 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:41.999000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 15 11:25:42.003000 audit[1990]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=1990 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:42.003000 audit[1990]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff231d60c0 a2=0 a3=7fff231d60ac items=0 ppid=1878 pid=1990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:42.003000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 15 11:25:42.005000 audit[1992]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=1992 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:42.005000 audit[1992]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fffcd113d20 a2=0 a3=7fffcd113d0c items=0 ppid=1878 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:42.005000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 15 11:25:42.007000 audit[1994]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_unregister_rule pid=1994 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:42.007000 audit[1994]: SYSCALL arch=c000003e syscall=46 success=yes exit=244 a0=3 a1=7fff73508170 a2=0 a3=7fff7350815c items=0 ppid=1878 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:42.007000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 15 11:25:42.012000 audit[1995]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=1995 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:42.012000 audit[1995]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffdac57cc90 a2=0 a3=7ffdac57cc7c items=0 ppid=1878 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:42.012000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 15 11:25:42.014000 audit[1997]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=1997 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:42.014000 audit[1997]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffefbcd8460 a2=0 a3=7ffefbcd844c items=0 ppid=1878 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:42.014000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 15 11:25:42.015000 audit[1999]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_rule pid=1999 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:42.015000 audit[1999]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd63605140 a2=0 a3=7ffd6360512c items=0 ppid=1878 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:42.015000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 15 11:25:42.172000 audit[2003]: NETFILTER_CFG table=filter:62 family=2 entries=1 op=nft_unregister_rule pid=2003 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:42.172000 audit[2003]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc62641230 a2=0 a3=7ffc6264121c items=0 ppid=1878 pid=2003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:42.172000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 15 11:25:42.176000 audit[2004]: NETFILTER_CFG table=filter:63 family=2 entries=1 op=nft_register_rule pid=2004 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 15 11:25:42.176000 audit[2004]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd610458c0 a2=0 a3=7ffd610458ac items=0 ppid=1878 pid=2004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:42.176000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 15 11:25:42.177466 dockerd[1878]: time="2025-07-15T11:25:42.177429585Z" level=info msg="Loading containers: done." Jul 15 11:25:42.192543 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2414102568-merged.mount: Deactivated successfully. Jul 15 11:25:42.356272 dockerd[1878]: time="2025-07-15T11:25:42.356210118Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 15 11:25:42.356453 dockerd[1878]: time="2025-07-15T11:25:42.356429429Z" level=info msg="Docker daemon" commit=6051f14 graphdriver(s)=overlay2 version=20.10.23 Jul 15 11:25:42.356528 dockerd[1878]: time="2025-07-15T11:25:42.356461429Z" level=info msg="Daemon has completed initialization" Jul 15 11:25:42.406397 systemd[1]: Started docker.service. Jul 15 11:25:42.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:42.406000 audit[1781]: USER_END pid=1781 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:42.407000 audit[1781]: CRED_DISP pid=1781 uid=500 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 15 11:25:42.407237 sudo[1781]: pam_unix(sudo:session): session closed for user root Jul 15 11:25:42.408465 sshd[1777]: pam_unix(sshd:session): session closed for user core Jul 15 11:25:42.409000 audit[1777]: USER_END pid=1777 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:42.409000 audit[1777]: CRED_DISP pid=1777 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:42.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.5:22-10.0.0.1:42746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:42.412721 systemd[1]: Started sshd@14-10.0.0.5:22-10.0.0.1:42746.service. Jul 15 11:25:42.414398 systemd-logind[1173]: Session 14 logged out. Waiting for processes to exit. Jul 15 11:25:42.415729 dockerd[1878]: time="2025-07-15T11:25:42.415633978Z" level=info msg="API listen on /run/docker.sock" Jul 15 11:25:42.452000 audit[2024]: USER_ACCT pid=2024 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:42.452923 sshd[2024]: Accepted publickey for core from 10.0.0.1 port 42746 ssh2: RSA SHA256:HJCyX8JAQ9OMquuEIVT6BTeEdgkyUqyqBnxnhtHUsbo Jul 15 11:25:42.453000 audit[2024]: CRED_ACQ pid=2024 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:42.453000 audit[2024]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9c3b8400 a2=3 a3=0 items=0 ppid=1 pid=2024 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:42.453000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 15 11:25:42.454092 sshd[2024]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 15 11:25:42.455472 systemd[1]: sshd@13-10.0.0.5:22-10.0.0.1:42738.service: Deactivated successfully. Jul 15 11:25:42.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.5:22-10.0.0.1:42738 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:42.456066 systemd[1]: session-14.scope: Deactivated successfully. Jul 15 11:25:42.457877 systemd-logind[1173]: New session 15 of user core. Jul 15 11:25:42.458524 systemd[1]: Started session-15.scope. Jul 15 11:25:42.459389 systemd-logind[1173]: Removed session 14. Jul 15 11:25:42.462000 audit[2024]: USER_START pid=2024 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:42.463000 audit[2027]: CRED_ACQ pid=2027 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:42.565940 systemd[1]: var-lib-docker-overlay2-70ae56aa0768cf369ee6999a11c2620ac2336c231030e239638146f5fec66260\x2dinit-merged.mount: Deactivated successfully. Jul 15 11:25:43.291351 kernel: docker0: port 1(veth34b85ba) entered blocking state Jul 15 11:25:43.291477 kernel: docker0: port 1(veth34b85ba) entered disabled state Jul 15 11:25:43.291610 kernel: device veth34b85ba entered promiscuous mode Jul 15 11:25:43.272000 audit: ANOM_PROMISCUOUS dev=veth34b85ba prom=256 old_prom=0 auid=4294967295 uid=0 gid=0 ses=4294967295 Jul 15 11:25:43.292631 systemd-networkd[1019]: veth34b85ba: Link UP Jul 15 11:25:43.272000 audit[1878]: SYSCALL arch=c000003e syscall=44 success=yes exit=40 a0=e a1=c000a03a10 a2=28 a3=0 items=0 ppid=1 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:43.272000 audit: PROCTITLE proctitle=2F7573722F62696E2F646F636B657264002D2D686F73743D66643A2F2F002D2D636F6E7461696E6572643D2F72756E2F636F6E7461696E6572642F636F6E7461696E6572642E736F636B002D2D73656C696E75782D656E61626C65643D74727565 Jul 15 11:25:43.893375 containerd[1877]: time="2025-07-15T11:25:43.893288770Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 15 11:25:43.893375 containerd[1877]: time="2025-07-15T11:25:43.893341789Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 15 11:25:43.893375 containerd[1877]: time="2025-07-15T11:25:43.893352419Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 15 11:25:43.893839 containerd[1877]: time="2025-07-15T11:25:43.893473516Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/0ec6954fd4fd15c98e980fb0b07f506e2835e92acd35f5a28517e3042fece73d pid=2048 runtime=io.containerd.runc.v2 Jul 15 11:25:43.904957 systemd[1]: Started docker-0ec6954fd4fd15c98e980fb0b07f506e2835e92acd35f5a28517e3042fece73d.scope. Jul 15 11:25:43.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit: BPF prog-id=77 op=LOAD Jul 15 11:25:43.912000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[2058]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2048 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:43.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F30656336393534666434666431356339386539383066623062 Jul 15 11:25:43.912000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[2058]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2048 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:43.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F30656336393534666434666431356339386539383066623062 Jul 15 11:25:43.912000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit: BPF prog-id=78 op=LOAD Jul 15 11:25:43.912000 audit[2058]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000219240 items=0 ppid=2048 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:43.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F30656336393534666434666431356339386539383066623062 Jul 15 11:25:43.912000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.912000 audit: BPF prog-id=79 op=LOAD Jul 15 11:25:43.912000 audit[2058]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000219288 items=0 ppid=2048 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:43.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F30656336393534666434666431356339386539383066623062 Jul 15 11:25:43.913000 audit: BPF prog-id=79 op=UNLOAD Jul 15 11:25:43.913000 audit: BPF prog-id=78 op=UNLOAD Jul 15 11:25:43.913000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.913000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.913000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.913000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.913000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.913000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.913000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.913000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.913000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.913000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 15 11:25:43.913000 audit: BPF prog-id=80 op=LOAD Jul 15 11:25:43.913000 audit[2058]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002196e8 items=0 ppid=2048 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/usr/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:43.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F7661722F72756E2F646F636B65722F72756E74696D652D72756E632F6D6F6279002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6D6F62792F30656336393534666434666431356339386539383066623062 Jul 15 11:25:43.973368 kernel: eth0: renamed from veth687e01c Jul 15 11:25:43.980470 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): veth34b85ba: link becomes ready Jul 15 11:25:43.980581 kernel: docker0: port 1(veth34b85ba) entered blocking state Jul 15 11:25:43.980602 kernel: docker0: port 1(veth34b85ba) entered forwarding state Jul 15 11:25:43.980417 systemd-networkd[1019]: veth34b85ba: Gained carrier Jul 15 11:25:43.980638 systemd-networkd[1019]: docker0: Gained carrier Jul 15 11:25:44.013022 systemd-resolved[1131]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 15 11:25:44.032000 audit: BPF prog-id=77 op=UNLOAD Jul 15 11:25:44.032946 systemd[1]: docker-0ec6954fd4fd15c98e980fb0b07f506e2835e92acd35f5a28517e3042fece73d.scope: Deactivated successfully. Jul 15 11:25:44.193839 containerd[1877]: time="2025-07-15T11:25:44.193711382Z" level=info msg="shim disconnected" id=0ec6954fd4fd15c98e980fb0b07f506e2835e92acd35f5a28517e3042fece73d Jul 15 11:25:44.193839 containerd[1877]: time="2025-07-15T11:25:44.193761837Z" level=warning msg="cleaning up after shim disconnected" id=0ec6954fd4fd15c98e980fb0b07f506e2835e92acd35f5a28517e3042fece73d namespace=moby Jul 15 11:25:44.193839 containerd[1877]: time="2025-07-15T11:25:44.193773068Z" level=info msg="cleaning up dead shim" Jul 15 11:25:44.194002 dockerd[1878]: time="2025-07-15T11:25:44.193815748Z" level=info msg="ignoring event" container=0ec6954fd4fd15c98e980fb0b07f506e2835e92acd35f5a28517e3042fece73d module=libcontainerd namespace=moby topic=/tasks/delete type="*events.TaskDelete" Jul 15 11:25:44.199763 containerd[1877]: time="2025-07-15T11:25:44.199732803Z" level=warning msg="cleanup warnings time=\"2025-07-15T11:25:44Z\" level=info msg=\"starting signal loop\" namespace=moby pid=2103 runtime=io.containerd.runc.v2\n" Jul 15 11:25:44.231361 kernel: docker0: port 1(veth34b85ba) entered disabled state Jul 15 11:25:44.231468 kernel: veth687e01c: renamed from eth0 Jul 15 11:25:44.231441 systemd-networkd[1019]: veth34b85ba: Lost carrier Jul 15 11:25:44.289996 systemd-networkd[1019]: veth34b85ba: Link DOWN Jul 15 11:25:44.291530 kernel: docker0: port 1(veth34b85ba) entered disabled state Jul 15 11:25:44.291602 kernel: device veth34b85ba left promiscuous mode Jul 15 11:25:44.289000 audit: ANOM_PROMISCUOUS dev=veth34b85ba prom=0 old_prom=256 auid=4294967295 uid=0 gid=0 ses=4294967295 Jul 15 11:25:44.300401 kernel: docker0: port 1(veth34b85ba) entered disabled state Jul 15 11:25:44.305756 systemd-networkd[1019]: docker0: Lost carrier Jul 15 11:25:44.289000 audit[1878]: SYSCALL arch=c000003e syscall=44 success=yes exit=32 a0=e a1=c000058b00 a2=20 a3=0 items=0 ppid=1 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dockerd" exe="/usr/bin/dockerd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 15 11:25:44.289000 audit: PROCTITLE proctitle=2F7573722F62696E2F646F636B657264002D2D686F73743D66643A2F2F002D2D636F6E7461696E6572643D2F72756E2F636F6E7461696E6572642F636F6E7461696E6572642E736F636B002D2D73656C696E75782D656E61626C65643D74727565 Jul 15 11:25:44.380848 systemd[1]: run-docker-netns-bd69594d22e6.mount: Deactivated successfully. Jul 15 11:25:44.400219 systemd[1]: var-lib-docker-overlay2-70ae56aa0768cf369ee6999a11c2620ac2336c231030e239638146f5fec66260-merged.mount: Deactivated successfully. Jul 15 11:25:44.417000 audit: BPF prog-id=80 op=UNLOAD Jul 15 11:25:44.973269 sshd[2024]: pam_unix(sshd:session): session closed for user core Jul 15 11:25:44.973000 audit[2024]: USER_END pid=2024 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:44.973000 audit[2024]: CRED_DISP pid=2024 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 15 11:25:44.975485 systemd[1]: sshd@14-10.0.0.5:22-10.0.0.1:42746.service: Deactivated successfully. Jul 15 11:25:44.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.5:22-10.0.0.1:42746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 15 11:25:44.976121 systemd[1]: session-15.scope: Deactivated successfully. Jul 15 11:25:44.976622 systemd-logind[1173]: Session 15 logged out. Waiting for processes to exit. Jul 15 11:25:44.977246 systemd-logind[1173]: Removed session 15.